Skip to content

Commit 4c3c004

Browse files
committed
tests: Use more complex pins to make Kryoptic FIPS module happy
Signed-off-by: Jakub Jelen <[email protected]>
1 parent 7617aa4 commit 4c3c004

File tree

2 files changed

+3
-3
lines changed

2 files changed

+3
-3
lines changed

cryptoki/src/session/object_management.rs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -410,7 +410,7 @@ impl Session {
410410
/// let slot = pkcs11.get_slots_with_token().unwrap().remove(0);
411411
///
412412
/// let session = pkcs11.open_ro_session(slot).unwrap();
413-
/// session.login(UserType::User, Some(&AuthPin::new("fedcba".into())));
413+
/// session.login(UserType::User, Some(&AuthPin::new("fedcba123456".into())));
414414
///
415415
/// let empty_attrib= vec![];
416416
/// if let Some(object) = session.find_objects(&empty_attrib).unwrap().first() {

cryptoki/tests/common/mod.rs

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,9 +7,9 @@ use cryptoki::types::AuthPin;
77
use std::env;
88

99
// The default user pin
10-
pub static USER_PIN: &str = "fedcba";
10+
pub static USER_PIN: &str = "fedcba123456";
1111
// The default SO pin
12-
pub static SO_PIN: &str = "abcdef";
12+
pub static SO_PIN: &str = "abcdef654321";
1313

1414
fn get_pkcs11_path() -> String {
1515
env::var("TEST_PKCS11_MODULE")

0 commit comments

Comments
 (0)