@@ -6,7 +6,10 @@ use parsec_client::core::basic_client::BasicClient;
66use  parsec_client:: core:: interface:: operations:: psa_algorithm:: { AsymmetricSignature ,  Hash } ; 
77use  parsec_openssl_provider:: parsec_openssl2:: ossl_param; 
88use  parsec_openssl_provider:: parsec_openssl2:: { openssl_returns_1,  Openssl2Error } ; 
9- use  parsec_openssl_provider:: PARSEC_PROVIDER_KEY_NAME ; 
9+ use  parsec_openssl_provider:: { 
10+     PARSEC_PROVIDER_DFLT_PROPERTIES ,  PARSEC_PROVIDER_ECDSA_NAME ,  PARSEC_PROVIDER_KEY_NAME , 
11+     PARSEC_PROVIDER_RSA_NAME , 
12+ } ; 
1013use  sha2:: { Digest ,  Sha256 } ; 
1114
1215// Signs a digest using Parsec Provider and verifies the signature using the 
@@ -37,7 +40,7 @@ fn sign_verify(
3740        let  evp_ctx:  * mut  EVP_PKEY_CTX  = EVP_PKEY_CTX_new_from_pkey ( 
3841            lib_ctx. as_ptr ( )  as  * mut  ossl_lib_ctx_st , 
3942            parsec_pkey, 
40-             PARSEC_PROVIDER_PROPERTY . as_ptr ( )  as  * const  :: std:: os:: raw:: c_char , 
43+             PARSEC_PROVIDER_DFLT_PROPERTIES . as_ptr ( )  as  * const  :: std:: os:: raw:: c_char , 
4144        ) ; 
4245
4346        let  mut  sign_len = signature. len ( ) ; 
@@ -76,7 +79,12 @@ fn test_signing_ecdsa() {
7679        hash_alg :  Hash :: Sha256 . into ( ) , 
7780    } ; 
7881
79-     let  _ = sign_verify ( & key_name,  & mut  signature,  sign_alg,  PARSEC_PROVIDER_ECDSA ) ; 
82+     let  _ = sign_verify ( 
83+         & key_name, 
84+         & mut  signature, 
85+         sign_alg, 
86+         PARSEC_PROVIDER_ECDSA_NAME , 
87+     ) ; 
8088} 
8189
8290#[ ignore]  
@@ -91,5 +99,10 @@ fn test_signing_rsa() {
9199        hash_alg :  Hash :: Sha256 . into ( ) , 
92100    } ; 
93101
94-     let  _ = sign_verify ( & key_name,  & mut  signature,  sign_alg,  PARSEC_PROVIDER_RSA ) ; 
102+     let  _ = sign_verify ( 
103+         & key_name, 
104+         & mut  signature, 
105+         sign_alg, 
106+         PARSEC_PROVIDER_RSA_NAME , 
107+     ) ; 
95108} 
0 commit comments