diff options
author | Tomas Mraz <tomas@openssl.org> | 2023-09-04 21:39:30 +0200 |
---|---|---|
committer | Tomas Mraz <tomas@openssl.org> | 2023-09-05 09:35:18 +0200 |
commit | 75ac8f04b78e9e1283b0402a791728ba2728e159 (patch) | |
tree | 36823ab2d0740ef976f0795e827d19a62d7dd7b9 | |
parent | b12c07cfba9651ae80b7020ffe8e634f47581389 (diff) |
04-test_encoder_decoder.t: Use algorithm that is non-fips also on 3.0.0
The test encrypted RSA key with DES3 which is still
allowed in the 3.0 fips provider.
Instead use the traditional key format that uses MD5
to create the password based key. MD5 is disallowed
in the 3.0 fips provider.
Reviewed-by: Paul Dale <pauli@openssl.org>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/21957)
-rw-r--r-- | test/recipes/04-test_encoder_decoder.t | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/test/recipes/04-test_encoder_decoder.t b/test/recipes/04-test_encoder_decoder.t index 817c95ee64..56c7d6e714 100644 --- a/test/recipes/04-test_encoder_decoder.t +++ b/test/recipes/04-test_encoder_decoder.t @@ -50,10 +50,10 @@ unless ($no_fips) { my $no_des = disabled("des"); SKIP: { - skip "DES disabled", 2 if disabled("des"); - ok(run(app([ 'openssl', 'genrsa', '-des3', '-out', 'epki.pem', - '-passout', 'pass:pass' ])), - "rsa encrypt using a non fips algorithm"); + skip "MD5 disabled", 2 if disabled("md5"); + ok(run(app([ 'openssl', 'genrsa', '-aes128', '-out', 'epki.pem', + '-traditional', '-passout', 'pass:pass' ])), + "rsa encrypted using a non fips algorithm MD5 in pbe"); my $conf2 = srctop_file("test", "default-and-fips.cnf"); ok(run(test(['decoder_propq_test', '-config', $conf2, |