@@ -543,7 +543,7 @@ def test_encode_decode_with_ecdsa_sha512(self, jws, payload):
543543 with open ('tests/keys/testkey_ec' , 'r' ) as ec_priv_file :
544544 priv_eckey = load_pem_private_key (force_bytes (ec_priv_file .read ()),
545545 password = None , backend = default_backend ())
546- jws_message = jws .encode (payload , priv_eckey , algorithm = 'ES512 ' )
546+ jws_message = jws .encode (payload , priv_eckey , algorithm = 'ES521 ' )
547547
548548 with open ('tests/keys/testkey_ec.pub' , 'r' ) as ec_pub_file :
549549 pub_eckey = load_pem_public_key (force_bytes (ec_pub_file .read ()), backend = default_backend ())
@@ -552,7 +552,7 @@ def test_encode_decode_with_ecdsa_sha512(self, jws, payload):
552552 # string-formatted key
553553 with open ('tests/keys/testkey_ec' , 'r' ) as ec_priv_file :
554554 priv_eckey = ec_priv_file .read ()
555- jws_message = jws .encode (payload , priv_eckey , algorithm = 'ES512 ' )
555+ jws_message = jws .encode (payload , priv_eckey , algorithm = 'ES521 ' )
556556
557557 with open ('tests/keys/testkey_ec.pub' , 'r' ) as ec_pub_file :
558558 pub_eckey = ec_pub_file .read ()
@@ -565,11 +565,11 @@ def test_ecdsa_related_algorithms(self, jws):
565565 if has_crypto :
566566 assert 'ES256' in jws_algorithms
567567 assert 'ES384' in jws_algorithms
568- assert 'ES512 ' in jws_algorithms
568+ assert 'ES521 ' in jws_algorithms
569569 else :
570570 assert 'ES256' not in jws_algorithms
571571 assert 'ES384' not in jws_algorithms
572- assert 'ES512 ' not in jws_algorithms
572+ assert 'ES521 ' not in jws_algorithms
573573
574574 def test_skip_check_signature (self , jws ):
575575 token = ("eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9"
0 commit comments