mirror of
https://github.com/ruby/ruby.git
synced 2025-08-27 15:06:10 +02:00
![]() This commit fixes the following failure on OpenSSL master FIPS case. ``` 1) Failure: test_ed25519_not_approved_on_fips(OpenSSL::TestPKey): OpenSSL::PKey::PKeyError expected but nothing was raised. /home/runner/work/openssl/openssl/vendor/bundle/ruby/3.0.0/gems/test-unit-ruby-core-1.0.6/lib/core_assertions.rb:462:in `assert_raise' /home/runner/work/openssl/openssl/test/openssl/test_pkey.rb:174:in `test_ed25519_not_approved_on_fips' 171: MC4CAQAwBQYDK2VwBCIEIEzNCJso/5banbbDRuwRTg9bijGfNaumJNqM9u1PuKb7 172: -----END PRIVATE KEY----- 173: EOF => 174: assert_raise(OpenSSL::PKey::PKeyError) do 175: OpenSSL::PKey.read(priv_pem) 176: end 177: end ``` Because FIPS compliance is a continually moving target. According to the [1], FIPS 140-3 *currently* allows ED25519. The ED25519 is allowed again with the latest OpenSSL FIPS by the commit [2], while it is not allowed in OpenSSL stable version 3.x FIPS. Remove this test because we want to keep our tests stable. [1] https://github.com/openssl/openssl/discussions/22054 [2] |
||
---|---|---|
.. | ||
fixtures/pkey | ||
test_asn1.rb | ||
test_bn.rb | ||
test_buffering.rb | ||
test_cipher.rb | ||
test_config.rb | ||
test_digest.rb | ||
test_engine.rb | ||
test_fips.rb | ||
test_hmac.rb | ||
test_kdf.rb | ||
test_ns_spki.rb | ||
test_ocsp.rb | ||
test_ossl.rb | ||
test_pair.rb | ||
test_pkcs7.rb | ||
test_pkcs12.rb | ||
test_pkey.rb | ||
test_pkey_dh.rb | ||
test_pkey_dsa.rb | ||
test_pkey_ec.rb | ||
test_pkey_rsa.rb | ||
test_provider.rb | ||
test_random.rb | ||
test_ssl.rb | ||
test_ssl_session.rb | ||
test_ts.rb | ||
test_x509attr.rb | ||
test_x509cert.rb | ||
test_x509crl.rb | ||
test_x509ext.rb | ||
test_x509name.rb | ||
test_x509req.rb | ||
test_x509store.rb | ||
ut_eof.rb | ||
utils.rb |