Skip to content

Commit c09e3c2

Browse files
author
Test User
committed
Fix openssl 1024 in fips mode
1 parent 2f10cf3 commit c09e3c2

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

test/test_rsa.c

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1024,8 +1024,8 @@ int test_rsa_pkey_invalid_key_size(void *data) {
10241024
RSA *rsa = NULL;
10251025
#endif
10261026
#if defined(HAVE_FIPS) || defined(HAVE_FIPS_VERSION)
1027-
const unsigned char *p = rsa_key_der_1024;
1028-
size_t pSize = sizeof(rsa_key_der_1024);
1027+
const unsigned char *p = rsa_key_der_2048;
1028+
size_t pSize = sizeof(rsa_key_der_2048);
10291029
#else
10301030
const unsigned char *p = rsa_key_der_256;
10311031
size_t pSize = sizeof(rsa_key_der_256);
@@ -1036,7 +1036,7 @@ int test_rsa_pkey_invalid_key_size(void *data) {
10361036

10371037
(void)data;
10381038
(void)rsa_key_der_256;
1039-
(void)rsa_key_der_1024;
1039+
(void)rsa_key_der_2048;
10401040

10411041
pkey = d2i_PrivateKey(EVP_PKEY_RSA, NULL, &p, pSize);
10421042
err = pkey == NULL;
@@ -1054,10 +1054,10 @@ int test_rsa_pkey_invalid_key_size(void *data) {
10541054
}
10551055

10561056
#if defined(HAVE_FIPS) || defined(HAVE_FIPS_VERSION)
1057-
/* In FIPS mode, 1024-bit keys are allowed, so skip the invalid key size check */
1057+
/* In FIPS mode, use 2048-bit keys which are allowed */
10581058
if (err == 0) {
10591059
PRINT_MSG("Check that signing with OpenSSL and verifying with "
1060-
"wolfProvider using a 1024-bit key works.");
1060+
"wolfProvider using a 2048-bit key works.");
10611061
err = test_pkey_sign(pkey, osslLibCtx, buf, sizeof(buf), rsaSig,
10621062
&rsaSigLen, 0, NULL, NULL);
10631063
}

0 commit comments

Comments
 (0)