Don't try 1**0 test with FIPS.

The 1**0 test will fail for FIPS capable builds because it uses the
old BIGNUM code in the 1.2 FIPS module which can't be fixed.
Reviewed-by: Emilia Käsper <emilia@openssl.org>
This commit is contained in:
Dr. Stephen Henson 2014-10-16 04:18:50 +01:00
parent 94f735cade
commit f33636faf7

View File

@ -71,6 +71,11 @@
static const char rnd_seed[] = "string to make the random number generator think it has entropy";
/*
* Disabled for FIPS capable builds because they use the FIPS BIGNUM library
* which will fail this test.
*/
#ifndef OPENSSL_FIPS
/* test_exp_mod_zero tests that x**0 mod 1 == 0. It returns zero on success. */
static int test_exp_mod_zero() {
BIGNUM a, p, m;
@ -107,7 +112,7 @@ static int test_exp_mod_zero() {
return ret;
}
#endif
int main(int argc, char *argv[])
{
BN_CTX *ctx;
@ -228,10 +233,10 @@ int main(int argc, char *argv[])
CRYPTO_mem_leaks(out);
BIO_free(out);
printf("\n");
#ifndef OPENSSL_FIPS
if (test_exp_mod_zero() != 0)
goto err;
#endif
printf("done\n");
EXIT(0);