ERR_print_errors(bio_err);
goto end;
}
- if (!EVP_PKEY_is_a(pkey, "RSA")) {
+ if (!EVP_PKEY_is_a(pkey, "RSA") && !EVP_PKEY_is_a(pkey, "RSA-PSS")) {
BIO_printf(bio_err, "Not an RSA key\n");
goto end;
}
setup("test_rsapss");
-plan tests => 7;
+plan tests => 9;
#using test/testrsa.pem which happens to be a 512 bit RSA
ok(run(app(['openssl', 'dgst', '-sign', srctop_file('test', 'testrsa.pem'), '-sha1',
'-signature', 'testrsapss-unrestricted.sig',
srctop_file('test', 'testrsa.pem')])),
"openssl dgst -prverify [plain RSA key, PSS padding mode, no PSS restrictions]");
+
+# Test that RSA-PSS keys are supported by genpkey and rsa commands.
+{
+ my $rsapss = "rsapss.key";
+ ok(run(app(['openssl', 'genpkey', '-algorithm', 'RSA-PSS',
+ '-pkeyopt', 'rsa_keygen_bits:1024',
+ '--out', $rsapss])));
+ ok(run(app(['openssl', 'rsa', '-check',
+ '-in', $rsapss])));
+}