aboutsummaryrefslogtreecommitdiff
path: root/tests
diff options
context:
space:
mode:
authorJakub Jelen <jjelen@redhat.com>2019-06-21 08:56:30 +0200
committerJakub Jelen <jjelen@redhat.com>2019-06-21 08:58:21 +0200
commit17a531d2af35a0b6e7ee42c0b83b2f0289978233 (patch)
treef7676e14cfef47142f441087933b82207c8232fc /tests
parenta80547bdf99819d58bf8ca1f46d224a82b285ce3 (diff)
downloadlibssh-17a531d2af35a0b6e7ee42c0b83b2f0289978233.tar.gz
libssh-17a531d2af35a0b6e7ee42c0b83b2f0289978233.tar.xz
libssh-17a531d2af35a0b6e7ee42c0b83b2f0289978233.zip
tests: Skip 1k RSA key generation in FIPS
Signed-off-by: Jakub Jelen <jjelen@redhat.com> Reviewed-by: Anderson Toshiyuki Sasaki <ansasaki@redhat.com>
Diffstat (limited to 'tests')
-rw-r--r--tests/unittests/torture_pki_rsa.c32
1 files changed, 17 insertions, 15 deletions
diff --git a/tests/unittests/torture_pki_rsa.c b/tests/unittests/torture_pki_rsa.c
index fd596b2f..c3305241 100644
--- a/tests/unittests/torture_pki_rsa.c
+++ b/tests/unittests/torture_pki_rsa.c
@@ -506,21 +506,23 @@ static void torture_pki_rsa_generate_key(void **state)
ssh_session session=ssh_new();
(void) state;
- rc = ssh_pki_generate(SSH_KEYTYPE_RSA, 1024, &key);
- assert_true(rc == SSH_OK);
- assert_non_null(key);
- rc = ssh_pki_export_privkey_to_pubkey(key, &pubkey);
- assert_int_equal(rc, SSH_OK);
- assert_non_null(pubkey);
- sign = pki_do_sign(key, INPUT, sizeof(INPUT), SSH_DIGEST_SHA256);
- assert_non_null(sign);
- rc = pki_signature_verify(session, sign, pubkey, INPUT, sizeof(INPUT));
- assert_true(rc == SSH_OK);
- ssh_signature_free(sign);
- SSH_KEY_FREE(key);
- SSH_KEY_FREE(pubkey);
- key = NULL;
- pubkey = NULL;
+ if (!ssh_fips_mode()) {
+ rc = ssh_pki_generate(SSH_KEYTYPE_RSA, 1024, &key);
+ assert_true(rc == SSH_OK);
+ assert_non_null(key);
+ rc = ssh_pki_export_privkey_to_pubkey(key, &pubkey);
+ assert_int_equal(rc, SSH_OK);
+ assert_non_null(pubkey);
+ sign = pki_do_sign(key, INPUT, sizeof(INPUT), SSH_DIGEST_SHA256);
+ assert_non_null(sign);
+ rc = pki_signature_verify(session, sign, pubkey, INPUT, sizeof(INPUT));
+ assert_true(rc == SSH_OK);
+ ssh_signature_free(sign);
+ SSH_KEY_FREE(key);
+ SSH_KEY_FREE(pubkey);
+ key = NULL;
+ pubkey = NULL;
+ }
rc = ssh_pki_generate(SSH_KEYTYPE_RSA, 2048, &key);
assert_true(rc == SSH_OK);