aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorJakub Jelen <jjelen@redhat.com>2019-06-21 08:56:30 +0200
committerAndreas Schneider <asn@cryptomilk.org>2019-06-24 15:42:02 +0200
commit2c60ef04d9bda221d4767fdaab1e6a7818f948ec (patch)
tree9038bf4f762b24f79a32e7e1e6e43e07ca33a3f2
parentec486d13db7efc91f2f4ebbb95df38c428848095 (diff)
downloadlibssh-2c60ef04d9bda221d4767fdaab1e6a7818f948ec.tar.gz
libssh-2c60ef04d9bda221d4767fdaab1e6a7818f948ec.tar.xz
libssh-2c60ef04d9bda221d4767fdaab1e6a7818f948ec.zip
tests: Skip 1k RSA key generation in FIPS
Signed-off-by: Jakub Jelen <jjelen@redhat.com> Reviewed-by: Anderson Toshiyuki Sasaki <ansasaki@redhat.com> (cherry picked from commit 17a531d2af35a0b6e7ee42c0b83b2f0289978233)
-rw-r--r--tests/unittests/torture_pki_rsa.c32
1 files changed, 17 insertions, 15 deletions
diff --git a/tests/unittests/torture_pki_rsa.c b/tests/unittests/torture_pki_rsa.c
index fd596b2f..c3305241 100644
--- a/tests/unittests/torture_pki_rsa.c
+++ b/tests/unittests/torture_pki_rsa.c
@@ -506,21 +506,23 @@ static void torture_pki_rsa_generate_key(void **state)
ssh_session session=ssh_new();
(void) state;
- rc = ssh_pki_generate(SSH_KEYTYPE_RSA, 1024, &key);
- assert_true(rc == SSH_OK);
- assert_non_null(key);
- rc = ssh_pki_export_privkey_to_pubkey(key, &pubkey);
- assert_int_equal(rc, SSH_OK);
- assert_non_null(pubkey);
- sign = pki_do_sign(key, INPUT, sizeof(INPUT), SSH_DIGEST_SHA256);
- assert_non_null(sign);
- rc = pki_signature_verify(session, sign, pubkey, INPUT, sizeof(INPUT));
- assert_true(rc == SSH_OK);
- ssh_signature_free(sign);
- SSH_KEY_FREE(key);
- SSH_KEY_FREE(pubkey);
- key = NULL;
- pubkey = NULL;
+ if (!ssh_fips_mode()) {
+ rc = ssh_pki_generate(SSH_KEYTYPE_RSA, 1024, &key);
+ assert_true(rc == SSH_OK);
+ assert_non_null(key);
+ rc = ssh_pki_export_privkey_to_pubkey(key, &pubkey);
+ assert_int_equal(rc, SSH_OK);
+ assert_non_null(pubkey);
+ sign = pki_do_sign(key, INPUT, sizeof(INPUT), SSH_DIGEST_SHA256);
+ assert_non_null(sign);
+ rc = pki_signature_verify(session, sign, pubkey, INPUT, sizeof(INPUT));
+ assert_true(rc == SSH_OK);
+ ssh_signature_free(sign);
+ SSH_KEY_FREE(key);
+ SSH_KEY_FREE(pubkey);
+ key = NULL;
+ pubkey = NULL;
+ }
rc = ssh_pki_generate(SSH_KEYTYPE_RSA, 2048, &key);
assert_true(rc == SSH_OK);