aboutsummaryrefslogtreecommitdiff
path: root/gnu/packages/patches/gourmet-sqlalchemy-compat.patch
diff options
context:
space:
mode:
authordan <i@dan.games>2024-03-28 11:54:50 +0800
committerJohn Kehayias <john.kehayias@protonmail.com>2024-04-01 01:06:10 -0400
commit083c9c010903ad42736e1fd000546042fbfafb1c (patch)
treeb95b6e152309a43df87ef23b65226738268cd410 /gnu/packages/patches/gourmet-sqlalchemy-compat.patch
parentaea7691fdd48ac529a5544312291e4422ec43274 (diff)
downloadguix-083c9c010903ad42736e1fd000546042fbfafb1c.tar.gz
guix-083c9c010903ad42736e1fd000546042fbfafb1c.zip
gnu: volk: Update to 1.3.280.0.
* gnu/packages/vulkan.scm (volk): Update to 1.3.280.0. Change-Id: I4f72df2ba6784f3dae93cf60361e1bceaf61d3bb Signed-off-by: John Kehayias <john.kehayias@protonmail.com>
Diffstat (limited to 'gnu/packages/patches/gourmet-sqlalchemy-compat.patch')
0 files changed, 0 insertions, 0 deletions
lass='add'>+ if $^O =~ /^(VMS)$/;
+
+plan skip_all => "$test_name needs the dynamic engine feature enabled"
+ if disabled("engine") || disabled("dynamic-engine");
+
+plan skip_all => "$test_name needs the sock feature enabled"
+ if disabled("sock");
+
+plan skip_all => "$test_name needs TLS enabled"
+ if alldisabled(available_protocols("tls"));
+
+$ENV{OPENSSL_ia32cap} = '~0x200000200000000';
+my $proxy = TLSProxy::Proxy->new(
+ \&vers_tolerance_filter,
+ cmdstr(app(["openssl"]), display => 1),
+ srctop_file("apps", "server.pem"),
+ (!$ENV{HARNESS_ACTIVE} || $ENV{HARNESS_VERBOSE})
+);
+
+#Test 1: Asking for TLS1.3 should pass
+my $client_version = TLSProxy::Record::VERS_TLS_1_3;
+$proxy->start() or plan skip_all => "Unable to start up Proxy for tests";
+plan tests => 2;
+ok(TLSProxy::Message->success(), "Version tolerance test, TLS 1.3");
+
+#Test 2: Testing something below SSLv3 should fail
+$client_version = TLSProxy::Record::VERS_SSL_3_0 - 1;
+$proxy->clear();
+$proxy->start();
+ok(TLSProxy::Message->fail(), "Version tolerance test, SSL < 3.0");
+
+sub vers_tolerance_filter
+{
+ my $proxy = shift;
+
+ # We're only interested in the initial ClientHello
+ if ($proxy->flight != 0) {
+ return;
+ }
+
+ foreach my $message (@{$proxy->message_list}) {
+ if ($message->mt == TLSProxy::Message::MT_CLIENT_HELLO) {
+ #Set the client version
+ #Anything above the max supported version (TLS1.2) should succeed
+ #Anything below SSLv3 should fail
+ $message->client_version($client_version);
+ $message->repack();
+ }
+ }
+}