Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package openssl-1_1 for openSUSE:Factory checked in at 2022-06-09 14:09:46 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/openssl-1_1 (Old) and /work/SRC/openSUSE:Factory/.openssl-1_1.new.1548 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "openssl-1_1" Thu Jun 9 14:09:46 2022 rev:35 rq:981089 version:1.1.1o Changes: -------- --- /work/SRC/openSUSE:Factory/openssl-1_1/openssl-1_1.changes 2022-03-17 17:01:29.793685275 +0100 +++ /work/SRC/openSUSE:Factory/.openssl-1_1.new.1548/openssl-1_1.changes 2022-06-09 14:10:02.832387625 +0200 @@ -1,0 +2,14 @@ +Thu Jun 2 20:54:04 UTC 2022 - Jason Sikes <jsi...@suse.com> + +- Update to 1.1.1o: [CVE-2022-1292, bsc#1199166] + * Fixed a bug in the c_rehash script which was not properly sanitising + shell metacharacters to prevent command injection. + * Rebased openssl-s390x-assembly-pack-add-OPENSSL_s390xcap-environment.patch + * Rebased openssl-s390x-assembly-pack-add-support-for-pcc-and-kma-inst.patch + +- Added openssl-update_expired_certificates.patch + * Openssl failed tests because of expired certificates. + * bsc#1185637 + * Sourced from https://github.com/openssl/openssl/pull/18446/commits + +------------------------------------------------------------------- Old: ---- openssl-1.1.1n.tar.gz openssl-1.1.1n.tar.gz.asc New: ---- openssl-1.1.1o.tar.gz openssl-1.1.1o.tar.gz.asc openssl-update_expired_certificates.patch ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ openssl-1_1.spec ++++++ --- /var/tmp/diff_new_pack.mVWHAi/_old 2022-06-09 14:10:04.104389331 +0200 +++ /var/tmp/diff_new_pack.mVWHAi/_new 2022-06-09 14:10:04.108389335 +0200 @@ -41,7 +41,7 @@ %define _rname openssl Name: openssl-1_1 # Don't forget to update the version in the "openssl" package! -Version: 1.1.1n +Version: 1.1.1o Release: 0 Summary: Secure Sockets and Transport Layer Security License: OpenSSL @@ -120,6 +120,7 @@ Patch72: openssl-1_1-Optimize-AES-GCM-uarchs.patch #PATCH-FIX-SUSE bsc#1182959 FIPS: Fix function and reason error codes Patch73: openssl-1_1-FIPS-fix-error-reason-codes.patch +Patch74: openssl-update_expired_certificates.patch Requires: libopenssl1_1 = %{version}-%{release} BuildRequires: pkgconfig BuildRequires: pkgconfig(zlib) ++++++ openssl-s390x-assembly-pack-add-OPENSSL_s390xcap-environment.patch ++++++ --- /var/tmp/diff_new_pack.mVWHAi/_old 2022-06-09 14:10:04.372389690 +0200 +++ /var/tmp/diff_new_pack.mVWHAi/_new 2022-06-09 14:10:04.376389695 +0200 @@ -1,30 +1,9 @@ -From f39ad8dcaa75293968d2633d043de3f5fce4f37b Mon Sep 17 00:00:00 2001 -From: Patrick Steuer <patrick.ste...@de.ibm.com> -Date: Mon, 30 Jan 2017 17:37:54 +0100 -Subject: [PATCH] s390x assembly pack: add OPENSSL_s390xcap environment - variable. - -The OPENSSL_s390xcap environment variable is used to set bits in the s390x -capability vector to zero. This simplifies testing of different code paths. - -Signed-off-by: Patrick Steuer <patrick.ste...@de.ibm.com> - -Reviewed-by: Andy Polyakov <ap...@openssl.org> -Reviewed-by: Rich Salz <rs...@openssl.org> -Reviewed-by: Richard Levitte <levi...@openssl.org> -(Merged from https://github.com/openssl/openssl/pull/6813) ---- - crypto/s390x_arch.h | 23 +- - crypto/s390xcap.c | 515 +++++++++++++++++++++++++++++++++++++++++++ - crypto/s390xcpuid.pl | 31 ++- - 3 files changed, 556 insertions(+), 13 deletions(-) - -Index: openssl-1.1.1e/crypto/s390x_arch.h -=================================================================== ---- openssl-1.1.1e.orig/crypto/s390x_arch.h 2020-03-17 15:31:17.000000000 +0100 -+++ openssl-1.1.1e/crypto/s390x_arch.h 2020-03-20 17:29:30.459520742 +0100 -@@ -49,6 +49,9 @@ struct OPENSSL_s390xcap_st { - +diff --git a/crypto/s390x_arch.h b/crypto/s390x_arch.h +index 64e7ebb..34e04b4 100644 +--- a/crypto/s390x_arch.h ++++ b/crypto/s390x_arch.h +@@ -52,6 +52,9 @@ __attribute__ ((visibility("hidden"))) + #endif extern struct OPENSSL_s390xcap_st OPENSSL_s390xcap_P; +/* Max number of 64-bit words currently returned by STFLE */ @@ -33,7 +12,7 @@ /* convert facility bit number or function code to bit mask */ # define S390X_CAPBIT(i) (1ULL << (63 - (i) % 64)) -@@ -68,9 +71,15 @@ extern struct OPENSSL_s390xcap_st OPENSS +@@ -71,9 +74,15 @@ extern struct OPENSSL_s390xcap_st OPENSSL_s390xcap_P; # define S390X_KMA 0xb0 /* Facility Bit Numbers */ @@ -52,7 +31,7 @@ /* Function Codes */ -@@ -78,6 +87,9 @@ extern struct OPENSSL_s390xcap_st OPENSS +@@ -81,6 +90,9 @@ extern struct OPENSSL_s390xcap_st OPENSSL_s390xcap_P; # define S390X_QUERY 0 /* kimd/klmd */ @@ -62,7 +41,7 @@ # define S390X_SHA3_224 32 # define S390X_SHA3_256 33 # define S390X_SHA3_384 34 -@@ -91,7 +103,12 @@ extern struct OPENSSL_s390xcap_st OPENSS +@@ -94,7 +106,12 @@ extern struct OPENSSL_s390xcap_st OPENSSL_s390xcap_P; # define S390X_AES_192 19 # define S390X_AES_256 20 @@ -75,10 +54,10 @@ # define S390X_TRNG 114 /* Register 0 Flags */ -Index: openssl-1.1.1e/crypto/s390xcap.c -=================================================================== ---- openssl-1.1.1e.orig/crypto/s390xcap.c 2020-03-17 15:31:17.000000000 +0100 -+++ openssl-1.1.1e/crypto/s390xcap.c 2020-03-20 17:29:58.011664305 +0100 +diff --git a/crypto/s390xcap.c b/crypto/s390xcap.c +index 1097c70..da6af34 100644 +--- a/crypto/s390xcap.c ++++ b/crypto/s390xcap.c @@ -13,15 +13,51 @@ #include <setjmp.h> #include <signal.h> @@ -131,7 +110,7 @@ void OPENSSL_vx_probe(void); struct OPENSSL_s390xcap_st OPENSSL_s390xcap_P; -@@ -30,6 +66,7 @@ void OPENSSL_cpuid_setup(void) +@@ -33,6 +69,7 @@ void OPENSSL_cpuid_setup(void) { sigset_t oset; struct sigaction ill_act, oact_ill, oact_fpe; @@ -139,7 +118,7 @@ if (OPENSSL_s390xcap_P.stfle[0]) return; -@@ -37,6 +74,12 @@ void OPENSSL_cpuid_setup(void) +@@ -40,6 +77,12 @@ void OPENSSL_cpuid_setup(void) /* set a bit that will not be tested later */ OPENSSL_s390xcap_P.stfle[0] |= S390X_CAPBIT(0); @@ -152,7 +131,7 @@ memset(&ill_act, 0, sizeof(ill_act)); ill_act.sa_handler = ill_handler; sigfillset(&ill_act.sa_mask); -@@ -51,6 +94,12 @@ void OPENSSL_cpuid_setup(void) +@@ -54,6 +97,12 @@ void OPENSSL_cpuid_setup(void) if (sigsetjmp(ill_jmp, 1) == 0) OPENSSL_s390x_facilities(); @@ -165,7 +144,7 @@ /* protection against disabled vector facility */ if ((OPENSSL_s390xcap_P.stfle[2] & S390X_CAPBIT(S390X_VX)) && (sigsetjmp(ill_jmp, 1) == 0)) { -@@ -64,4 +113,470 @@ void OPENSSL_cpuid_setup(void) +@@ -67,4 +116,470 @@ void OPENSSL_cpuid_setup(void) sigaction(SIGFPE, &oact_fpe, NULL); sigaction(SIGILL, &oact_ill, NULL); sigprocmask(SIG_SETMASK, &oset, NULL); @@ -636,10 +615,10 @@ + free(buff); + return rc; } -Index: openssl-1.1.1e/crypto/s390xcpuid.pl -=================================================================== ---- openssl-1.1.1e.orig/crypto/s390xcpuid.pl 2020-03-17 15:31:17.000000000 +0100 -+++ openssl-1.1.1e/crypto/s390xcpuid.pl 2020-03-20 17:29:30.459520742 +0100 +diff --git a/crypto/s390xcpuid.pl b/crypto/s390xcpuid.pl +index 5cbb962..3602301 100755 +--- a/crypto/s390xcpuid.pl ++++ b/crypto/s390xcpuid.pl @@ -38,7 +38,26 @@ OPENSSL_s390x_facilities: stg %r0,S390X_STFLE+8(%r4) # wipe capability vectors stg %r0,S390X_STFLE+16(%r4) ++++++ openssl-s390x-assembly-pack-add-support-for-pcc-and-kma-inst.patch ++++++ --- /var/tmp/diff_new_pack.mVWHAi/_old 2022-06-09 14:10:04.396389722 +0200 +++ /var/tmp/diff_new_pack.mVWHAi/_new 2022-06-09 14:10:04.400389727 +0200 @@ -1,25 +1,8 @@ -From e382f507fb67863be02bfa69b08533cc55f0cd96 Mon Sep 17 00:00:00 2001 -From: Patrick Steuer <patrick.ste...@de.ibm.com> -Date: Thu, 27 Jun 2019 01:07:54 +0200 -Subject: [PATCH 08967/10000] s390x assembly pack: add support for pcc and kma - instructions - -Signed-off-by: Patrick Steuer <patrick.ste...@de.ibm.com> - -Reviewed-by: Richard Levitte <levi...@openssl.org> -Reviewed-by: Shane Lontis <shane.lon...@oracle.com> -(Merged from https://github.com/openssl/openssl/pull/9258) ---- - crypto/s390x_arch.h | 22 ++++++++ - crypto/s390xcap.c | 119 +++++++++++++++++++++++++++++++++++++++++++ - crypto/s390xcpuid.pl | 71 ++++++++++++++++++++++++++ - 3 files changed, 212 insertions(+) - -Index: openssl-1.1.1d/crypto/s390x_arch.h -=================================================================== ---- openssl-1.1.1d.orig/crypto/s390x_arch.h -+++ openssl-1.1.1d/crypto/s390x_arch.h -@@ -26,6 +26,9 @@ void s390x_kmf(const unsigned char *in, +diff --git a/crypto/s390x_arch.h b/crypto/s390x_arch.h +index 34e04b4..a156c97 100644 +--- a/crypto/s390x_arch.h ++++ b/crypto/s390x_arch.h +@@ -26,6 +26,9 @@ void s390x_kmf(const unsigned char *in, size_t len, unsigned char *out, unsigned int fc, void *param); void s390x_kma(const unsigned char *aad, size_t alen, const unsigned char *in, size_t len, unsigned char *out, unsigned int fc, void *param); @@ -37,8 +20,8 @@ + unsigned long long kdsa[2]; }; - extern struct OPENSSL_s390xcap_st OPENSSL_s390xcap_P; -@@ -69,6 +74,8 @@ extern struct OPENSSL_s390xcap_st OPENSS + #if defined(__GNUC__) && defined(__linux) +@@ -72,6 +77,8 @@ extern struct OPENSSL_s390xcap_st OPENSSL_s390xcap_P; # define S390X_KMF 0x90 # define S390X_PRNO 0xa0 # define S390X_KMA 0xb0 @@ -47,7 +30,7 @@ /* Facility Bit Numbers */ # define S390X_MSA 17 /* message-security-assist */ -@@ -80,6 +87,7 @@ extern struct OPENSSL_s390xcap_st OPENSS +@@ -83,6 +90,7 @@ extern struct OPENSSL_s390xcap_st OPENSSL_s390xcap_P; # define S390X_VXD 134 /* vector packed decimal */ # define S390X_VXE 135 /* vector enhancements 1 */ # define S390X_MSA8 146 /* message-security-assist-ext. 8 */ @@ -55,7 +38,7 @@ /* Function Codes */ -@@ -111,10 +119,24 @@ extern struct OPENSSL_s390xcap_st OPENSS +@@ -114,10 +122,24 @@ extern struct OPENSSL_s390xcap_st OPENSSL_s390xcap_P; # define S390X_SHA_512_DRNG 3 # define S390X_TRNG 114 @@ -80,11 +63,11 @@ +# define S390X_KDSA_D 0x80 #endif -Index: openssl-1.1.1d/crypto/s390xcap.c -=================================================================== ---- openssl-1.1.1d.orig/crypto/s390xcap.c -+++ openssl-1.1.1d/crypto/s390xcap.c -@@ -137,6 +137,10 @@ void OPENSSL_cpuid_setup(void) +diff --git a/crypto/s390xcap.c b/crypto/s390xcap.c +index da6af34..3d762fd 100644 +--- a/crypto/s390xcap.c ++++ b/crypto/s390xcap.c +@@ -140,6 +140,10 @@ void OPENSSL_cpuid_setup(void) OPENSSL_s390xcap_P.prno[1] &= cap.prno[1]; OPENSSL_s390xcap_P.kma[0] &= cap.kma[0]; OPENSSL_s390xcap_P.kma[1] &= cap.kma[1]; @@ -95,7 +78,7 @@ } } -@@ -163,6 +167,8 @@ static int parse_env(struct OPENSSL_s390 +@@ -166,6 +170,8 @@ static int parse_env(struct OPENSSL_s390xcap_st *cap) .kmf = {0ULL, 0ULL}, .prno = {0ULL, 0ULL}, .kma = {0ULL, 0ULL}, @@ -104,7 +87,7 @@ }; /*- -@@ -189,6 +195,8 @@ static int parse_env(struct OPENSSL_s390 +@@ -192,6 +198,8 @@ static int parse_env(struct OPENSSL_s390xcap_st *cap) .kmf = {0ULL, 0ULL}, .prno = {0ULL, 0ULL}, .kma = {0ULL, 0ULL}, @@ -113,7 +96,7 @@ }; /*- -@@ -220,6 +228,8 @@ static int parse_env(struct OPENSSL_s390 +@@ -223,6 +231,8 @@ static int parse_env(struct OPENSSL_s390xcap_st *cap) .kmf = {0ULL, 0ULL}, .prno = {0ULL, 0ULL}, .kma = {0ULL, 0ULL}, @@ -122,7 +105,7 @@ }; /*- -@@ -257,6 +267,8 @@ static int parse_env(struct OPENSSL_s390 +@@ -260,6 +270,8 @@ static int parse_env(struct OPENSSL_s390xcap_st *cap) .kmf = {0ULL, 0ULL}, .prno = {0ULL, 0ULL}, .kma = {0ULL, 0ULL}, @@ -131,7 +114,7 @@ }; /*- -@@ -313,6 +325,9 @@ static int parse_env(struct OPENSSL_s390 +@@ -316,6 +328,9 @@ static int parse_env(struct OPENSSL_s390xcap_st *cap) 0ULL}, .prno = {0ULL, 0ULL}, .kma = {0ULL, 0ULL}, @@ -141,7 +124,7 @@ }; /*- -@@ -369,6 +384,9 @@ static int parse_env(struct OPENSSL_s390 +@@ -372,6 +387,9 @@ static int parse_env(struct OPENSSL_s390xcap_st *cap) 0ULL}, .prno = {0ULL, 0ULL}, .kma = {0ULL, 0ULL}, @@ -151,7 +134,7 @@ }; /*- -@@ -429,6 +447,9 @@ static int parse_env(struct OPENSSL_s390 +@@ -432,6 +450,9 @@ static int parse_env(struct OPENSSL_s390xcap_st *cap) | S390X_CAPBIT(S390X_SHA_512_DRNG), 0ULL}, .kma = {0ULL, 0ULL}, @@ -161,7 +144,7 @@ }; /*- -@@ -508,6 +529,101 @@ static int parse_env(struct OPENSSL_s390 +@@ -511,6 +532,101 @@ static int parse_env(struct OPENSSL_s390xcap_st *cap) | S390X_CAPBIT(S390X_AES_192) | S390X_CAPBIT(S390X_AES_256), 0ULL}, @@ -263,7 +246,7 @@ }; char *tok_begin, *tok_end, *buff, tok[S390X_STFLE_MAX][LEN + 1]; -@@ -551,6 +667,8 @@ static int parse_env(struct OPENSSL_s390 +@@ -554,6 +670,8 @@ static int parse_env(struct OPENSSL_s390xcap_st *cap) else if TOK_FUNC(kmf) else if TOK_FUNC(prno) else if TOK_FUNC(kma) @@ -272,7 +255,7 @@ /* CPU model tokens */ else if TOK_CPU(z900) -@@ -561,6 +679,7 @@ static int parse_env(struct OPENSSL_s390 +@@ -564,6 +682,7 @@ static int parse_env(struct OPENSSL_s390xcap_st *cap) else if TOK_CPU(zEC12) else if TOK_CPU(z13) else if TOK_CPU(z14) @@ -280,10 +263,10 @@ /* whitespace(ignored) or invalid tokens */ else { -Index: openssl-1.1.1d/crypto/s390xcpuid.pl -=================================================================== ---- openssl-1.1.1d.orig/crypto/s390xcpuid.pl -+++ openssl-1.1.1d/crypto/s390xcpuid.pl +diff --git a/crypto/s390xcpuid.pl b/crypto/s390xcpuid.pl +index 3602301..344f4f6 100755 +--- a/crypto/s390xcpuid.pl ++++ b/crypto/s390xcpuid.pl @@ -77,8 +77,13 @@ OPENSSL_s390x_functions: stg %r0,S390X_PRNO+8(%r4) stg %r0,S390X_KMA(%r4) ++++++ openssl-update_expired_certificates.patch ++++++ diff --git a/test/certs/embeddedSCTs1-key.pem b/test/certs/embeddedSCTs1-key.pem index e3e66d5..28dd206 100644 --- a/test/certs/embeddedSCTs1-key.pem +++ b/test/certs/embeddedSCTs1-key.pem @@ -1,15 +1,27 @@ -----BEGIN RSA PRIVATE KEY----- -MIICWwIBAAKBgQC+75jnwmh3rjhfdTJaDB0ym+3xj6r015a/BH634c4VyVui+A7k -WL19uG+KSyUhkaeb1wDDjpwDibRc1NyaEgqyHgy0HNDnKAWkEM2cW9tdSSdyba8X -EPYBhzd+olsaHjnu0LiBGdwVTcaPfajjDK8VijPmyVCfSgWwFAn/Xdh+tQIDAQAB -AoGAK/daG0vt6Fkqy/hdrtSJSKUVRoGRmS2nnba4Qzlwzh1+x2kdbMFuaOu2a37g -PvmeQclheKZ3EG1+Jb4yShwLcBCV6pkRJhOKuhvqGnjngr6uBH4gMCjpZVj7GDMf -flYHhdJCs3Cz/TY0wKN3o1Fldil2DHR/AEOc1nImeSp5/EUCQQDjKS3W957kYtTU -X5BeRjvg03Ug8tJq6IFuhTFvUJ+XQ5bAc0DmxAbQVKqRS7Wje59zTknVvS+MFdeQ -pz4dGuV7AkEA1y0X2yarIls+0A/S1uwkvwRTIkfS+QwFJ1zVya8sApRdKAcidIzA -b70hkKLilU9+LrXg5iZdFp8l752qJiw9jwJAXjItN/7mfH4fExGto+or2kbVQxxt -9LcFNPc2UJp2ExuL37HrL8YJrUnukOF8KJaSwBWuuFsC5GwKP4maUCdfEQJAUwBR -83c3DEmmMRvpeH4erpA8gTyzZN3+HvDwhpvLnjMcvBQEdnDUykVqbSBnxrCjO+Fs -n1qtDczWFVf8Cj2GgQJAQ14Awx32Cn9sF+3M+sEVtlAf6CqiEbkYeYdSCbsplMmZ -1UoaxiwXY3z+B7epsRnnPR3KaceAlAxw2/zQJMFNOQ== +MIIEpQIBAAKCAQEAuIjpA4/iCpDA2mjywI5zG6IBX6bNcRQYDsB7Cv0VonNXtJBw +XxMENP4jVpvEmWpJ5iMBknGHV+XWBkngYapczIsY4LGn6aMU6ySABBVQpNOQSRfT +48xGGPR9mzOBG/yplmpFOVq1j+b65lskvAXKYaLFpFn3oY/pBSdcCNBP8LypVXAJ +b3IqEXsBL/ErgHG9bgIRP8VxBAaryCz77kLzAXkfHL2LfSGIfNONyEKB3xI94S4L +eouOSoWL1VkEfJs87vG4G5xoXw3KOHyiueQUUlMnu8p+Bx0xPVKPEsLje3R9k0rG +a5ca7dXAn9UypKKp25x4NXpnjGX5txVEYfNvqQIDAQABAoIBAE0zqhh9Z5n3+Vbm +tTht4CZdXqm/xQ9b0rzJNjDgtN5j1vuJuhlsgUQSVoJzZIqydvw7BPtZV8AkPagf +3Cm/9lb0kpHegVsziRrfCFes+zIZ+LE7sMAKxADIuIvnvkoRKHnvN8rI8lCj16/r +zbCD06mJSZp6sSj8ZgZr8wsU63zRGt1TeGM67uVW4agphfzuKGlXstPLsSMwknpF +nxFS2TYbitxa9oH76oCpEk5fywYsYgUP4TdzOzfVAgMzNSu0FobvWl0CECB+G3RQ +XQ5VWbYkFoj5XbE5kYz6sYHMQWL1NQpglUp+tAQ1T8Nca0CvbSpD77doRGm7UqYw +ziVQKokCgYEA6BtHwzyD1PHdAYtOcy7djrpnIMaiisSxEtMhctoxg8Vr2ePEvMpZ +S1ka8A1Pa9GzjaUk+VWKWsTf+VkmMHGtpB1sv8S7HjujlEmeQe7p8EltjstvLDmi +BhAA7ixvZpXXjQV4GCVdUVu0na6gFGGueZb2FHEXB8j1amVwleJj2lcCgYEAy4f3 +2wXqJfz15+YdJPpG9BbH9d/plKJm5ID3p2ojAGo5qvVuIJMNJA4elcfHDwzCWVmn +MtR/WwtxYVVmy1BAnmk6HPSYc3CStvv1800vqN3fyJWtZ1P+8WBVZWZzIQdjdiaU +JSRevPnjQGc+SAZQQIk1yVclbz5790yuXsdIxf8CgYEApqlABC5lsvfga4Vt1UMn +j57FAkHe4KmPRCcZ83A88ZNGd/QWhkD9kR7wOsIz7wVqWiDkxavoZnjLIi4jP9HA +jwEZ3zER8wl70bRy0IEOtZzj8A6fSzAu6Q+Au4RokU6yse3lZ+EcepjQvhBvnXLu +ZxxAojj6AnsHzVf9WYJvlI0CgYEAoATIw/TEgRV/KNHs/BOiEWqP0Co5dVix2Nnk +3EVAO6VIrbbE3OuAm2ZWeaBWSujXLHSmVfpoHubCP6prZVI1W9aTkAxmh+xsDV3P +o3h+DiBTP1seuGx7tr7spQqFXeR3OH9gXktYCO/W0d3aQ7pjAjpehWv0zJ+ty2MI +fQ/lkXUCgYEAgbP+P5UmY7Fqm/mi6TprEJ/eYktji4Ne11GDKGFQCfjF5RdKhdw1 +5+elGhZes+cpzu5Ak6zBDu4bviT+tRTWJu5lVLEzlHHv4nAU7Ks5Aj67ApH21AnP +RtlATdhWOt5Dkdq1WSpDfz5bvWgvyBx9D66dSmQdbKKe2dH327eQll4= -----END RSA PRIVATE KEY----- diff --git a/test/certs/embeddedSCTs1.pem b/test/certs/embeddedSCTs1.pem index d1e8512..d2a111f 100644 --- a/test/certs/embeddedSCTs1.pem +++ b/test/certs/embeddedSCTs1.pem @@ -1,20 +1,21 @@ -----BEGIN CERTIFICATE----- -MIIDWTCCAsKgAwIBAgIBBzANBgkqhkiG9w0BAQUFADBVMQswCQYDVQQGEwJHQjEk +MIIDeDCCAuGgAwIBAgIBAjANBgkqhkiG9w0BAQsFADBVMQswCQYDVQQGEwJHQjEk MCIGA1UEChMbQ2VydGlmaWNhdGUgVHJhbnNwYXJlbmN5IENBMQ4wDAYDVQQIEwVX -YWxlczEQMA4GA1UEBxMHRXJ3IFdlbjAeFw0xMjA2MDEwMDAwMDBaFw0yMjA2MDEw -MDAwMDBaMFIxCzAJBgNVBAYTAkdCMSEwHwYDVQQKExhDZXJ0aWZpY2F0ZSBUcmFu -c3BhcmVuY3kxDjAMBgNVBAgTBVdhbGVzMRAwDgYDVQQHEwdFcncgV2VuMIGfMA0G -CSqGSIb3DQEBAQUAA4GNADCBiQKBgQC+75jnwmh3rjhfdTJaDB0ym+3xj6r015a/ -BH634c4VyVui+A7kWL19uG+KSyUhkaeb1wDDjpwDibRc1NyaEgqyHgy0HNDnKAWk -EM2cW9tdSSdyba8XEPYBhzd+olsaHjnu0LiBGdwVTcaPfajjDK8VijPmyVCfSgWw -FAn/Xdh+tQIDAQABo4IBOjCCATYwHQYDVR0OBBYEFCAxVBryXAX/2GWLaEN5T16Q -Nve0MH0GA1UdIwR2MHSAFF+diA3Ic+ZU1PgN2OawwSS0R8NVoVmkVzBVMQswCQYD -VQQGEwJHQjEkMCIGA1UEChMbQ2VydGlmaWNhdGUgVHJhbnNwYXJlbmN5IENBMQ4w -DAYDVQQIEwVXYWxlczEQMA4GA1UEBxMHRXJ3IFdlboIBADAJBgNVHRMEAjAAMIGK -BgorBgEEAdZ5AgQCBHwEegB4AHYA3xwuwRUAlFJHqWFoMl3cXHlZ6PfG04j8AC4L -vT9012QAAAE92yffkwAABAMARzBFAiBIL2dRrzXbplQ2vh/WZA89v5pBQpSVkkUw -KI+j5eI+BgIhAOTtwNs6xXKx4vXoq2poBlOYfc9BAn3+/6EFUZ2J7b8IMA0GCSqG -SIb3DQEBBQUAA4GBAIoMS+8JnUeSea+goo5on5HhxEIb4tJpoupspOghXd7dyhUE -oR58h8S3foDw6XkDUmjyfKIOFmgErlVvMWmB+Wo5Srer/T4lWsAERRP+dlcMZ5Wr -5HAxM9MD+J86+mu8/FFzGd/ZW5NCQSEfY0A1w9B4MHpoxgdaLiDInza4kQyg +YWxlczEQMA4GA1UEBxMHRXJ3IFdlbjAgFw0yMDAxMjUxMTUwMTNaGA8yMTIwMDEy +NjExNTAxM1owGTEXMBUGA1UEAwwOc2VydmVyLmV4YW1wbGUwggEiMA0GCSqGSIb3 +DQEBAQUAA4IBDwAwggEKAoIBAQC4iOkDj+IKkMDaaPLAjnMbogFfps1xFBgOwHsK +/RWic1e0kHBfEwQ0/iNWm8SZaknmIwGScYdX5dYGSeBhqlzMixjgsafpoxTrJIAE +FVCk05BJF9PjzEYY9H2bM4Eb/KmWakU5WrWP5vrmWyS8BcphosWkWfehj+kFJ1wI +0E/wvKlVcAlvcioRewEv8SuAcb1uAhE/xXEEBqvILPvuQvMBeR8cvYt9IYh8043I +QoHfEj3hLgt6i45KhYvVWQR8mzzu8bgbnGhfDco4fKK55BRSUye7yn4HHTE9Uo8S +wuN7dH2TSsZrlxrt1cCf1TKkoqnbnHg1emeMZfm3FURh82+pAgMBAAGjggEMMIIB +CDAdBgNVHQ4EFgQUtMa8XD5ylrF9AqCdnPEhXa63H2owHwYDVR0jBBgwFoAUX52I +Dchz5lTU+A3Y5rDBJLRHw1UwCQYDVR0TBAIwADATBgNVHSUEDDAKBggrBgEFBQcD +ATCBigYKKwYBBAHWeQIEAgR8BHoAeAB2AN8cLsEVAJRSR6lhaDJd3Fx5Wej3xtOI +/AAuC70/dNdkAAABb15m6AAAAAQDAEcwRQIgfDPo8RArm/vcSEZ608Q1u+XQ55QB +u67SZEuZxLpbUM0CIQDRsgcTud4PDy8Cgg+lHeAS7UxgSKBbWAznYOuorwNewzAZ +BgNVHREEEjAQgg5zZXJ2ZXIuZXhhbXBsZTANBgkqhkiG9w0BAQsFAAOBgQCWFKKR +RNkDRzB25NK07OLkbzebhnpKtbP4i3blRx1HAvTSamf/3uuHI7kfiPJorJymJpT1 +IuJvSVKyMu1qONWBimiBfiyGL7+le1izHEJIP5lVTbddfzSIBIvrlHHcWIOL3H+W +YT6yTEIzJuO07Xp61qnB1CE2TrinUWlyC46Zkw== -----END CERTIFICATE----- diff --git a/test/certs/embeddedSCTs1.sct b/test/certs/embeddedSCTs1.sct index 59362dc..35c9eb9 100644 --- a/test/certs/embeddedSCTs1.sct +++ b/test/certs/embeddedSCTs1.sct @@ -2,11 +2,11 @@ Signed Certificate Timestamp: Version : v1 (0x0) Log ID : DF:1C:2E:C1:15:00:94:52:47:A9:61:68:32:5D:DC:5C: 79:59:E8:F7:C6:D3:88:FC:00:2E:0B:BD:3F:74:D7:64 - Timestamp : Apr 5 17:04:16.275 2013 GMT + Timestamp : Jan 1 00:00:00.000 2020 GMT Extensions: none Signature : ecdsa-with-SHA256 - 30:45:02:20:48:2F:67:51:AF:35:DB:A6:54:36:BE:1F: - D6:64:0F:3D:BF:9A:41:42:94:95:92:45:30:28:8F:A3: - E5:E2:3E:06:02:21:00:E4:ED:C0:DB:3A:C5:72:B1:E2: - F5:E8:AB:6A:68:06:53:98:7D:CF:41:02:7D:FE:FF:A1: - 05:51:9D:89:ED:BF:08 \ No newline at end of file + 30:45:02:20:7C:33:E8:F1:10:2B:9B:FB:DC:48:46:7A: + D3:C4:35:BB:E5:D0:E7:94:01:BB:AE:D2:64:4B:99:C4: + BA:5B:50:CD:02:21:00:D1:B2:07:13:B9:DE:0F:0F:2F: + 02:82:0F:A5:1D:E0:12:ED:4C:60:48:A0:5B:58:0C:E7: + 60:EB:A8:AF:03:5E:C3 \ No newline at end of file diff --git a/test/certs/embeddedSCTs1_issuer.pem b/test/certs/embeddedSCTs1_issuer.pem index 1fa449d..6aa9455 100644 --- a/test/certs/embeddedSCTs1_issuer.pem +++ b/test/certs/embeddedSCTs1_issuer.pem @@ -1,18 +1,18 @@ -----BEGIN CERTIFICATE----- -MIIC0DCCAjmgAwIBAgIBADANBgkqhkiG9w0BAQUFADBVMQswCQYDVQQGEwJHQjEk +MIIC0jCCAjugAwIBAgIBADANBgkqhkiG9w0BAQsFADBVMQswCQYDVQQGEwJHQjEk MCIGA1UEChMbQ2VydGlmaWNhdGUgVHJhbnNwYXJlbmN5IENBMQ4wDAYDVQQIEwVX -YWxlczEQMA4GA1UEBxMHRXJ3IFdlbjAeFw0xMjA2MDEwMDAwMDBaFw0yMjA2MDEw -MDAwMDBaMFUxCzAJBgNVBAYTAkdCMSQwIgYDVQQKExtDZXJ0aWZpY2F0ZSBUcmFu -c3BhcmVuY3kgQ0ExDjAMBgNVBAgTBVdhbGVzMRAwDgYDVQQHEwdFcncgV2VuMIGf -MA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDVimhTYhCicRmTbneDIRgcKkATxtB7 -jHbrkVfT0PtLO1FuzsvRyY2RxS90P6tjXVUJnNE6uvMa5UFEJFGnTHgW8iQ8+EjP -KDHM5nugSlojgZ88ujfmJNnDvbKZuDnd/iYx0ss6hPx7srXFL8/BT/9Ab1zURmnL -svfP34b7arnRsQIDAQABo4GvMIGsMB0GA1UdDgQWBBRfnYgNyHPmVNT4DdjmsMEk -tEfDVTB9BgNVHSMEdjB0gBRfnYgNyHPmVNT4DdjmsMEktEfDVaFZpFcwVTELMAkG -A1UEBhMCR0IxJDAiBgNVBAoTG0NlcnRpZmljYXRlIFRyYW5zcGFyZW5jeSBDQTEO -MAwGA1UECBMFV2FsZXMxEDAOBgNVBAcTB0VydyBXZW6CAQAwDAYDVR0TBAUwAwEB -/zANBgkqhkiG9w0BAQUFAAOBgQAGCMxKbWTyIF4UbASydvkrDvqUpdryOvw4BmBt -OZDQoeojPUApV2lGOwRmYef6HReZFSCa6i4Kd1F2QRIn18ADB8dHDmFYT9czQiRy -f1HWkLxHqd81TbD26yWVXeGJPE3VICskovPkQNJ0tU4b03YmnKliibduyqQQkOFP -OwqULg== +YWxlczEQMA4GA1UEBxMHRXJ3IFdlbjAgFw0yMjA2MDExMDM4MDJaGA8yMTIyMDUw +ODEwMzgwMlowVTELMAkGA1UEBhMCR0IxJDAiBgNVBAoTG0NlcnRpZmljYXRlIFRy +YW5zcGFyZW5jeSBDQTEOMAwGA1UECBMFV2FsZXMxEDAOBgNVBAcTB0VydyBXZW4w +gZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBANWKaFNiEKJxGZNud4MhGBwqQBPG +0HuMduuRV9PQ+0s7UW7Oy9HJjZHFL3Q/q2NdVQmc0Tq68xrlQUQkUadMeBbyJDz4 +SM8oMczme6BKWiOBnzy6N+Yk2cO9spm4Od3+JjHSyzqE/HuytcUvz8FP/0BvXNRG +acuy98/fhvtqudGxAgMBAAGjga8wgawwHQYDVR0OBBYEFF+diA3Ic+ZU1PgN2Oaw +wSS0R8NVMH0GA1UdIwR2MHSAFF+diA3Ic+ZU1PgN2OawwSS0R8NVoVmkVzBVMQsw +CQYDVQQGEwJHQjEkMCIGA1UEChMbQ2VydGlmaWNhdGUgVHJhbnNwYXJlbmN5IENB +MQ4wDAYDVQQIEwVXYWxlczEQMA4GA1UEBxMHRXJ3IFdlboIBADAMBgNVHRMEBTAD +AQH/MA0GCSqGSIb3DQEBCwUAA4GBAD0aYh9OkFYfXV7kBfhrtD0PJG2U47OV/1qq ++uFpqB0S1WO06eJT0pzYf1ebUcxjBkajbJZm/FHT85VthZ1lFHsky87aFD8XlJCo +2IOhKOkvvWKPUdFLoO/ZVXqEVKkcsS1eXK1glFvb07eJZya3JVG0KdMhV2YoDg6c +Doud4XrO -----END CERTIFICATE----- diff --git a/test/ct_test.c b/test/ct_test.c index 78d11ca..535897d 100644 --- a/test/ct_test.c +++ b/test/ct_test.c @@ -63,7 +63,7 @@ static CT_TEST_FIXTURE *set_up(const char *const test_case_name) if (!TEST_ptr(fixture = OPENSSL_zalloc(sizeof(*fixture)))) goto end; fixture->test_case_name = test_case_name; - fixture->epoch_time_in_ms = 1473269626000ULL; /* Sep 7 17:33:46 2016 GMT */ + fixture->epoch_time_in_ms = 1580335307000ULL; /* Wed 29 Jan 2020 10:01:47 PM UTC */ if (!TEST_ptr(fixture->ctlog_store = CTLOG_STORE_new()) || !TEST_int_eq( CTLOG_STORE_load_default_file(fixture->ctlog_store), 1))