From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on dcvr.yhbt.net X-Spam-Level: X-Spam-ASN: X-Spam-Status: No, score=-3.9 required=3.0 tests=ALL_TRUSTED,AWL,BAYES_00 shortcircuit=no autolearn=ham autolearn_force=no version=3.4.1 Received: from localhost (dcvr.yhbt.net [127.0.0.1]) by dcvr.yhbt.net (Postfix) with ESMTP id DA8A71F721 for ; Tue, 3 Jul 2018 11:02:46 +0000 (UTC) From: Eric Wong To: yahns-public@yhbt.net Subject: [PATCH 2/2] test/test_ssl: set SSLContext#security_level=0 Date: Tue, 3 Jul 2018 11:02:45 +0000 Message-Id: <20180703110245.24221-3-e@80x24.org> In-Reply-To: <20180703110245.24221-1-e@80x24.org> References: <20180703110245.24221-1-e@80x24.org> List-Id: This is apparently needed to pass tests with a newer version of OpenSSL found in Debian 9 --- test/test_ssl.rb | 2 ++ 1 file changed, 2 insertions(+) diff --git a/test/test_ssl.rb b/test/test_ssl.rb index 92be542..7909094 100644 --- a/test/test_ssl.rb +++ b/test/test_ssl.rb @@ -41,6 +41,7 @@ def teardown def ssl_client(host, port) ctx = OpenSSL::SSL::SSLContext.new ctx.ciphers = "ADH" + ctx.security_level = 0 s = TCPSocket.new(host, port) ssl = OpenSSL::SSL::SSLSocket.new(s, ctx) ssl.connect @@ -51,6 +52,7 @@ def ssl_client(host, port) def srv_ctx ctx = OpenSSL::SSL::SSLContext.new ctx.ciphers = "ADH" + ctx.security_level = 0 ctx.tmp_dh_callback = proc { TEST_KEY_DH1024 } ctx end -- EW