diff options
author | Jakub Jelen <jjelen@redhat.com> | 2019-06-21 08:56:30 +0200 |
---|---|---|
committer | Jakub Jelen <jjelen@redhat.com> | 2019-06-21 08:58:21 +0200 |
commit | 17a531d2af35a0b6e7ee42c0b83b2f0289978233 (patch) | |
tree | f7676e14cfef47142f441087933b82207c8232fc /tests | |
parent | a80547bdf99819d58bf8ca1f46d224a82b285ce3 (diff) | |
download | libssh-17a531d2af35a0b6e7ee42c0b83b2f0289978233.tar.gz libssh-17a531d2af35a0b6e7ee42c0b83b2f0289978233.tar.xz libssh-17a531d2af35a0b6e7ee42c0b83b2f0289978233.zip |
tests: Skip 1k RSA key generation in FIPS
Signed-off-by: Jakub Jelen <jjelen@redhat.com>
Reviewed-by: Anderson Toshiyuki Sasaki <ansasaki@redhat.com>
Diffstat (limited to 'tests')
-rw-r--r-- | tests/unittests/torture_pki_rsa.c | 32 |
1 files changed, 17 insertions, 15 deletions
diff --git a/tests/unittests/torture_pki_rsa.c b/tests/unittests/torture_pki_rsa.c index fd596b2f..c3305241 100644 --- a/tests/unittests/torture_pki_rsa.c +++ b/tests/unittests/torture_pki_rsa.c @@ -506,21 +506,23 @@ static void torture_pki_rsa_generate_key(void **state) ssh_session session=ssh_new(); (void) state; - rc = ssh_pki_generate(SSH_KEYTYPE_RSA, 1024, &key); - assert_true(rc == SSH_OK); - assert_non_null(key); - rc = ssh_pki_export_privkey_to_pubkey(key, &pubkey); - assert_int_equal(rc, SSH_OK); - assert_non_null(pubkey); - sign = pki_do_sign(key, INPUT, sizeof(INPUT), SSH_DIGEST_SHA256); - assert_non_null(sign); - rc = pki_signature_verify(session, sign, pubkey, INPUT, sizeof(INPUT)); - assert_true(rc == SSH_OK); - ssh_signature_free(sign); - SSH_KEY_FREE(key); - SSH_KEY_FREE(pubkey); - key = NULL; - pubkey = NULL; + if (!ssh_fips_mode()) { + rc = ssh_pki_generate(SSH_KEYTYPE_RSA, 1024, &key); + assert_true(rc == SSH_OK); + assert_non_null(key); + rc = ssh_pki_export_privkey_to_pubkey(key, &pubkey); + assert_int_equal(rc, SSH_OK); + assert_non_null(pubkey); + sign = pki_do_sign(key, INPUT, sizeof(INPUT), SSH_DIGEST_SHA256); + assert_non_null(sign); + rc = pki_signature_verify(session, sign, pubkey, INPUT, sizeof(INPUT)); + assert_true(rc == SSH_OK); + ssh_signature_free(sign); + SSH_KEY_FREE(key); + SSH_KEY_FREE(pubkey); + key = NULL; + pubkey = NULL; + } rc = ssh_pki_generate(SSH_KEYTYPE_RSA, 2048, &key); assert_true(rc == SSH_OK); |