@@ -770,7 +770,7 @@ def x509_data():
770
770
"""
771
771
# Basic setup stuff to generate a certificate
772
772
pkey = PKey ()
773
- pkey .generate_key (TYPE_RSA , 512 )
773
+ pkey .generate_key (TYPE_RSA , 2048 )
774
774
req = X509Req ()
775
775
req .set_pubkey (pkey )
776
776
# Authority good you have.
@@ -1123,7 +1123,7 @@ def test_rsa_generation(self):
1123
1123
`PKey.generate_key` generates an RSA key when passed `TYPE_RSA` as a
1124
1124
type and a reasonable number of bits.
1125
1125
"""
1126
- bits = 512
1126
+ bits = 2048
1127
1127
key = PKey ()
1128
1128
key .generate_key (TYPE_RSA , bits )
1129
1129
assert key .type () == TYPE_RSA
@@ -1152,7 +1152,7 @@ def test_regeneration(self):
1152
1152
generate new keys.
1153
1153
"""
1154
1154
key = PKey ()
1155
- for type , bits in [(TYPE_RSA , 512 ), (TYPE_DSA , 576 )]:
1155
+ for type , bits in [(TYPE_RSA , 2048 ), (TYPE_DSA , 576 )]:
1156
1156
key .generate_key (type , bits )
1157
1157
assert key .type () == type
1158
1158
assert key .bits () == bits
@@ -1173,7 +1173,7 @@ def test_check_public_key(self):
1173
1173
"""
1174
1174
# A trick to get a public-only key
1175
1175
key = PKey ()
1176
- key .generate_key (TYPE_RSA , 512 )
1176
+ key .generate_key (TYPE_RSA , 2048 )
1177
1177
cert = X509 ()
1178
1178
cert .set_pubkey (key )
1179
1179
pub = cert .get_pubkey ()
@@ -1487,7 +1487,7 @@ def test_sign_with_public_key(self):
1487
1487
"""
1488
1488
request = self .signable ()
1489
1489
key = PKey ()
1490
- key .generate_key (TYPE_RSA , 512 )
1490
+ key .generate_key (TYPE_RSA , 2048 )
1491
1491
request .set_pubkey (key )
1492
1492
pub = request .get_pubkey ()
1493
1493
with pytest .raises (ValueError ):
@@ -1500,7 +1500,7 @@ def test_sign_with_unknown_digest(self):
1500
1500
"""
1501
1501
request = self .signable ()
1502
1502
key = PKey ()
1503
- key .generate_key (TYPE_RSA , 512 )
1503
+ key .generate_key (TYPE_RSA , 2048 )
1504
1504
with pytest .raises (ValueError ):
1505
1505
request .sign (key , BAD_DIGEST )
1506
1506
@@ -1512,7 +1512,7 @@ def test_sign(self):
1512
1512
"""
1513
1513
request = self .signable ()
1514
1514
key = PKey ()
1515
- key .generate_key (TYPE_RSA , 512 )
1515
+ key .generate_key (TYPE_RSA , 2048 )
1516
1516
request .set_pubkey (key )
1517
1517
request .sign (key , GOOD_DIGEST )
1518
1518
# If the type has a verify method, cover that too.
@@ -1521,7 +1521,7 @@ def test_sign(self):
1521
1521
assert request .verify (pub )
1522
1522
# Make another key that won't verify.
1523
1523
key = PKey ()
1524
- key .generate_key (TYPE_RSA , 512 )
1524
+ key .generate_key (TYPE_RSA , 2048 )
1525
1525
with pytest .raises (Error ):
1526
1526
request .verify (key )
1527
1527
@@ -2773,7 +2773,7 @@ def test_dump_privatekey_wrong_args(self):
2773
2773
argument but no `passphrase` argument.
2774
2774
"""
2775
2775
key = PKey ()
2776
- key .generate_key (TYPE_RSA , 512 )
2776
+ key .generate_key (TYPE_RSA , 2048 )
2777
2777
with pytest .raises (TypeError ):
2778
2778
dump_privatekey (FILETYPE_PEM , key , cipher = GOOD_CIPHER )
2779
2779
@@ -2797,7 +2797,7 @@ def test_dump_privatekey_unknown_cipher(self):
2797
2797
cipher name.
2798
2798
"""
2799
2799
key = PKey ()
2800
- key .generate_key (TYPE_RSA , 512 )
2800
+ key .generate_key (TYPE_RSA , 2048 )
2801
2801
with pytest .raises (ValueError ):
2802
2802
dump_privatekey (FILETYPE_PEM , key , BAD_CIPHER , "passphrase" )
2803
2803
@@ -2807,7 +2807,7 @@ def test_dump_privatekey_invalid_passphrase_type(self):
2807
2807
is neither a `str` nor a callable.
2808
2808
"""
2809
2809
key = PKey ()
2810
- key .generate_key (TYPE_RSA , 512 )
2810
+ key .generate_key (TYPE_RSA , 2048 )
2811
2811
with pytest .raises (TypeError ):
2812
2812
dump_privatekey (FILETYPE_PEM , key , GOOD_CIPHER , object ())
2813
2813
@@ -2817,7 +2817,7 @@ def test_dump_privatekey_invalid_filetype(self):
2817
2817
filetype.
2818
2818
"""
2819
2819
key = PKey ()
2820
- key .generate_key (TYPE_RSA , 512 )
2820
+ key .generate_key (TYPE_RSA , 2048 )
2821
2821
with pytest .raises (ValueError ):
2822
2822
dump_privatekey (100 , key )
2823
2823
0 commit comments