diff options
author | Justus Winter <justus@sequoia-pgp.org> | 2021-09-09 12:13:14 +0200 |
---|---|---|
committer | Justus Winter <justus@sequoia-pgp.org> | 2021-09-16 12:10:44 +0200 |
commit | 573cf50c4de0102e6b58b7e3f8db27edbb055068 (patch) | |
tree | da4dab0beb3d40948dda54bcf0be2d5b1bddfbaf /openpgp/src/policy.rs | |
parent | fa4caed6d93e4addaf9396940288c83cac636aad (diff) |
openpgp: Avoid generating RSA keys longer than 2k in tests.
Diffstat (limited to 'openpgp/src/policy.rs')
-rw-r--r-- | openpgp/src/policy.rs | 10 |
1 files changed, 5 insertions, 5 deletions
diff --git a/openpgp/src/policy.rs b/openpgp/src/policy.rs index f589641c..934f7c12 100644 --- a/openpgp/src/policy.rs +++ b/openpgp/src/policy.rs @@ -2268,7 +2268,7 @@ mod test { // Generate a certificate with an RSA primary and two RSA // subkeys. let (cert,_) = CertBuilder::new() - .set_cipher_suite(CipherSuite::RSA4k) + .set_cipher_suite(CipherSuite::RSA2k) .add_signing_subkey() .add_signing_subkey() .generate()?; @@ -2286,7 +2286,7 @@ mod test { let pk = cert.primary_key().key().parts_as_secret()?; let subkey: key::SecretSubkey - = Key4::generate_rsa(4096)?.into(); + = Key4::generate_rsa(2048)?.into(); let binding = signature::SignatureBuilder::new(SignatureType::SubkeyBinding) .set_key_flags(KeyFlags::empty().set_transport_encryption())? .sign_subkey_binding(&mut pk.clone().into_keypair()?, @@ -2303,7 +2303,7 @@ mod test { // Generate a certificate with an RSA primary, an RSA subkey, // and an ECC subkey. let (cert,_) = CertBuilder::new() - .set_cipher_suite(CipherSuite::RSA4k) + .set_cipher_suite(CipherSuite::RSA2k) .add_signing_subkey() .generate()?; @@ -2498,7 +2498,7 @@ mod test { // subkey. eprintln!("Trying RSA primary, ECC sub:"); let (cert,_) = CertBuilder::new() - .set_cipher_suite(CipherSuite::RSA4k) + .set_cipher_suite(CipherSuite::RSA2k) .add_subkey(KeyFlags::empty().set_signing(), None, CipherSuite::Cv25519) .generate()?; @@ -2517,7 +2517,7 @@ mod test { let (cert,_) = CertBuilder::new() .set_cipher_suite(CipherSuite::Cv25519) .add_subkey(KeyFlags::empty().set_signing(), None, - CipherSuite::RSA4k) + CipherSuite::RSA2k) .generate()?; assert_eq!(cert.keys().with_policy(p, None).count(), 2); |