@@ -37,23 +37,8 @@ KEY_TYPES=("RSA" "RSA-PSS")
3737KEY_SIZES=(" 2048" " 3072" " 4096" )
3838PROVIDER_ARGS=(" -provider-path $WOLFPROV_PATH -provider libwolfprov" " -provider default" )
3939
40- OPENSSL_BIN=${OPENSSL_BIN:- openssl}
41-
4240echo " === Running RSA Key Generation Tests ==="
4341
44- rsa_check_force_fail () {
45- local openssl_providers=$( $OPENSSL_BIN list -providers)
46- is_openssl_default_provider=$( echo " $openssl_providers " | grep -qi " OpenSSL Default Provider" && echo 1 || echo 0)
47- if [ $is_openssl_default_provider -eq 1 ]; then
48- # With the OpenSSL provider, don't expect failures
49- echo " OPENSSL Default provider active, no forced failures expected."
50- elif [ " ${WOLFPROV_FORCE_FAIL} " = " 1" ]; then
51- echo " [PASS] Test passed when force fail was enabled"
52- FORCE_FAIL_PASSED=1
53- exit 1
54- fi
55- }
56-
5742# Function to validate key
5843validate_key () {
5944 local key_type=$1
@@ -76,15 +61,15 @@ validate_key() {
7661 return
7762 else
7863 echo " [PASS] ${key_type} key file exists and has content"
79- rsa_check_force_fail
64+ check_force_fail
8065 fi
8166
8267 # Only try to extract public key if file exists and has content
8368 local pub_key_file=" rsa_outputs/${key_type} _${key_size} _pub.pem"
8469 if $OPENSSL_BIN pkey -in " $key_file " -pubout -out " $pub_key_file " \
8570 ${provider_args} -passin pass: > /dev/null; then
8671 echo " [PASS] ${key_type} Public key extraction successful"
87- rsa_check_force_fail
72+ check_force_fail
8873 else
8974 echo " [FAIL] ${key_type} Public key extraction failed"
9075 FAIL=1
@@ -169,6 +154,8 @@ test_sign_verify_pkeyutl() {
169154
170155 # Get the provider name
171156 provider_name=$( get_provider_name " $provider_args " )
157+
158+ echo -e " \n=== Testing ${key_type} (${key_size} ) Sign/Verify with pkeyutl Using ${provider_name} ==="
172159
173160 # Handle different key naming conventions
174161 local key_prefix=" ${key_type} "
@@ -192,18 +179,16 @@ test_sign_verify_pkeyutl() {
192179 exit 1
193180 fi
194181
195- echo -e " \n=== Testing ${key_type} (${key_size} ) Sign/Verify with pkeyutl Using ${provider_name} ==="
196-
197182 # Test 1: Sign and verify with OpenSSL default
198183 use_default_provider
199184 echo " Test 1: Sign and verify with OpenSSL default (${key_type} )"
200185 local default_sig_file=" rsa_outputs/${key_prefix} _${key_size} _default_sig.bin"
201186 if $sign_func " $key_file " " $data_file " " $default_sig_file " " $provider_args " ; then
202187 echo " [PASS] Signing with OpenSSL default successful"
203- rsa_check_force_fail
188+ check_force_fail
204189 if $verify_func " $pub_key_file " " $data_file " " $default_sig_file " " $provider_args " ; then
205190 echo " [PASS] Default provider verify successful"
206- rsa_check_force_fail
191+ check_force_fail
207192 else
208193 echo " [FAIL] Default provider verify failed"
209194 FAIL=1
@@ -219,10 +204,10 @@ test_sign_verify_pkeyutl() {
219204 local wolf_sig_file=" rsa_outputs/${key_prefix} _${key_size} _wolf_sig.bin"
220205 if $sign_func " $key_file " " $data_file " " $wolf_sig_file " " $provider_args " ; then
221206 echo " [PASS] Signing with wolfProvider successful"
222- rsa_check_force_fail
207+ check_force_fail
223208 if $verify_func " $pub_key_file " " $data_file " " $wolf_sig_file " " $provider_args " ; then
224209 echo " [PASS] wolfProvider sign/verify successful"
225- rsa_check_force_fail
210+ check_force_fail
226211 else
227212 echo " [FAIL] wolfProvider verify failed"
228213 FAIL=1
@@ -238,7 +223,7 @@ test_sign_verify_pkeyutl() {
238223 use_wolf_provider
239224 if $verify_func " $pub_key_file " " $data_file " " $default_sig_file " " $provider_args " ; then
240225 echo " [PASS] wolfProvider can verify OpenSSL default signature"
241- rsa_check_force_fail
226+ check_force_fail
242227 else
243228 echo " [FAIL] wolfProvider cannot verify OpenSSL default signature"
244229 FAIL=1
@@ -248,7 +233,7 @@ test_sign_verify_pkeyutl() {
248233 echo " Test 4: Cross-provider verification (wolf sign, default verify)"
249234 if $verify_func " $pub_key_file " " $data_file " " $wolf_sig_file " " $provider_args " ; then
250235 echo " [PASS] OpenSSL default can verify wolfProvider signature"
251- rsa_check_force_fail
236+ check_force_fail
252237 else
253238 echo " [FAIL] OpenSSL default cannot verify wolfProvider signature"
254239 FAIL=1
@@ -263,15 +248,16 @@ generate_and_test_key() {
263248 local provider_args=$3
264249 local output_file=" rsa_outputs/${key_type} _${key_size} .pem"
265250
251+ # Get the provider name
252+ provider_name=$( get_provider_name " $provider_args " )
253+
254+ echo -e " \n=== Testing ${key_type} Key Generation (${key_size} ) with ${provider_name} ==="
255+
266256 if [ -f " $output_file " ]; then
267257 echo " Output file $output_file already exists, removing it."
268258 rm -f " $output_file "
269259 fi
270260
271- # Get the provider name
272- provider_name=$( get_provider_name " $provider_args " )
273-
274- echo -e " \n=== Testing ${key_type} Key Generation (${key_size} ) with ${provider_name} ==="
275261 echo " Generating ${key_type} key (${key_size} )..."
276262 if [ " $key_type " = " RSA-PSS" ]; then
277263 # For RSA-PSS, specify all parameters
@@ -283,7 +269,7 @@ generate_and_test_key() {
283269 -pkeyopt rsa_pss_keygen_saltlen:-1 \
284270 -out " $output_file " 2> /dev/null; then
285271 echo " [PASS] RSA-PSS key generation successful"
286- rsa_check_force_fail
272+ check_force_fail
287273 else
288274 echo " [FAIL] RSA-PSS key generation failed"
289275 FAIL=1
@@ -295,7 +281,7 @@ generate_and_test_key() {
295281 -pkeyopt rsa_keygen_bits:${key_size} \
296282 -out " $output_file " 2> /dev/null; then
297283 echo " [PASS] RSA key generation successful"
298- rsa_check_force_fail
284+ check_force_fail
299285 else
300286 echo " [FAIL] RSA key generation failed"
301287 FAIL=1
@@ -305,7 +291,7 @@ generate_and_test_key() {
305291 # Verify the key was generated
306292 if [ -s " $output_file " ]; then
307293 echo " [PASS] ${key_type} key (${key_size} ) generation successful"
308- rsa_check_force_fail
294+ check_force_fail
309295 else
310296 echo " [FAIL] ${key_type} key (${key_size} ) generation failed"
311297 FAIL=1
@@ -322,7 +308,7 @@ generate_and_test_key() {
322308 if $OPENSSL_BIN pkey -in " $output_file " -check \
323309 ${provider_args} -passin pass: > /dev/null; then
324310 echo " [PASS] ${provider_name} can use ${key_type} key (${key_size} )"
325- rsa_check_force_fail
311+ check_force_fail
326312 else
327313 echo " [FAIL] ${provider_name} cannot use ${key_type} key (${key_size} )"
328314 FAIL=1
0 commit comments