The 1**0 test will fail for FIPS capable builds because it uses the
old BIGNUM code in the 1.2 FIPS module which can't be fixed.
Reviewed-by: Emilia Käsper <emilia@openssl.org>
static const char rnd_seed[] = "string to make the random number generator think it has entropy";
+/*
+ * Disabled for FIPS capable builds because they use the FIPS BIGNUM library
+ * which will fail this test.
+ */
+#ifndef OPENSSL_FIPS
/* test_exp_mod_zero tests that x**0 mod 1 == 0. It returns zero on success. */
static int test_exp_mod_zero() {
BIGNUM a, p, m;
return ret;
}
-
+#endif
int main(int argc, char *argv[])
{
BN_CTX *ctx;
CRYPTO_mem_leaks(out);
BIO_free(out);
printf("\n");
-
+#ifndef OPENSSL_FIPS
if (test_exp_mod_zero() != 0)
goto err;
-
+#endif
printf("done\n");
EXIT(0);