From 54933db9f0e1a03b644cecc6735f8f2025b748b5 Mon Sep 17 00:00:00 2001 From: Pauli Date: Tue, 30 Jul 2024 14:46:33 +1000 Subject: [PATCH] test: omit failing test when using a FIPS provider that supports eddsa_no_verify_digested Reviewed-by: Tomas Mraz Reviewed-by: Shane Lontis (Merged from https://github.com/openssl/openssl/pull/25032) --- test/cmp_protect_test.c | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/test/cmp_protect_test.c b/test/cmp_protect_test.c index 89f342458ec..a1ec672d7b7 100644 --- a/test/cmp_protect_test.c +++ b/test/cmp_protect_test.c @@ -162,6 +162,14 @@ static int test_cmp_calc_protection_pkey(void) static int test_cmp_calc_protection_pkey_Ed(void) { SETUP_TEST_FIXTURE(CMP_PROTECT_TEST_FIXTURE, set_up); + + /* eddsa_no_verify_digested prevents this test working */ + if (fips_provider_version_match(libctx, ">=3.4.0")) { + tear_down(fixture); + fixture = NULL; + return TEST_skip("incompatible FIPS provider version"); + } + fixture->pubkey = prot_Ed_key; if (!TEST_true(OSSL_CMP_CTX_set1_pkey(fixture->cmp_ctx, prot_Ed_key)) || !TEST_ptr(fixture->msg = load_pkimsg(genm_prot_Ed_f, libctx))) { -- 2.47.2