Change the default EC key to secp384r1
prime256v1 is okay for now, but secp384r1 is more future-proof (gives us
a couple more years) and in this case does not really have any
drawbacks.
Tested: Checked to see that a new secp384r1 key is generated on first
boot and the generate CSR redfish option works.
Change-Id: I334fc56db3dd55058a4c6780f8966bcc48d8f816
Signed-off-by: Vernon Mauery <vernon.mauery@linux.intel.com>
diff --git a/README.md b/README.md
index 93660ed..301fd29 100644
--- a/README.md
+++ b/README.md
@@ -27,7 +27,7 @@
When BMCWeb SSL support is enabled and a usable certificate is not
found, it will generate a self-sign a certificate before launching the
-server. The keys are generated by the `prime256v1` algorithm. The
+server. The keys are generated by the `secp384r1` algorithm. The
certificate
- is issued by `C=US, O=OpenBMC, CN=testhost`,
- is valid for 10 years,
diff --git a/include/ssl_key_handler.hpp b/include/ssl_key_handler.hpp
index fab31ea..0240712 100644
--- a/include/ssl_key_handler.hpp
+++ b/include/ssl_key_handler.hpp
@@ -255,7 +255,7 @@
{
EVP_PKEY *pKey = nullptr;
int eccgrp = 0;
- eccgrp = OBJ_txt2nid("prime256v1");
+ eccgrp = OBJ_txt2nid("secp384r1");
EC_KEY *myecc = EC_KEY_new_by_curve_name(eccgrp);
if (myecc != nullptr)
diff --git a/redfish-core/lib/certificate_service.hpp b/redfish-core/lib/certificate_service.hpp
index 6cb5b86..66ddab8 100644
--- a/redfish-core/lib/certificate_service.hpp
+++ b/redfish-core/lib/certificate_service.hpp
@@ -285,7 +285,7 @@
std::optional<std::string> optGivenName = "";
std::optional<std::string> optInitials = "";
std::optional<int64_t> optKeyBitLength = RSA_KEY_BIT_LENGTH;
- std::optional<std::string> optKeyCurveId = "prime256v1";
+ std::optional<std::string> optKeyCurveId = "secp384r1";
std::optional<std::string> optKeyPairAlgorithm = "EC";
std::optional<std::vector<std::string>> optKeyUsage =
std::vector<std::string>();