These have been discouraged for a long time and there are now more and
more crypto libraries that have them disabled by default. However, for
some we only can detect this at runtime, in particular in FIPS mode, so
tests would fail as the plugins would still announce them. So instead
we just remove the schemes from these tests for now (at least for RSA,
removing signatures with SHA-1 completely isn't an option yet as that's
still the default with some clients).
Closes strongswan/strongswan#2523
int key_size;
signature_scheme_t scheme;
} schemes[] = {
- { 0, SIGN_ECDSA_WITH_SHA1_DER },
{ 0, SIGN_ECDSA_WITH_SHA256_DER },
{ 0, SIGN_ECDSA_WITH_SHA384_DER },
{ 0, SIGN_ECDSA_WITH_SHA512_DER },
*/
static signature_scheme_t schemes[] = {
SIGN_RSA_EMSA_PKCS1_NULL,
- SIGN_RSA_EMSA_PKCS1_MD5,
- SIGN_RSA_EMSA_PKCS1_SHA1,
SIGN_RSA_EMSA_PKCS1_SHA2_224,
SIGN_RSA_EMSA_PKCS1_SHA2_256,
SIGN_RSA_EMSA_PKCS1_SHA2_384,