Commit f33636fa authored by Dr. Stephen Henson's avatar Dr. Stephen Henson
Browse files

Don't try 1**0 test with FIPS.



The 1**0 test will fail for FIPS capable builds because it uses the
old BIGNUM code in the 1.2 FIPS module which can't be fixed.
Reviewed-by: default avatarEmilia Käsper <emilia@openssl.org>
parent 94f735ca
Loading
Loading
Loading
Loading
+8 −3
Original line number Diff line number Diff line
@@ -71,6 +71,11 @@

static const char rnd_seed[] = "string to make the random number generator think it has entropy";

/*
 * Disabled for FIPS capable builds because they use the FIPS BIGNUM library
 * which will fail this test.
 */
#ifndef OPENSSL_FIPS
/* test_exp_mod_zero tests that x**0 mod 1 == 0. It returns zero on success. */
static int test_exp_mod_zero() {
	BIGNUM a, p, m;
@@ -107,7 +112,7 @@ static int test_exp_mod_zero() {

	return ret;
}

#endif
int main(int argc, char *argv[])
	{
	BN_CTX *ctx;
@@ -228,10 +233,10 @@ int main(int argc, char *argv[])
	CRYPTO_mem_leaks(out);
	BIO_free(out);
	printf("\n");

#ifndef OPENSSL_FIPS
	if (test_exp_mod_zero() != 0)
		goto err;

#endif
	printf("done\n");

	EXIT(0);