Server IP : 185.86.78.101 / Your IP : 216.73.216.213 Web Server : Apache System : Linux 675867-vds-valikoshka1996.gmhost.pp.ua 5.4.0-150-generic #167-Ubuntu SMP Mon May 15 17:35:05 UTC 2023 x86_64 User : www ( 1000) PHP Version : 7.4.33 Disable Function : passthru,exec,system,putenv,chroot,chgrp,chown,shell_exec,popen,proc_open,pcntl_exec,ini_alter,ini_restore,dl,openlog,syslog,readlink,symlink,popepassthru,pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,imap_open,apache_setenv MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : OFF | Sudo : ON | Pkexec : OFF Directory : /www/server/mysql/mysql-test/include/ |
Upload File : |
# # Modern Linux distributions like EL8 and Debian 10 restrict minimum TLS # protocol version to TLSv1.2, try to detect this and skip TLSv1/TLSv1.1 tests. # --perl use strict; use warnings; my $crypto_policy = '/etc/crypto-policies/back-ends/opensslcnf.config'; my $openssl_conf = '/etc/ssl/openssl.cnf'; my $policy_file = ""; if (-r $crypto_policy) { $policy_file = $crypto_policy; } elsif (-r $openssl_conf) { $policy_file = $openssl_conf; } my $min_protocol_tlsv1_2 = 0; if ($policy_file ne "") { open(my $RH, "<", $policy_file) or die "Could not open $policy_file $!"; while (<$RH>) { if (/^MinProtocol\s=\sTLSv1\.2/) { $min_protocol_tlsv1_2 = 1; last; } } close $RH; } open (my $WH, ">", "$ENV{MYSQL_TMP_DIR}/crypto_policy.inc") or die "Could not open $ENV{MYSQL_TMP_DIR}/crypto_policy.inc: $!"; print $WH "let \$min_protocol_tlsv1_2 = $min_protocol_tlsv1_2;\n"; close $WH; EOF --source $MYSQL_TMP_DIR/crypto_policy.inc --remove_file $MYSQL_TMP_DIR/crypto_policy.inc if ($min_protocol_tlsv1_2) { --Skip Test requires TLS protocol <= 1.1, while OpenSSL policy sets MinProtocol TLSv1.2 }