comparison mail_ssl.t @ 1974:b5036a0f9ae0

Tests: improved compatibility when using recent "openssl" app. Starting with OpenSSL 3.0, "openssl genrsa" generates encrypted keys in PKCS#8 format instead of previously used PKCS#1 format. Further, since OpenSSL 1.1.0 such keys are using PBKDF2 hmacWithSHA256. Such keys are not supported by old SSL libraries, notably by OpenSSL before 1.0.0 (OpenSSL 0.9.8 only supports hmacWithSHA1) and by BoringSSL before May 21, 2019 (support for hmacWithSHA256 was added in 302a4dee6c), and trying to load such keys into nginx compiled with an old SSL library results in "unsupported prf" errors. To facilitate testing with old SSL libraries, keys are now generated with "openssl genrsa -traditional" if the flag is available.
author Maxim Dounin <mdounin@mdounin.ru>
date Mon, 06 May 2024 00:04:26 +0300
parents 2a0a6035a1af
children
comparison
equal deleted inserted replaced
1973:94e0390dc64f 1974:b5036a0f9ae0
113 distinguished_name = req_distinguished_name 113 distinguished_name = req_distinguished_name
114 [ req_distinguished_name ] 114 [ req_distinguished_name ]
115 EOF 115 EOF
116 116
117 my $d = $t->testdir(); 117 my $d = $t->testdir();
118 my $tr = `openssl genrsa -help 2>&1` =~ /-traditional/ ? '-traditional' : '';
118 119
119 foreach my $name ('localhost', 'inherits') { 120 foreach my $name ('localhost', 'inherits') {
120 system("openssl genrsa -out $d/$name.key -passout pass:localhost " 121 system("openssl genrsa -out $d/$name.key -passout pass:localhost "
121 . "-aes128 2048 >>$d/openssl.out 2>&1") == 0 122 . "-aes128 $tr 2048 >>$d/openssl.out 2>&1") == 0
122 or die "Can't create private key: $!\n"; 123 or die "Can't create private key: $!\n";
123 system('openssl req -x509 -new ' 124 system('openssl req -x509 -new '
124 . "-config $d/openssl.conf -subj /CN=$name/ " 125 . "-config $d/openssl.conf -subj /CN=$name/ "
125 . "-out $d/$name.crt " 126 . "-out $d/$name.crt "
126 . "-key $d/$name.key -passin pass:localhost" 127 . "-key $d/$name.key -passin pass:localhost"