evp_extra_test: Do not manipulate providers in default context
authorTomas Mraz <tomas@openssl.org>
Wed, 24 Feb 2021 16:45:55 +0000 (17:45 +0100)
committerTomas Mraz <tomas@openssl.org>
Thu, 25 Feb 2021 16:55:58 +0000 (17:55 +0100)
Otherwise the with OPENSSL_TEST_RAND_ORDER following tests will
be broken. There is also no real need to do that.

Fixes #14070

Reviewed-by: Paul Dale <pauli@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/14305)

test/evp_extra_test.c

index a2490a9fe9b9eae3e4e6f5d20720b76beb37ba47..845752fae42be1964d15c129689da8b6293e81dc 100644 (file)
@@ -2418,15 +2418,13 @@ err:
 static int test_EVP_rsa_pss_with_keygen_bits(void)
 {
     int ret;
-    OSSL_PROVIDER *provider;
     EVP_PKEY_CTX *ctx;
     EVP_PKEY *pkey;
     const EVP_MD *md;
     pkey = NULL;
     ret = 0;
-    provider = OSSL_PROVIDER_load(NULL, "default");
-    md = EVP_get_digestbyname("sha256");
 
+    md = EVP_get_digestbyname("sha256");
     ret = TEST_ptr((ctx = EVP_PKEY_CTX_new_id(EVP_PKEY_RSA_PSS, NULL)))
         && TEST_true(EVP_PKEY_keygen_init(ctx))
         && TEST_int_gt(EVP_PKEY_CTX_set_rsa_keygen_bits(ctx, 512), 0)
@@ -2435,7 +2433,6 @@ static int test_EVP_rsa_pss_with_keygen_bits(void)
 
     EVP_PKEY_free(pkey);
     EVP_PKEY_CTX_free(ctx);
-    OSSL_PROVIDER_unload(provider);
     return ret;
 }