diff options
author | Kazuki Yamaguchi <k@rhe.jp> | 2020-08-04 23:14:44 +0900 |
---|---|---|
committer | Kazuki Yamaguchi <k@rhe.jp> | 2021-04-04 23:23:13 +0900 |
commit | c055938f4ba6da868f2e61c8935c197bae7c295f (patch) | |
tree | 22519a518563d48d1f49a3f41b0d0500e34f4bdd /test/openssl/test_asn1.rb | |
parent | 6e457554b2712131f1944e1162f4128d7f8d468d (diff) | |
download | ruby-openssl-c055938f4ba6da868f2e61c8935c197bae7c295f.tar.gz |
require OpenSSL >= 1.0.2 and LibreSSL >= 3.1
Clean up old version guards in preparation for the upcoming OpenSSL 3.0
support.
OpenSSL 1.0.1 reached its EOL on 2016-12-31. At that time, we decided
to keep 1.0.1 support because many major Linux distributions were still
shipped with 1.0.1. Now, nearly 4 years later, most Linux distributions
are reaching their EOL and it should be safe to assume nobody uses them
anymore. Major ones that were using 1.0.1:
- Ubuntu 14.04 is EOL since 2019-04-30
- RHEL 6 will reach EOL on 2020-11-30
LibreSSL 3.0 and older versions are no longer supported by the LibreSSL
team as of October 2020.
Note that OpenSSL 1.0.2 also reached EOL on 2019-12-31 and 1.1.0 also
did on 2018-08-31.
Diffstat (limited to 'test/openssl/test_asn1.rb')
-rw-r--r-- | test/openssl/test_asn1.rb | 7 |
1 files changed, 3 insertions, 4 deletions
diff --git a/test/openssl/test_asn1.rb b/test/openssl/test_asn1.rb index af069cad..6bd84780 100644 --- a/test/openssl/test_asn1.rb +++ b/test/openssl/test_asn1.rb @@ -265,10 +265,9 @@ class OpenSSL::TestASN1 < OpenSSL::TestCase assert_raise(OpenSSL::ASN1::ASN1Error) { OpenSSL::ASN1.decode(B(%w{ 03 00 })) } - # OpenSSL < OpenSSL_1_0_1k and LibreSSL ignore the error - # assert_raise(OpenSSL::ASN1::ASN1Error) { - # OpenSSL::ASN1.decode(B(%w{ 03 03 08 FF 00 })) - # } + assert_raise(OpenSSL::ASN1::ASN1Error) { + OpenSSL::ASN1.decode(B(%w{ 03 03 08 FF 00 })) + } # OpenSSL does not seem to prohibit this, though X.690 8.6.2.3 (15/08) does # assert_raise(OpenSSL::ASN1::ASN1Error) { # OpenSSL::ASN1.decode(B(%w{ 03 01 04 })) |