my $no_fips = disabled('fips') || ($ENV{NO_FIPS} // 0);
-plan tests => $no_fips ? 58 : 69;
+plan tests => $no_fips ? 58 : 63;
# Test different PKCS#12 formats
ok(run(test(["pkcs12_format_test"])), "test pkcs12 formats");
"test pbmac1 pkcs12 file $file");
}
-
-unless ($no_fips) {
- my $provpath = bldtop_dir("providers");
- my $provconf = srctop_file("test", "fips-and-base.cnf");
- my $provname = 'fips';
- my @prov = ("-provider-path", $provpath,
- "-provider", $provname);
- local $ENV{OPENSSL_CONF} = $provconf;
-
-# Test pbmac1 pkcs12 good files, RFC 9579
- for my $file ("pbmac1_256_256.good.p12", "pbmac1_512_256.good.p12", "pbmac1_512_512.good.p12")
- {
- my $path = srctop_file("test", "recipes", "80-test_pkcs12_data", $file);
- ok(run(app(["openssl", "pkcs12", @prov, "-in", $path, "-password", "pass:1234", "-noenc"])),
- "test pbmac1 pkcs12 file $file");
-
- ok(run(app(["openssl", "pkcs12", @prov, "-in", $path, "-info", "-noout",
- "-passin", "pass:1234"], stderr => "${file}_info.txt")),
- "test_export_pkcs12_${file}_info");
- }
-}
-
# Test pbmac1 pkcs12 bad files, RFC 9579 and CVE-2025-11187
for my $file ("pbmac1_256_256.bad-iter.p12", "pbmac1_256_256.bad-salt.p12",
"pbmac1_256_256.no-len.p12", "pbmac1_256_256.bad-len.p12",