commit | 25e16b8a0f36fbfee8fcccd6926682f0958bcc8d | [log] [tgz] |
---|---|---|
author | Douglas Mendizábal <dmendiza@redhat.com> | Tue Jun 08 15:39:22 2021 -0500 |
committer | Douglas Mendizábal <dmendiza@redhat.com> | Tue Jun 08 15:39:22 2021 -0500 |
tree | 1d7c7d0e87b390285883bcabf23052896dda695f | |
parent | 2b2b95ac1550db8af6b8f2da8880381a13c23ca8 [diff] |
Don't use legacy exponent for RSA As stated in the cryptography.io documentation, "Almost everyone should use 65537" for the public_exponent in an RSA key. [1] This patch also uses a larger RSA key length for FIPS compatibility. [1] https://cryptography.io/en/latest/hazmat/primitives/asymmetric/rsa/#cryptography.hazmat.primitives.asymmetric.rsa.generate_private_key Change-Id: I9f0c030b172a544821aa42924e4401cd7ccc9956
diff --git a/barbican_tempest_plugin/tests/scenario/barbican_manager.py b/barbican_tempest_plugin/tests/scenario/barbican_manager.py index a39bb0f..f60c47c 100644 --- a/barbican_tempest_plugin/tests/scenario/barbican_manager.py +++ b/barbican_tempest_plugin/tests/scenario/barbican_manager.py
@@ -68,8 +68,8 @@ 'path in CONF.scenario.img_file config option.') self.img_file = os.path.join(CONF.scenario.img_dir, self.img_file) - self.private_key = rsa.generate_private_key(public_exponent=3, - key_size=1024, + self.private_key = rsa.generate_private_key(public_exponent=65537, + key_size=3072, backend=default_backend()) self.signing_certificate = self._create_self_signed_certificate( self.private_key,