Blame SOURCES/stunnel-5.61-openssl30-fips.patch

fd1438
tests: Adapt to OpenSSL 3.x FIPS mode
fd1438
fd1438
In OpenSSL 3.0 with FIPS enabled, this test no longer fails with
fd1438
a human-readable error message (such as "no ciphers available"), but
fd1438
instead causes an internal error. Extend the success regex list to also
fd1438
accept this result.
fd1438
diff -up stunnel-5.61/tests/plugins/p11_fips_cipher.py.openssl30 stunnel-5.61/tests/plugins/p11_fips_cipher.py
fd1438
--- stunnel-5.61/tests/plugins/p11_fips_cipher.py.openssl30	2022-01-12 15:15:03.211690650 +0100
fd1438
+++ stunnel-5.61/tests/plugins/p11_fips_cipher.py	2022-01-12 15:15:20.937008173 +0100
fd1438
@@ -91,7 +91,8 @@ class FailureCiphersuitesFIPS(StunnelTes
fd1438
         self.events.count = 1
fd1438
         self.events.success = [
fd1438
             "disabled for FIPS",
fd1438
-            "no ciphers available"
fd1438
+            "no ciphers available",
fd1438
+            "TLS alert \\(write\\): fatal: internal error"
fd1438
         ]
fd1438
         self.events.failure = [
fd1438
             "peer did not return a certificate",