@@ -1024,8 +1024,8 @@ int test_rsa_pkey_invalid_key_size(void *data) {
10241024 RSA * rsa = NULL ;
10251025#endif
10261026#if defined(HAVE_FIPS ) || defined(HAVE_FIPS_VERSION )
1027- const unsigned char * p = rsa_key_der_1024 ;
1028- size_t pSize = sizeof (rsa_key_der_1024 );
1027+ const unsigned char * p = rsa_key_der_2048 ;
1028+ size_t pSize = sizeof (rsa_key_der_2048 );
10291029#else
10301030 const unsigned char * p = rsa_key_der_256 ;
10311031 size_t pSize = sizeof (rsa_key_der_256 );
@@ -1036,7 +1036,7 @@ int test_rsa_pkey_invalid_key_size(void *data) {
10361036
10371037 (void )data ;
10381038 (void )rsa_key_der_256 ;
1039- (void )rsa_key_der_1024 ;
1039+ (void )rsa_key_der_2048 ;
10401040
10411041 pkey = d2i_PrivateKey (EVP_PKEY_RSA , NULL , & p , pSize );
10421042 err = pkey == NULL ;
@@ -1054,10 +1054,10 @@ int test_rsa_pkey_invalid_key_size(void *data) {
10541054 }
10551055
10561056#if defined(HAVE_FIPS ) || defined(HAVE_FIPS_VERSION )
1057- /* In FIPS mode, 1024 -bit keys are allowed, so skip the invalid key size check */
1057+ /* In FIPS mode, use 2048 -bit keys which are allowed */
10581058 if (err == 0 ) {
10591059 PRINT_MSG ("Check that signing with OpenSSL and verifying with "
1060- "wolfProvider using a 1024 -bit key works." );
1060+ "wolfProvider using a 2048 -bit key works." );
10611061 err = test_pkey_sign (pkey , osslLibCtx , buf , sizeof (buf ), rsaSig ,
10621062 & rsaSigLen , 0 , NULL , NULL );
10631063 }
0 commit comments