# HG changeset patch # User Maxim Dounin # Date 1404352057 -14400 # Node ID 1ac74b5685037e505f45f6236dd7730754a2c2c9 # Parent ddc4b10113339237e1f4859f7c2e1b21e196512c Tests: unbreak ssl_password_file.t with upcoming OpenSSL 1.0.2. The 512-bit keys, as generated by default by "openssl genrsa" in older versions, are rejected by OpenSSL library built from master branch (and upcoming OpenSSL 1.0.2). This brokes the test if the "openssl" binary is old (e.g., system one), but nginx is compiled against new OpenSSL. Fix is to explicitly generate 2048 bit keys. This is also consistent to what we generate in other places. diff --git a/ssl_password_file.t b/ssl_password_file.t --- a/ssl_password_file.t +++ b/ssl_password_file.t @@ -96,7 +96,7 @@ my $d = $t->testdir(); mkfifo("$d/password_fifo", 0700); foreach my $name ('localhost', 'inherits') { - system("openssl genrsa -out $d/$name.key -passout pass:$name " + system("openssl genrsa -out $d/$name.key -passout pass:$name 2048 " . ">>$d/openssl.out 2>&1") == 0 or die "Can't create private key: $!\n"; system('openssl req -x509 -new '