lib/async/rspec/ssl.rb in async-rspec-1.15.0 vs lib/async/rspec/ssl.rb in async-rspec-1.15.1
- old
+ new
@@ -39,11 +39,11 @@
end
end
::RSpec.shared_context SSL::CertificateAuthority do
# This key size is generally considered insecure, but it's fine for testing.
- let(:certificate_authority_key) {OpenSSL::PKey::RSA.new(1024)}
+ let(:certificate_authority_key) {OpenSSL::PKey::RSA.new(2048)}
let(:certificate_authority_name) {OpenSSL::X509::Name.parse("O=TestCA/CN=localhost")}
# The certificate authority is used for signing and validating the certificate which is used for communciation:
let(:certificate_authority) do
certificate = OpenSSL::X509::Certificate.new
@@ -81,11 +81,11 @@
::RSpec.shared_context SSL::ValidCertificate do
include_context SSL::CertificateAuthority
# The private key to use on the server side:
- let(:key) {OpenSSL::PKey::RSA.new(1024)}
+ let(:key) {OpenSSL::PKey::RSA.new(2048)}
let(:certificate_name) {OpenSSL::X509::Name.parse("O=Test/CN=localhost")}
# The certificate used for actual communication:
let(:certificate) do
certificate = OpenSSL::X509::Certificate.new
@@ -113,11 +113,11 @@
::RSpec.shared_context SSL::HostCertificates do
include_context SSL::CertificateAuthority
let(:keys) do
Hash[
- hosts.collect{|name| [name, OpenSSL::PKey::RSA.new(1024)]}
+ hosts.collect{|name| [name, OpenSSL::PKey::RSA.new(2048)]}
]
end
# The certificate used for actual communication:
let(:certificates) do
@@ -175,11 +175,11 @@
::RSpec.shared_context SSL::InvalidCertificate do
include_context SSL::CertificateAuthority
# The private key to use on the server side:
- let(:key) {OpenSSL::PKey::RSA.new(1024)}
- let(:invalid_key) {OpenSSL::PKey::RSA.new(1024)}
+ let(:key) {OpenSSL::PKey::RSA.new(2048)}
+ let(:invalid_key) {OpenSSL::PKey::RSA.new(2048)}
let(:certificate_name) {OpenSSL::X509::Name.parse("O=Test/CN=localhost")}
# The certificate used for actual communication:
let(:certificate) do
certificate = OpenSSL::X509::Certificate.new