Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix build for m1 #149

Open
wants to merge 69 commits into
base: master
Choose a base branch
from
Open

Conversation

nathan454
Copy link

openssl is installed in different location for macbook with m1, I added build constraints to fix this

dignifiedquire and others added 30 commits June 28, 2019 13:37
This allows us to determine the size of signatures produced by a public key.
Incidentally, this also allows us to determine the size of an RSA key's modulus.
feat: add Size function to PublicKey
pass build flags on Solaris/Illumos
- add support to retrive custom extension value
- add support to add custom protocol for protocol negotiation

Signed-off-by: Tiger <[email protected]>
Signed-off-by: Tiger <[email protected]>
Signed-off-by: Tiger <[email protected]>
Add required bindings to support openssl in libp2p-tls
…; made PEM file splitter tolerant of trailing whitespace in PEM block delimiter lines
Enabled PEM files with CRLF line endings to be used (spacemonkeygo#10)
Fix `staticcheck` issues:
- S1028 use `fmt.Errorf` to construct formatted errors
- ST1017 yoda conditions
- ST1005 error message capitalization
- ST1006 avoid `self` as receiver name
- S1030 use `buf.String`
- S1011 avoid redundant loop when `append` suffices
- SA4006 unused value
- S1019 remove redundant capacity on `make` call
- SA2002 `t.Fatal` called outside of test

Exported error violates ST1012, which is ignored by this PR since rename may cause breaking changes.

Remove redundant parentheses wrapping, and use CamelCase naming while at it.
Tests fail due to weak MD on self-signed RSA cert: update from SHA-1 to SHA-2
Closing may need to write, which will cause it to fail if the other side
has already closed. The correct fix is to use shutdown to half-close,
then wait for the other side, but that's honestly not worth it right
now. So I just fixed the tests to pass.
galargh and others added 20 commits January 31, 2022 13:12
- this is an analog for net.DialTimeout call
- the timeout is only for net.Dial call
- the timeout does not include OpenSSL calls
- Ctx.SetMinProtoVersion wraps SSL_CTX_set_min_proto_version
- Ctx.SetMaxProtoVersion wraps SSL_CTX_set_max_proto_version
…_max_proto_version

Add Ctx.SetMinProtoVersion and Ctx.SetMaxProtoVersion wrappers
…eout-call

Add openssl.DialTimeout(network, addr, timeout, ctx, flags) call
Install mingw toolchain on windows machines for go test
@FirePhenix
Copy link

sorry, I clicked the wrong button and approved it, it's not my repo.

oleg-jukovec and others added 7 commits August 18, 2022 11:29
* Fix build with OpenSSL 3.0

- FIPS_mode_set() does not exist in OpenSSL 3.0 [1]
- X509_check_* functions declarated in openssl/x509v3.h instead of openssl/x509.h [2]
- X509_chack_* functions have const char arg inserad of const unsigned char [2]
- skip MD4 tests if it is unsupported by OpenSSL
- the patch does not change behavior under OpenSSL version != 3
- the patch just fixes build under OpenSSL 3.0 and doesn't update deprecated code
or behavior

1. https://wiki.openssl.org/index.php/OpenSSL_3.0#Upgrading_from_the_OpenSSL_2.0_FIPS_Object_Module
2. https://www.openssl.org/docs/man3.0/man3/X509_check_host.html

* Add Ubuntu 22.04 runner to GitHub Actions go test workflow

* Fix flaky tests on Ubuntu 22.04

It is necessary to handle OpenSSL errors very carefully. Otherwise,
errors may appear in unexpected places. For example, we didn't catch
an error from EVP_DigestInit_ex() and it appears sometimes in conn.go:

func (c *Conn) getErrorHandler(rv C.int, errno error) func() error {
	errcode := C.SSL_get_error(c.ssl, rv) // <- here
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.