aboutsummaryrefslogtreecommitdiffstats
path: root/test
diff options
context:
space:
mode:
authorslontis <shane.lontis@oracle.com>2021-08-30 09:59:54 +1000
committerPauli <pauli@openssl.org>2021-08-31 20:45:53 +1000
commit5595058714832bdff03604c881cf44f91c14b5fc (patch)
treefb2453756f4644898716b0c0729823a66828829e /test
parent9b6d17e423da138ea7fd190ae366580c539dceca (diff)
downloadopenssl-5595058714832bdff03604c881cf44f91c14b5fc.tar.gz
Add the self test type OSSL_SELF_TEST_TYPE_PCT_SIGNATURE
Fixes #16457 The ECDSA and DSA signature tests use Pairwise tests instead of KATS. Note there is a seperate type used by the keygen for conditional Pairwise Tests. Reviewed-by: Tim Hudson <tjh@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16461)
Diffstat (limited to 'test')
-rw-r--r--test/recipes/03-test_fipsinstall.t2
1 files changed, 1 insertions, 1 deletions
diff --git a/test/recipes/03-test_fipsinstall.t b/test/recipes/03-test_fipsinstall.t
index db64362538..d99974e467 100644
--- a/test/recipes/03-test_fipsinstall.t
+++ b/test/recipes/03-test_fipsinstall.t
@@ -235,7 +235,7 @@ SKIP: {
'-macopt', 'digest:SHA256', '-macopt', "hexkey:$fipskey",
'-section_name', 'fips_sect',
'-corrupt_desc', 'DSA',
- '-corrupt_type', 'KAT_Signature'])),
+ '-corrupt_type', 'PCT_Signature'])),
"fipsinstall fails when the signature result is corrupted");
}