From ffba096dc52dedcf851c6a48bbd07c0dda36b998 Mon Sep 17 00:00:00 2001 From: Thomas Woerner <twoerner@redhat.com> Date: Tue, 21 Jul 2020 12:40:02 +0200 Subject: [PATCH] tests/external-signed-ca-../external-ca.sh: Password too weak in FIPS mode The password that is used in the script to generate the CA and also sign the CSR is not strong enough in FIPS mode. In normal mode the password was ok, though. In FIPS mode the password needs to have at least one upper, lower, digit and a special char. --- tests/external-signed-ca-with-automatic-copy/external-ca.sh | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/tests/external-signed-ca-with-automatic-copy/external-ca.sh b/tests/external-signed-ca-with-automatic-copy/external-ca.sh index 9bf6f1cc..de5fcecc 100644 --- a/tests/external-signed-ca-with-automatic-copy/external-ca.sh +++ b/tests/external-signed-ca-with-automatic-copy/external-ca.sh @@ -8,7 +8,7 @@ if [ -z "$master" ]; then exit 0; fi -PASSWORD="SomeCApassword" +PASSWORD="SomeCApassword.123" DBDIR="${master}-nssdb" PWDFILE="$DBDIR/pwdfile.txt" NOISE="$DBDIR/noise.txt" -- GitLab