mirror of
https://github.com/ruby/ruby.git
synced 2022-11-09 12:17:21 -05:00
openssl: import v2.1.0.beta2
Import Ruby/OpenSSL 2.1.0.beta2. The full commit log since commit
e72d960db262 which was imported by r60013 can be found at:
e72d960db2
...v2.1.0.beta2
----------------------------------------------------------------
Kazuki Yamaguchi (26):
bn: use ALLOCV() macro instead of xmalloc()
appveyor.yml: remove 'openssl version' line
test/test_ssl_session: skip tests for session_remove_cb
x509ext: implement X509::Extension#==
x509attr: implement X509::Attribute#==
x509cert: implement X509::Certificate#==
x509revoked: add missing X509::Revoked#to_der
x509crl, x509revoked: implement X509::{CRL,Revoked}#==
x509req: implement X509::Request#==
ssl: extract rb_intern("call")
cipher: disallow setting AAD for non-AEAD ciphers
test/test_cipher: fix test_non_aead_cipher_set_auth_data failure
ssl: fix conflict of options in SSLContext#set_params
buffering: let #write accept multiple arguments
pkey: make pkey_check_public_key() non-static
x509cert, x509crl, x509req, ns_spki: check sanity of public key
test/envutil: port assert_warning from Ruby trunk
test/utils: remove a pointless .public_key call in issue_cert
ssl: add SSLContext#add_certificate
test/test_ssl: fix test_security_level
Drop support for LibreSSL 2.4
kdf: add HKDF support
test/test_x509cert: fix flaky test
test/test_x509crl: fix random failure
History.md: fix a typo
Ruby/OpenSSL 2.1.0.beta2
Mark Wright (1):
Fix build failure against OpenSSL 1.1 built with no-deprecated Thanks rhenium for the code review and fixes.
Peter Karman (1):
Add RSA sign_pss() and verify_pss() methods
aeris (1):
TLS Fallback Signaling Cipher Suite Value
kazu (1):
Use caller with length to reduce unused strings
git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/trunk@60907 b2dd03c8-39d4-4d8f-98ff-823fe69b080e
This commit is contained in:
parent
55953e374d
commit
a55320b093
32 changed files with 1020 additions and 116 deletions
|
@ -131,6 +131,48 @@ class OpenSSL::TestKDF < OpenSSL::TestCase
|
|||
assert_equal(expected, OpenSSL::KDF.scrypt(pass, salt: salt, N: n, r: r, p: p, length: dklen))
|
||||
end
|
||||
|
||||
def test_hkdf_rfc5869_test_case_1
|
||||
pend "HKDF is not implemented" unless OpenSSL::KDF.respond_to?(:hkdf) # OpenSSL >= 1.1.0
|
||||
hash = "sha256"
|
||||
ikm = B("0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b")
|
||||
salt = B("000102030405060708090a0b0c")
|
||||
info = B("f0f1f2f3f4f5f6f7f8f9")
|
||||
l = 42
|
||||
|
||||
okm = B("3cb25f25faacd57a90434f64d0362f2a" \
|
||||
"2d2d0a90cf1a5a4c5db02d56ecc4c5bf" \
|
||||
"34007208d5b887185865")
|
||||
assert_equal(okm, OpenSSL::KDF.hkdf(ikm, salt: salt, info: info, length: l, hash: hash))
|
||||
end
|
||||
|
||||
def test_hkdf_rfc5869_test_case_3
|
||||
pend "HKDF is not implemented" unless OpenSSL::KDF.respond_to?(:hkdf) # OpenSSL >= 1.1.0
|
||||
hash = "sha256"
|
||||
ikm = B("0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b")
|
||||
salt = B("")
|
||||
info = B("")
|
||||
l = 42
|
||||
|
||||
okm = B("8da4e775a563c18f715f802a063c5a31" \
|
||||
"b8a11f5c5ee1879ec3454e5f3c738d2d" \
|
||||
"9d201395faa4b61a96c8")
|
||||
assert_equal(okm, OpenSSL::KDF.hkdf(ikm, salt: salt, info: info, length: l, hash: hash))
|
||||
end
|
||||
|
||||
def test_hkdf_rfc5869_test_case_4
|
||||
pend "HKDF is not implemented" unless OpenSSL::KDF.respond_to?(:hkdf) # OpenSSL >= 1.1.0
|
||||
hash = "sha1"
|
||||
ikm = B("0b0b0b0b0b0b0b0b0b0b0b")
|
||||
salt = B("000102030405060708090a0b0c")
|
||||
info = B("f0f1f2f3f4f5f6f7f8f9")
|
||||
l = 42
|
||||
|
||||
okm = B("085a01ea1b10f36933068b56efa5ad81" \
|
||||
"a4f14b822f5b091568a9cdd4f155fda2" \
|
||||
"c22e422478d305f3f896")
|
||||
assert_equal(okm, OpenSSL::KDF.hkdf(ikm, salt: salt, info: info, length: l, hash: hash))
|
||||
end
|
||||
|
||||
private
|
||||
|
||||
def B(ary)
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue