@@ -944,7 +944,9 @@ static int test_pkey_verify_ecc(EVP_PKEY *pkey, OSSL_LIB_CTX* libCtx,
944944int test_ecdsa_p192_pkey (void * data )
945945{
946946 int err ;
947+ #ifndef REPLACE_DEFAULT
947948 int res ;
949+ #endif
948950 EVP_PKEY * pkey = NULL ;
949951 unsigned char ecdsaSig [64 ];
950952 size_t ecdsaSigLen ;
@@ -958,6 +960,9 @@ int test_ecdsa_p192_pkey(void *data)
958960 pkey = d2i_PrivateKey (EVP_PKEY_EC , NULL , & p , sizeof (ecc_key_der_192 ));
959961 err = pkey == NULL ;
960962 }
963+ #ifndef REPLACE_DEFAULT
964+ /* With replce default, OpenSSL inherits wolfProvider, so we can't test
965+ * cross-provider behavior with P-192. */
961966 if (err == 0 ) {
962967 PRINT_MSG ("Sign with OpenSSL" );
963968 ecdsaSigLen = sizeof (ecdsaSig );
@@ -977,6 +982,7 @@ int test_ecdsa_p192_pkey(void *data)
977982 if (res != 1 )
978983 err = 1 ;
979984 }
985+ #endif
980986 if (err == 0 ) {
981987 PRINT_MSG ("Sign with wolfprovider" );
982988 ecdsaSigLen = sizeof (ecdsaSig );
@@ -1231,7 +1237,9 @@ int test_ecdsa_p521_pkey(void *data)
12311237int test_ecdsa_p192 (void * data )
12321238{
12331239 int err ;
1240+ #ifndef REPLACE_DEFAULT
12341241 int res ;
1242+ #endif
12351243 EVP_PKEY * pkey = NULL ;
12361244 unsigned char ecdsaSig [64 ];
12371245 size_t ecdsaSigLen ;
@@ -1250,6 +1258,9 @@ int test_ecdsa_p192(void *data)
12501258 pkey = d2i_PrivateKey (EVP_PKEY_EC , NULL , & p , sizeof (ecc_key_der_192 ));
12511259 err = pkey == NULL ;
12521260 }
1261+ #ifndef REPLACE_DEFAULT
1262+ /* With replce default, OpenSSL inherits wolfProvider, so we can't test
1263+ * cross-provider behavior with P-192. */
12531264 if (err == 0 ) {
12541265 PRINT_MSG ("Sign with OpenSSL" );
12551266 ecdsaSigLen = sizeof (ecdsaSig );
@@ -1269,6 +1280,7 @@ int test_ecdsa_p192(void *data)
12691280 if (res != 1 )
12701281 err = 1 ;
12711282 }
1283+ #endif
12721284
12731285 if (err == 0 ) {
12741286 PRINT_MSG ("Sign with wolfprovider" );
0 commit comments