diff options
author | Kazuki Yamaguchi <k@rhe.jp> | 2020-08-04 23:14:44 +0900 |
---|---|---|
committer | Kazuki Yamaguchi <k@rhe.jp> | 2021-07-18 17:44:41 +0900 |
commit | cd002305f0db447b47b54b93e1ecb3c666d37c06 (patch) | |
tree | da28b58337630ed2d37ca6a22667ef0bb2ebf044 /test/openssl/test_ocsp.rb | |
parent | decce40da7ee5180a4093f794eacc1dc5fe8e814 (diff) |
[ruby/openssl] require OpenSSL >= 1.0.2 and LibreSSL >= 3.1
Clean up old version guards in preparation for the upcoming OpenSSL 3.0
support.
OpenSSL 1.0.1 reached its EOL on 2016-12-31. At that time, we decided
to keep 1.0.1 support because many major Linux distributions were still
shipped with 1.0.1. Now, nearly 4 years later, most Linux distributions
are reaching their EOL and it should be safe to assume nobody uses them
anymore. Major ones that were using 1.0.1:
- Ubuntu 14.04 is EOL since 2019-04-30
- RHEL 6 will reach EOL on 2020-11-30
LibreSSL 3.0 and older versions are no longer supported by the LibreSSL
team as of October 2020.
Note that OpenSSL 1.0.2 also reached EOL on 2019-12-31 and 1.1.0 also
did on 2018-08-31.
https://github.com/ruby/openssl/commit/c055938f4b
Diffstat (limited to 'test/openssl/test_ocsp.rb')
-rw-r--r-- | test/openssl/test_ocsp.rb | 9 |
1 files changed, 1 insertions, 8 deletions
diff --git a/test/openssl/test_ocsp.rb b/test/openssl/test_ocsp.rb index b3c4caf578..ef7321abd6 100644 --- a/test/openssl/test_ocsp.rb +++ b/test/openssl/test_ocsp.rb @@ -123,14 +123,7 @@ class OpenSSL::TestOCSP < OpenSSL::TestCase assert_equal true, req.verify([@cert], store, OpenSSL::OCSP::NOINTERN) ret = req.verify([@cert], store) - if ret || openssl?(1, 0, 2) - assert_equal true, ret - else - # RT2560; OCSP_request_verify() does not find signer cert from 'certs' when - # OCSP_NOINTERN is not specified. - # fixed by OpenSSL 1.0.1j, 1.0.2 - pend "RT2560: ocsp_req_find_signer" - end + assert_equal true, ret # not signed req = OpenSSL::OCSP::Request.new.add_certid(cid) |