!lib->plugins->has_feature(lib->plugins,
PLUGIN_PROVIDE(PRIVKEY_SIGN, schemes[i])))
{
+ warn("%N not supported, skip scheme", signature_scheme_names,
+ schemes[i]);
continue;
}
if (schemes[i] == SIGN_RSA_EMSA_PSS)
if (!lib->plugins->has_feature(lib->plugins,
PLUGIN_PROVIDE(PUBKEY_VERIFY, schemes[s])))
{
+ warn("%N not supported, skip scheme", signature_scheme_names,
+ schemes[s]);
continue;
}
if (schemes[s] == SIGN_RSA_EMSA_PSS)
!lib->plugins->has_feature(lib->plugins,
PLUGIN_PROVIDE(PRIVKEY_SIGN, scheme)))
{
+ warn("%N not supported, skip test", signature_scheme_names, scheme);
return;
}
fail_unless(privkey_2048->sign(privkey_2048, scheme, NULL, pkcs15_2048[_i].m, &sig),
!lib->plugins->has_feature(lib->plugins,
PLUGIN_PROVIDE(PRIVKEY_SIGN, scheme)))
{
+ warn("%N not supported, skip test", signature_scheme_names, scheme);
return;
}
fail_unless(privkey_3072->sign(privkey_3072, scheme, NULL, pkcs15_3072[_i].m, &sig),
!lib->plugins->has_feature(lib->plugins,
PLUGIN_PROVIDE(PRIVKEY_SIGN, SIGN_RSA_EMSA_PSS)))
{
+ warn("%N not supported, skip test", signature_scheme_names,
+ SIGN_RSA_EMSA_PSS);
return;
}
privkey = lib->creds->create(lib->creds, CRED_PRIVATE_KEY, KEY_RSA,
if (!lib->plugins->has_feature(lib->plugins,
PLUGIN_PROVIDE(PUBKEY_VERIFY, scheme)))
{
+ warn("%N not supported, skip test", signature_scheme_names, scheme);
return;
}
for (i = 0; i < countof(pkcs15_verify[_i].tests); i++)
if (!lib->plugins->has_feature(lib->plugins,
PLUGIN_PROVIDE(PUBKEY_VERIFY, SIGN_RSA_EMSA_PSS)))
{
+ warn("%N not supported, skip test", signature_scheme_names,
+ SIGN_RSA_EMSA_PSS);
return;
}
for (i = 0; i < countof(pss_verify[_i].tests); i++)