Compare commits
4 Commits
master
...
20250224-o
Author | SHA1 | Date | |
---|---|---|---|
|
6179fe800f | ||
|
c80044849a | ||
|
7716e4cf31 | ||
|
c4fcc00157 |
2
.github/matrix.py
vendored
2
.github/matrix.py
vendored
@ -219,7 +219,7 @@ def main(ref_name):
|
||||
"OPENSSL_VERSION=1.0.2u",
|
||||
"OPENSSL_VERSION=1.1.1s",
|
||||
"QUICTLS=yes",
|
||||
"WOLFSSL_VERSION=5.7.0",
|
||||
"WOLFSSL_VERSION=git-master",
|
||||
"AWS_LC_VERSION=1.39.0",
|
||||
# "BORINGSSL=yes",
|
||||
]
|
||||
|
@ -1,4 +1,4 @@
|
||||
#REGTEST_TYPE=slow
|
||||
#REGTEST_TYPE=bug
|
||||
# reg-test is around ~2.5s
|
||||
|
||||
# broken with BoringSSL.
|
||||
@ -28,7 +28,7 @@
|
||||
|
||||
varnishtest "Test the OCSP auto update feature"
|
||||
feature cmd "$HAPROXY_PROGRAM -cc 'version_atleast(3.0-dev0)'"
|
||||
feature cmd "$HAPROXY_PROGRAM -cc 'feature(OPENSSL) && !ssllib_name_startswith(BoringSSL) && !ssllib_name_startswith(LibreSSL) && openssl_version_atleast(1.1.1)'"
|
||||
feature cmd "$HAPROXY_PROGRAM -cc 'feature(OPENSSL_WOLFSSL) || feature(OPENSSL) && !ssllib_name_startswith(BoringSSL) && !ssllib_name_startswith(LibreSSL) && openssl_version_atleast(1.1.1)'"
|
||||
feature cmd "command -v openssl && command -v socat"
|
||||
feature ignore_unknown_macro
|
||||
|
||||
|
@ -14,7 +14,7 @@
|
||||
|
||||
varnishtest "Test the OCSP auto update feature"
|
||||
feature cmd "$HAPROXY_PROGRAM -cc 'version_atleast(3.0-dev0)'"
|
||||
feature cmd "$HAPROXY_PROGRAM -cc 'feature(OPENSSL) && !ssllib_name_startswith(BoringSSL) && openssl_version_atleast(1.1.1)'"
|
||||
feature cmd "$HAPROXY_PROGRAM -cc 'feature(OPENSSL_WOLFSSL) || feature(OPENSSL) && !ssllib_name_startswith(BoringSSL) && openssl_version_atleast(1.1.1)'"
|
||||
feature ignore_unknown_macro
|
||||
|
||||
|
||||
|
@ -1143,6 +1143,7 @@ static int ssl_sock_load_ocsp(const char *path, SSL_CTX *ctx, struct ckch_store
|
||||
x = data->cert;
|
||||
if (!x)
|
||||
goto out;
|
||||
fprintf(stderr, "%s:%d\n", __FUNCTION__, __LINE__);
|
||||
|
||||
ssl_ocsp_get_uri_from_cert(x, ocsp_uri, &err);
|
||||
if (!data->ocsp_response && !data->ocsp_cid) {
|
||||
@ -1154,6 +1155,7 @@ static int ssl_sock_load_ocsp(const char *path, SSL_CTX *ctx, struct ckch_store
|
||||
goto out;
|
||||
}
|
||||
}
|
||||
fprintf(stderr, "%s:%d\n", __FUNCTION__, __LINE__);
|
||||
|
||||
issuer = data->ocsp_issuer;
|
||||
/* take issuer from chain over ocsp_issuer, is what is done historicaly */
|
||||
@ -1167,17 +1169,25 @@ static int ssl_sock_load_ocsp(const char *path, SSL_CTX *ctx, struct ckch_store
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
fprintf(stderr, "%s:%d\n", __FUNCTION__, __LINE__);
|
||||
if (!issuer)
|
||||
goto out;
|
||||
fprintf(stderr, "%s:%d\n", __FUNCTION__, __LINE__);
|
||||
|
||||
if (!data->ocsp_cid) {
|
||||
data->ocsp_cid = OCSP_cert_to_id(0, x, issuer);
|
||||
inc_refcount_store = 1;
|
||||
}
|
||||
|
||||
fprintf(stderr, "%s:%d\n", __FUNCTION__, __LINE__);
|
||||
if (!data->ocsp_cid)
|
||||
goto out;
|
||||
|
||||
fprintf(stderr, "%s:%d\n", __FUNCTION__, __LINE__);
|
||||
|
||||
i = i2d_OCSP_CERTID(data->ocsp_cid, NULL);
|
||||
fprintf(stderr, "%s:%d certidlen: %d\n", __FUNCTION__, __LINE__, i);
|
||||
if (!i || (i > OCSP_MAX_CERTID_ASN1_LENGTH))
|
||||
goto out;
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user