Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

add openssl 3 compat and ubuntu 22.04 #604

Merged
merged 6 commits into from
Aug 4, 2022
Merged

add openssl 3 compat and ubuntu 22.04 #604

merged 6 commits into from
Aug 4, 2022

Conversation

danewalton
Copy link
Member

No description provided.

Copy link
Contributor

@ewertons ewertons left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Approved with comments

@@ -1238,7 +1238,7 @@ void tlsio_openssl_deinit(void)
{
openssl_dynamic_locks_uninstall();
openssl_static_locks_uninstall();
#if (OPENSSL_VERSION_NUMBER >= 0x00907000L) && (OPENSSL_VERSION_NUMBER < 0x20000000L) && (FIPS_mode_set)
#if (OPENSSL_VERSION_NUMBER >= 0x00907000L) && (FIPS_mode_set)
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should we just change the check to < 0x30000000L ?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Just to make sure.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

You know, so we get a notification somehow if a new version comes out. Gives us the chance to check it out and make sure it works.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Same comment in all the checks that were modified.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We could but I would say we keep it removed until there comes a version that actually removes these APIs. At which point we can set the guard on that version. Otherwise it's a constantly moving goal post.

@@ -75,7 +75,7 @@ static int load_certificate_chain(SSL_CTX* ssl_ctx, const char* certificate)
// certificates.

/* Codes_SRS_X509_OPENSSL_07_006: [ If successful x509_openssl_add_ecc_credentials shall to import each certificate in the cert chain. ] */
#if (OPENSSL_VERSION_NUMBER >= 0x10100000L) && (OPENSSL_VERSION_NUMBER < 0x20000000L) || defined(LIBRESSL_VERSION_NUMBER)
#if (OPENSSL_VERSION_NUMBER >= 0x10100000L) || defined(LIBRESSL_VERSION_NUMBER)
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Also, is any version of LIBRESSL ok with these API calls?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

So far yes. I've seen this kind of behavior in other places as well.

@danewalton danewalton merged commit 9e4322c into master Aug 4, 2022
@danewalton danewalton deleted the dane/openssl3 branch August 4, 2022 17:41
AllianceTrooper pushed a commit to AllianceTrooper/azure-c-shared-utility that referenced this pull request Nov 22, 2024
AllianceTrooper pushed a commit to AllianceTrooper/azure-c-shared-utility that referenced this pull request Nov 25, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants