Skip to content
Snippets Groups Projects
Unverified Commit 1e3cee97 authored by Ritesh Raj Sarraf's avatar Ritesh Raj Sarraf
Browse files

Merge remote-tracking branch 'origin/apertis/v2023dev3' into...

Merge remote-tracking branch 'origin/apertis/v2023dev3' into proposed-updates/debian/bullseye-security/edae0de8

* origin/apertis/v2023dev3:
  Release openssl version 1.1.1n-0+deb11u1+apertis1
  Disable failing test test/recipes/80-test_ssl_new.t
  Refresh the automatically detected licensing information
  Release openssl version 1.1.1n-0+deb11u1+apertis0
  Release openssl version 1.1.1k-1+deb11u2+apertis0
  Release openssl version 1.1.1k-1+apertis0
  Refresh the automatically detected licensing information
  Release openssl version 1.1.1j-1apertis1
  debian/apertis/gitlab-ci.yml: Drop since we use an external definition
  Manually merge the d/p/series file
  Releasing apertis version 1.1.1d+fromdebian-0+deb10u4.
  Import Debian changes 1.1.1d-0+deb10u4
  copyright: Add licensing metadata
  Release openssl version 1.1.1d+fromdebian-0+deb10u3
  debian/apertis/component: Set to target
  Import Apertis version 1.1.1a-1
parents caa93e2a edae0de8
Branches apertis/v2024dev3
No related tags found
3 merge requests!50Merge changes from apertis/v2022-updates into apertis/v2022,!46Merge updates from release v2023dev3,!45Update from debian/bullseye-security for apertis/v2023dev3
target
This diff is collapsed.
"*":
license: OpenSSL
crypto/camellia/asm/cmll-x86_64.pl:
override-license: OpenSSL OR GPL-2+ OR LGPL-2.1+ OR MPL-1.1 OR BSD-2-Clause
crypto/camellia/asm/cmll-x86.pl:
override-license: OpenSSL OR GPL-2+ OR LGPL-2.1+ OR MPL-1.1 OR BSD-2-Clause
...@@ -11,12 +11,34 @@ openssl (1.1.1n-0+deb11u2) bullseye-security; urgency=medium ...@@ -11,12 +11,34 @@ openssl (1.1.1n-0+deb11u2) bullseye-security; urgency=medium
-- Sebastian Andrzej Siewior <sebastian@breakpoint.cc> Tue, 10 May 2022 20:37:36 +0200 -- Sebastian Andrzej Siewior <sebastian@breakpoint.cc> Tue, 10 May 2022 20:37:36 +0200
openssl (1.1.1n-0+deb11u1+apertis1) apertis; urgency=medium
[ Apertis CI robot ]
* Refresh the automatically detected licensing information
[ Ritesh Raj Sarraf ]
* Disable failing test test/recipes/80-test_ssl_new.t
-- Ritesh Raj Sarraf <ritesh.sarraf@collabora.com> Wed, 22 Jun 2022 14:32:11 +0530
openssl (1.1.1n-0+deb11u1+apertis0) apertis; urgency=medium
* Sync from debian/bullseye.
-- Apertis CI <devel@lists.apertis.org> Mon, 28 Mar 2022 22:30:51 +0000
openssl (1.1.1n-0+deb11u1) bullseye; urgency=medium openssl (1.1.1n-0+deb11u1) bullseye; urgency=medium
* New upstream version. * New upstream version.
-- Sebastian Andrzej Siewior <sebastian@breakpoint.cc> Fri, 18 Mar 2022 19:25:07 +0100 -- Sebastian Andrzej Siewior <sebastian@breakpoint.cc> Fri, 18 Mar 2022 19:25:07 +0100
openssl (1.1.1k-1+deb11u2+apertis0) apertis; urgency=medium
* Sync from debian/bullseye-security.
-- Apertis CI <devel@lists.apertis.org> Mon, 28 Mar 2022 14:53:52 +0000
openssl (1.1.1k-1+deb11u2) bullseye-security; urgency=medium openssl (1.1.1k-1+deb11u2) bullseye-security; urgency=medium
* CVE-2022-0778 (Infinite loop in BN_mod_sqrt() reachable when parsing * CVE-2022-0778 (Infinite loop in BN_mod_sqrt() reachable when parsing
...@@ -26,6 +48,12 @@ openssl (1.1.1k-1+deb11u2) bullseye-security; urgency=medium ...@@ -26,6 +48,12 @@ openssl (1.1.1k-1+deb11u2) bullseye-security; urgency=medium
-- Sebastian Andrzej Siewior <sebastian@breakpoint.cc> Mon, 14 Mar 2022 19:51:01 +0100 -- Sebastian Andrzej Siewior <sebastian@breakpoint.cc> Mon, 14 Mar 2022 19:51:01 +0100
openssl (1.1.1k-1+deb11u1+apertis0) apertis; urgency=medium
* Sync from debian/bullseye-security.
-- Apertis CI <devel@lists.apertis.org> Tue, 24 Aug 2021 15:45:29 +0000
openssl (1.1.1k-1+deb11u1) bullseye-security; urgency=medium openssl (1.1.1k-1+deb11u1) bullseye-security; urgency=medium
* CVE-2021-3711 (SM2 Decryption Buffer Overflow). * CVE-2021-3711 (SM2 Decryption Buffer Overflow).
...@@ -33,6 +61,13 @@ openssl (1.1.1k-1+deb11u1) bullseye-security; urgency=medium ...@@ -33,6 +61,13 @@ openssl (1.1.1k-1+deb11u1) bullseye-security; urgency=medium
-- Sebastian Andrzej Siewior <sebastian@breakpoint.cc> Tue, 24 Aug 2021 10:28:12 +0200 -- Sebastian Andrzej Siewior <sebastian@breakpoint.cc> Tue, 24 Aug 2021 10:28:12 +0200
openssl (1.1.1k-1+apertis0) apertis; urgency=medium
* Sync from debian/bullseye.
* Refresh the automatically detected licensing information
-- Emanuele Aina <emanuele.aina@collabora.com> Tue, 15 Jun 2021 10:27:53 +0000
openssl (1.1.1k-1) unstable; urgency=medium openssl (1.1.1k-1) unstable; urgency=medium
* New upstream version. * New upstream version.
...@@ -41,6 +76,18 @@ openssl (1.1.1k-1) unstable; urgency=medium ...@@ -41,6 +76,18 @@ openssl (1.1.1k-1) unstable; urgency=medium
-- Sebastian Andrzej Siewior <sebastian@breakpoint.cc> Thu, 25 Mar 2021 21:49:34 +0100 -- Sebastian Andrzej Siewior <sebastian@breakpoint.cc> Thu, 25 Mar 2021 21:49:34 +0100
openssl (1.1.1j-1apertis1) apertis; urgency=medium
[ Ritesh Raj Sarraf ]
* Sync updates from Debian Bullseye
* Manually merge d/patches/series file as it diverged with previous merges
from buster-security
[ Emanuele Aina]
* debian/apertis/gitlab-ci.yml: Drop since we use an external definition
-- Ritesh Raj Sarraf <ritesh.sarraf@collabora.com> Thu, 18 Mar 2021 21:09:25 +0530
openssl (1.1.1j-1) unstable; urgency=medium openssl (1.1.1j-1) unstable; urgency=medium
* New upstream version. * New upstream version.
...@@ -106,6 +153,22 @@ openssl (1.1.1e-1) unstable; urgency=medium ...@@ -106,6 +153,22 @@ openssl (1.1.1e-1) unstable; urgency=medium
-- Sebastian Andrzej Siewior <sebastian@breakpoint.cc> Wed, 18 Mar 2020 20:59:39 +0100 -- Sebastian Andrzej Siewior <sebastian@breakpoint.cc> Wed, 18 Mar 2020 20:59:39 +0100
openssl (1.1.1d+fromdebian-0+deb10u4) apertis; urgency=medium
* Merge from buster-security. Remaining apertis changes:
- keep use the actual upstream 1.1.1d tarball that we imported in
previous update.
-- Andrew Lee (李健秋) <andrew.lee@collabora.co.uk> Thu, 10 Dec 2020 05:09:56 +0800
openssl (1.1.1d+fromdebian-0+deb10u3) apertis; urgency=medium
* Switch to the proper upstream orig tarball. The 1.1.1d tarball has been
regenerated by `git-buildpackage` using `git archive` due to an error in
the pipeline and does not match the actual upstream 1.1.1d tarball.
-- Emanuele Aina <emanuele.aina@collabora.com> Thu, 30 Apr 2020 14:40:35 +0200
openssl (1.1.1d-2) unstable; urgency=medium openssl (1.1.1d-2) unstable; urgency=medium
* Reenable AES-CBC-HMAC-SHA ciphers (Closes: #941987). * Reenable AES-CBC-HMAC-SHA ciphers (Closes: #941987).
...@@ -124,6 +187,12 @@ openssl (1.1.1d-1) unstable; urgency=medium ...@@ -124,6 +187,12 @@ openssl (1.1.1d-1) unstable; urgency=medium
-- Sebastian Andrzej Siewior <sebastian@breakpoint.cc> Sat, 14 Sep 2019 00:38:12 +0200 -- Sebastian Andrzej Siewior <sebastian@breakpoint.cc> Sat, 14 Sep 2019 00:38:12 +0200
openssl (1.1.1d-0+deb10u4) buster-security; urgency=medium
* CVE-2020-1971 (EDIPARTYNAME NULL pointer de-reference).
-- Sebastian Andrzej Siewior <sebastian@breakpoint.cc> Mon, 07 Dec 2020 21:44:45 +0100
openssl (1.1.1c-1) unstable; urgency=medium openssl (1.1.1c-1) unstable; urgency=medium
* New upstream version * New upstream version
......
From: Ritesh Raj Sarraf <ritesh.sarraf@collabora.com>
Date: Mon, 20 Jun 2022 15:28:31 +0530
Subject: Disable failing test test/recipes/80-test_ssl_new.t
The test/recipes/80-test_ssl_new.t test is reported failing to build in
the Apertis build environment.
Upon investigating further, it is also reported to be failing to build
in the Debian Reproducible Builds build environment.
To unblock on the Apertis side, this MR proposes to disable the failing
test.
Signed-off-by: Ritesh Raj Sarraf <ritesh.sarraf@collabora.com>
---
test/recipes/80-test_ssl_new.t | 160 -----------------------------------------
1 file changed, 160 deletions(-)
delete mode 100644 test/recipes/80-test_ssl_new.t
diff --git a/test/recipes/80-test_ssl_new.t b/test/recipes/80-test_ssl_new.t
deleted file mode 100644
index 81d8f59a70b4..000000000000
--- a/test/recipes/80-test_ssl_new.t
+++ /dev/null
@@ -1,160 +0,0 @@
-#! /usr/bin/env perl
-# Copyright 2015-2019 The OpenSSL Project Authors. All Rights Reserved.
-#
-# Licensed under the OpenSSL license (the "License"). You may not use
-# this file except in compliance with the License. You can obtain a copy
-# in the file LICENSE in the source distribution or at
-# https://www.openssl.org/source/license.html
-
-
-use strict;
-use warnings;
-
-use File::Basename;
-use File::Compare qw/compare_text/;
-use OpenSSL::Glob;
-use OpenSSL::Test qw/:DEFAULT srctop_dir srctop_file/;
-use OpenSSL::Test::Utils qw/disabled alldisabled available_protocols/;
-
-setup("test_ssl_new");
-
-$ENV{TEST_CERTS_DIR} = srctop_dir("test", "certs");
-$ENV{CTLOG_FILE} = srctop_file("test", "ct", "log_list.conf");
-
-my @conf_srcs = glob(srctop_file("test", "ssl-tests", "*.conf.in"));
-map { s/;.*// } @conf_srcs if $^O eq "VMS";
-my @conf_files = map { basename($_, ".in") } @conf_srcs;
-map { s/\^// } @conf_files if $^O eq "VMS";
-
-# We hard-code the number of tests to double-check that the globbing above
-# finds all files as expected.
-plan tests => 29; # = scalar @conf_srcs
-
-# Some test results depend on the configuration of enabled protocols. We only
-# verify generated sources in the default configuration.
-my $is_default_tls = (disabled("ssl3") && !disabled("tls1") &&
- !disabled("tls1_1") && !disabled("tls1_2") &&
- !disabled("tls1_3"));
-
-my $is_default_dtls = (!disabled("dtls1") && !disabled("dtls1_2"));
-
-my @all_pre_tls1_3 = ("ssl3", "tls1", "tls1_1", "tls1_2");
-my $no_tls = alldisabled(available_protocols("tls"));
-my $no_tls_below1_3 = $no_tls || (disabled("tls1_2") && !disabled("tls1_3"));
-my $no_pre_tls1_3 = alldisabled(@all_pre_tls1_3);
-my $no_dtls = alldisabled(available_protocols("dtls"));
-my $no_npn = disabled("nextprotoneg");
-my $no_ct = disabled("ct");
-my $no_ec = disabled("ec");
-my $no_dh = disabled("dh");
-my $no_dsa = disabled("dsa");
-my $no_ec2m = disabled("ec2m");
-my $no_ocsp = disabled("ocsp");
-
-# Add your test here if the test conf.in generates test cases and/or
-# expectations dynamically based on the OpenSSL compile-time config.
-my %conf_dependent_tests = (
- "02-protocol-version.conf" => !$is_default_tls,
- "04-client_auth.conf" => !$is_default_tls || !$is_default_dtls
- || !disabled("sctp"),
- "05-sni.conf" => disabled("tls1_1"),
- "07-dtls-protocol-version.conf" => !$is_default_dtls || !disabled("sctp"),
- "10-resumption.conf" => !$is_default_tls,
- "11-dtls_resumption.conf" => !$is_default_dtls || !disabled("sctp"),
- "16-dtls-certstatus.conf" => !$is_default_dtls || !disabled("sctp"),
- "17-renegotiate.conf" => disabled("tls1_2"),
- "18-dtls-renegotiate.conf" => disabled("dtls1_2") || !disabled("sctp"),
- "19-mac-then-encrypt.conf" => !$is_default_tls,
- "20-cert-select.conf" => !$is_default_tls || $no_dh || $no_dsa,
- "22-compression.conf" => !$is_default_tls,
- "25-cipher.conf" => disabled("poly1305") || disabled("chacha"),
- "27-ticket-appdata.conf" => !$is_default_tls,
- "28-seclevel.conf" => disabled("tls1_2") || $no_ec,
-);
-
-# Add your test here if it should be skipped for some compile-time
-# configurations. Default is $no_tls but some tests have different skip
-# conditions.
-my %skip = (
- "06-sni-ticket.conf" => $no_tls_below1_3,
- "07-dtls-protocol-version.conf" => $no_dtls,
- "08-npn.conf" => (disabled("tls1") && disabled("tls1_1")
- && disabled("tls1_2")) || $no_npn,
- "10-resumption.conf" => disabled("tls1_1") || disabled("tls1_2"),
- "11-dtls_resumption.conf" => disabled("dtls1") || disabled("dtls1_2"),
- "12-ct.conf" => $no_tls || $no_ct || $no_ec,
- # We could run some of these tests without TLS 1.2 if we had a per-test
- # disable instruction but that's a bizarre configuration not worth
- # special-casing for.
- # TODO(TLS 1.3): We should review this once we have TLS 1.3.
- "13-fragmentation.conf" => disabled("tls1_2"),
- "14-curves.conf" => disabled("tls1_2") || $no_ec || $no_ec2m,
- "15-certstatus.conf" => $no_tls || $no_ocsp,
- "16-dtls-certstatus.conf" => $no_dtls || $no_ocsp,
- "17-renegotiate.conf" => $no_tls_below1_3,
- "18-dtls-renegotiate.conf" => $no_dtls,
- "19-mac-then-encrypt.conf" => $no_pre_tls1_3,
- "20-cert-select.conf" => disabled("tls1_2") || $no_ec,
- "21-key-update.conf" => disabled("tls1_3"),
- "22-compression.conf" => disabled("zlib") || $no_tls,
- "23-srp.conf" => (disabled("tls1") && disabled ("tls1_1")
- && disabled("tls1_2")) || disabled("srp"),
- "24-padding.conf" => disabled("tls1_3"),
- "25-cipher.conf" => disabled("ec") || disabled("tls1_2"),
- "26-tls13_client_auth.conf" => disabled("tls1_3"),
- "29-dtls-sctp-label-bug.conf" => disabled("sctp") || disabled("sock"),
-);
-
-foreach my $conf (@conf_files) {
- subtest "Test configuration $conf" => sub {
- test_conf($conf,
- $conf_dependent_tests{$conf} || $^O eq "VMS" ? 0 : 1,
- defined($skip{$conf}) ? $skip{$conf} : $no_tls);
- }
-}
-
-sub test_conf {
- plan tests => 3;
-
- my ($conf, $check_source, $skip) = @_;
-
- my $conf_file = srctop_file("test", "ssl-tests", $conf);
- my $tmp_file = "${conf}.$$.tmp";
- my $run_test = 1;
-
- SKIP: {
- # "Test" 1. Generate the source.
- my $input_file = $conf_file . ".in";
-
- skip 'failure', 2 unless
- ok(run(perltest(["generate_ssl_tests.pl", $input_file],
- interpreter_args => [ "-I", srctop_dir("util", "perl")],
- stdout => $tmp_file)),
- "Getting output from generate_ssl_tests.pl.");
-
- SKIP: {
- # Test 2. Compare against existing output in test/ssl_tests.conf.
- skip "Skipping generated source test for $conf", 1
- if !$check_source;
-
- $run_test = is(cmp_text($tmp_file, $conf_file), 0,
- "Comparing generated sources.");
- }
-
- # Test 3. Run the test.
- skip "No tests available; skipping tests", 1 if $skip;
- skip "Stale sources; skipping tests", 1 if !$run_test;
-
- ok(run(test(["ssl_test", $tmp_file])), "running ssl_test $conf");
- }
-
- unlink glob $tmp_file;
-}
-
-sub cmp_text {
- return compare_text(@_, sub {
- $_[0] =~ s/\R//g;
- $_[1] =~ s/\R//g;
- return $_[0] ne $_[1];
- });
-}
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment