From bb65c213bb022c59c48dd3ea72569e0c0fd6e1b2 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Tom=C3=A1s=20Gonz=C3=A1lez?= Date: Thu, 31 Aug 2023 11:14:17 +0100 Subject: [PATCH] Make wrong_permitted_algorithm test use a non-deprecated Hash MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Currently, the wrong_permitted_algorithm test checks if, creating a key that uses sha1, that key is rejected when calling sign_with_rsa_sha256. However, as sha1 is deprecated, there is currently an error when creating the key for the test. * Change the key generation to use sha512 instead. Signed-off-by: Tomás González --- e2e_tests/tests/per_provider/normal_tests/key_attributes.rs | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/e2e_tests/tests/per_provider/normal_tests/key_attributes.rs b/e2e_tests/tests/per_provider/normal_tests/key_attributes.rs index 252d827d..508eba2d 100644 --- a/e2e_tests/tests/per_provider/normal_tests/key_attributes.rs +++ b/e2e_tests/tests/per_provider/normal_tests/key_attributes.rs @@ -132,10 +132,9 @@ fn wrong_permitted_algorithm() { } let key_type = Type::RsaKeyPair; // Do not permit RSA PKCS 1v15 signing algorithm with SHA-256. - #[allow(deprecated)] let permitted_algorithm = Algorithm::AsymmetricSignature(AsymmetricSignature::RsaPkcs1v15Sign { - hash_alg: Hash::Sha1.into(), + hash_alg: Hash::Sha512.into(), }); let mut usage_flags: UsageFlags = Default::default(); let _ = usage_flags.set_sign_hash();