lib/async/rspec/ssl.rb in async-rspec-1.15.0 vs lib/async/rspec/ssl.rb in async-rspec-1.15.1

- old
+ new

@@ -39,11 +39,11 @@ end end ::RSpec.shared_context SSL::CertificateAuthority do # This key size is generally considered insecure, but it's fine for testing. - let(:certificate_authority_key) {OpenSSL::PKey::RSA.new(1024)} + let(:certificate_authority_key) {OpenSSL::PKey::RSA.new(2048)} let(:certificate_authority_name) {OpenSSL::X509::Name.parse("O=TestCA/CN=localhost")} # The certificate authority is used for signing and validating the certificate which is used for communciation: let(:certificate_authority) do certificate = OpenSSL::X509::Certificate.new @@ -81,11 +81,11 @@ ::RSpec.shared_context SSL::ValidCertificate do include_context SSL::CertificateAuthority # The private key to use on the server side: - let(:key) {OpenSSL::PKey::RSA.new(1024)} + let(:key) {OpenSSL::PKey::RSA.new(2048)} let(:certificate_name) {OpenSSL::X509::Name.parse("O=Test/CN=localhost")} # The certificate used for actual communication: let(:certificate) do certificate = OpenSSL::X509::Certificate.new @@ -113,11 +113,11 @@ ::RSpec.shared_context SSL::HostCertificates do include_context SSL::CertificateAuthority let(:keys) do Hash[ - hosts.collect{|name| [name, OpenSSL::PKey::RSA.new(1024)]} + hosts.collect{|name| [name, OpenSSL::PKey::RSA.new(2048)]} ] end # The certificate used for actual communication: let(:certificates) do @@ -175,11 +175,11 @@ ::RSpec.shared_context SSL::InvalidCertificate do include_context SSL::CertificateAuthority # The private key to use on the server side: - let(:key) {OpenSSL::PKey::RSA.new(1024)} - let(:invalid_key) {OpenSSL::PKey::RSA.new(1024)} + let(:key) {OpenSSL::PKey::RSA.new(2048)} + let(:invalid_key) {OpenSSL::PKey::RSA.new(2048)} let(:certificate_name) {OpenSSL::X509::Name.parse("O=Test/CN=localhost")} # The certificate used for actual communication: let(:certificate) do certificate = OpenSSL::X509::Certificate.new