summaryrefslogtreecommitdiffstats
path: root/openpgp/src/policy.rs
diff options
context:
space:
mode:
authorJustus Winter <justus@sequoia-pgp.org>2021-09-09 12:13:14 +0200
committerJustus Winter <justus@sequoia-pgp.org>2021-09-16 12:10:44 +0200
commit573cf50c4de0102e6b58b7e3f8db27edbb055068 (patch)
treeda4dab0beb3d40948dda54bcf0be2d5b1bddfbaf /openpgp/src/policy.rs
parentfa4caed6d93e4addaf9396940288c83cac636aad (diff)
openpgp: Avoid generating RSA keys longer than 2k in tests.
Diffstat (limited to 'openpgp/src/policy.rs')
-rw-r--r--openpgp/src/policy.rs10
1 files changed, 5 insertions, 5 deletions
diff --git a/openpgp/src/policy.rs b/openpgp/src/policy.rs
index f589641c..934f7c12 100644
--- a/openpgp/src/policy.rs
+++ b/openpgp/src/policy.rs
@@ -2268,7 +2268,7 @@ mod test {
// Generate a certificate with an RSA primary and two RSA
// subkeys.
let (cert,_) = CertBuilder::new()
- .set_cipher_suite(CipherSuite::RSA4k)
+ .set_cipher_suite(CipherSuite::RSA2k)
.add_signing_subkey()
.add_signing_subkey()
.generate()?;
@@ -2286,7 +2286,7 @@ mod test {
let pk = cert.primary_key().key().parts_as_secret()?;
let subkey: key::SecretSubkey
- = Key4::generate_rsa(4096)?.into();
+ = Key4::generate_rsa(2048)?.into();
let binding = signature::SignatureBuilder::new(SignatureType::SubkeyBinding)
.set_key_flags(KeyFlags::empty().set_transport_encryption())?
.sign_subkey_binding(&mut pk.clone().into_keypair()?,
@@ -2303,7 +2303,7 @@ mod test {
// Generate a certificate with an RSA primary, an RSA subkey,
// and an ECC subkey.
let (cert,_) = CertBuilder::new()
- .set_cipher_suite(CipherSuite::RSA4k)
+ .set_cipher_suite(CipherSuite::RSA2k)
.add_signing_subkey()
.generate()?;
@@ -2498,7 +2498,7 @@ mod test {
// subkey.
eprintln!("Trying RSA primary, ECC sub:");
let (cert,_) = CertBuilder::new()
- .set_cipher_suite(CipherSuite::RSA4k)
+ .set_cipher_suite(CipherSuite::RSA2k)
.add_subkey(KeyFlags::empty().set_signing(), None,
CipherSuite::Cv25519)
.generate()?;
@@ -2517,7 +2517,7 @@ mod test {
let (cert,_) = CertBuilder::new()
.set_cipher_suite(CipherSuite::Cv25519)
.add_subkey(KeyFlags::empty().set_signing(), None,
- CipherSuite::RSA4k)
+ CipherSuite::RSA2k)
.generate()?;
assert_eq!(cert.keys().with_policy(p, None).count(), 2);