FIPS, HMAC, and PKCS8
One of the tests for PKCS8 depended on keys encrypted with a password that has only 8 letters. HMAC in FIPS mode requires a minimum of 12 bytes. Disabled that test case when FIPS is enabled. All components do get tested just not all together in that case.
This commit is contained in:
parent
8b6e66f095
commit
c3c705f82b
@ -20664,6 +20664,10 @@ static void test_wolfSSL_PKCS8_Compat(void)
|
||||
|
||||
static void test_wolfSSL_PKCS8_d2i(void)
|
||||
{
|
||||
#ifndef WOLFSSL_FIPS
|
||||
/* This test ends up using HMAC as a part of PBKDF2, and HMAC
|
||||
* requires a 12 byte password in FIPS mode. This test ends up
|
||||
* trying to use an 8 byte password. */
|
||||
#ifdef OPENSSL_ALL
|
||||
WOLFSSL_EVP_PKEY* pkey = NULL;
|
||||
#ifndef NO_FILESYSTEM
|
||||
@ -20817,6 +20821,7 @@ static void test_wolfSSL_PKCS8_d2i(void)
|
||||
|
||||
printf(resultFmt, passed);
|
||||
#endif
|
||||
#endif /* WOLFSSL_FIPS */
|
||||
}
|
||||
|
||||
static void test_wolfSSL_ERR_put_error(void)
|
||||
|
Loading…
x
Reference in New Issue
Block a user