summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorTomas Mraz <tomas@openssl.org>2023-09-04 21:39:30 +0200
committerTomas Mraz <tomas@openssl.org>2023-09-05 09:35:18 +0200
commit75ac8f04b78e9e1283b0402a791728ba2728e159 (patch)
tree36823ab2d0740ef976f0795e827d19a62d7dd7b9
parentb12c07cfba9651ae80b7020ffe8e634f47581389 (diff)
04-test_encoder_decoder.t: Use algorithm that is non-fips also on 3.0.0
The test encrypted RSA key with DES3 which is still allowed in the 3.0 fips provider. Instead use the traditional key format that uses MD5 to create the password based key. MD5 is disallowed in the 3.0 fips provider. Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/21957)
-rw-r--r--test/recipes/04-test_encoder_decoder.t8
1 files changed, 4 insertions, 4 deletions
diff --git a/test/recipes/04-test_encoder_decoder.t b/test/recipes/04-test_encoder_decoder.t
index 817c95ee64..56c7d6e714 100644
--- a/test/recipes/04-test_encoder_decoder.t
+++ b/test/recipes/04-test_encoder_decoder.t
@@ -50,10 +50,10 @@ unless ($no_fips) {
my $no_des = disabled("des");
SKIP: {
- skip "DES disabled", 2 if disabled("des");
- ok(run(app([ 'openssl', 'genrsa', '-des3', '-out', 'epki.pem',
- '-passout', 'pass:pass' ])),
- "rsa encrypt using a non fips algorithm");
+ skip "MD5 disabled", 2 if disabled("md5");
+ ok(run(app([ 'openssl', 'genrsa', '-aes128', '-out', 'epki.pem',
+ '-traditional', '-passout', 'pass:pass' ])),
+ "rsa encrypted using a non fips algorithm MD5 in pbe");
my $conf2 = srctop_file("test", "default-and-fips.cnf");
ok(run(test(['decoder_propq_test', '-config', $conf2,