Blame SOURCES/0031-tmp-Fix-test-names.patch

bf760f
diff -up openssl-3.0.0/test/recipes/90-test_sslapi.t.beldmit openssl-3.0.0/test/recipes/90-test_sslapi.t
bf760f
--- openssl-3.0.0/test/recipes/90-test_sslapi.t.beldmit	2021-09-22 11:56:49.452507975 +0200
bf760f
+++ openssl-3.0.0/test/recipes/90-test_sslapi.t	2021-09-22 11:57:19.371764742 +0200
bf760f
@@ -40,7 +40,7 @@ unless ($no_fips) {
bf760f
                  srctop_file("test", "recipes", "90-test_sslapi_data",
bf760f
                              "passwd.txt"), $tmpfilename, "fips",
bf760f
                  srctop_file("test", "fips-and-base.cnf")])),
bf760f
-                 "running sslapitest");
bf760f
+                 "running sslapitest - FIPS");
bf760f
 }
bf760f
 
bf760f
 unlink $tmpfilename;
bf760f
diff --git a/test/sslapitest.c b/test/sslapitest.c
bf760f
index e95d2657f46c..7af0eab3fce0 100644
bf760f
--- a/test/sslapitest.c
bf760f
+++ b/test/sslapitest.c
bf760f
@@ -1158,6 +1158,11 @@ static int execute_test_ktls(int cis_ktls, int sis_ktls,
bf760f
         goto end;
bf760f
     }
bf760f
 
bf760f
+    if (is_fips && strstr(cipher, "CHACHA") != NULL) {
bf760f
+        testresult = TEST_skip("CHACHA is not supported in FIPS");
bf760f
+        goto end;
bf760f
+    }
bf760f
+
bf760f
     /* Create a session based on SHA-256 */
bf760f
     if (!TEST_true(create_ssl_ctx_pair(libctx, TLS_server_method(),
bf760f
                                        TLS_client_method(),
bf760f
@@ -1292,6 +1297,11 @@ static int execute_test_ktls_sendfile(int tls_version, const char *cipher)
bf760f
         goto end;
bf760f
     }
bf760f
 
bf760f
+    if (is_fips && strstr(cipher, "CHACHA") != NULL) {
bf760f
+        testresult = TEST_skip("CHACHA is not supported in FIPS");
bf760f
+        goto end;
bf760f
+    }
bf760f
+
bf760f
     /* Create a session based on SHA-256 */
bf760f
     if (!TEST_true(create_ssl_ctx_pair(libctx, TLS_server_method(),
bf760f
                                        TLS_client_method(),