Skip to content

bpo-38820: OpenSSL 3.0.0: Use supported hashing algos in doc test (GH-25319) #25319

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
Apr 9, 2021

Conversation

tiran
Copy link
Member

@tiran tiran commented Apr 9, 2021

ripemd160 is not available in OpenSSL 3.0.0's default crypto provider.
It's only present in legacy provider.

Signed-off-by: Christian Heimes [email protected]

https://bugs.python.org/issue38820

ripemd160 is not available in OpenSSL 3.0.0's default crypto provider.
It's only present in legacy provider.

Signed-off-by: Christian Heimes <[email protected]>
@bedevere-bot bedevere-bot added docs Documentation in the Doc dir awaiting core review labels Apr 9, 2021
@tiran tiran changed the title bpo-38820: OpenSSL 3.0.0: Use supported hashing algos in doc test bpo-38820: OpenSSL 3.0.0: Use supported hashing algos in doc test (GH-25319) Apr 9, 2021
@tiran tiran merged commit 2d7fdc9 into python:master Apr 9, 2021
@tiran tiran deleted the bpo-38820-ripemd branch April 9, 2021 20:23
@miss-islington
Copy link
Contributor

Thanks @tiran for the PR 🌮🎉.. I'm working now to backport this PR to: 3.8, 3.9.
🐍🍒⛏🤖

miss-islington pushed a commit to miss-islington/cpython that referenced this pull request Apr 9, 2021
…thonGH-25319)

ripemd160 is not available in OpenSSL 3.0.0's default crypto provider.
It's only present in legacy provider.

Signed-off-by: Christian Heimes <[email protected]>
(cherry picked from commit 2d7fdc9)

Co-authored-by: Christian Heimes <[email protected]>
@bedevere-bot
Copy link

GH-25320 is a backport of this pull request to the 3.9 branch.

@bedevere-bot bedevere-bot removed the needs backport to 3.9 only security fixes label Apr 9, 2021
miss-islington pushed a commit to miss-islington/cpython that referenced this pull request Apr 9, 2021
…thonGH-25319)

ripemd160 is not available in OpenSSL 3.0.0's default crypto provider.
It's only present in legacy provider.

Signed-off-by: Christian Heimes <[email protected]>
(cherry picked from commit 2d7fdc9)

Co-authored-by: Christian Heimes <[email protected]>
@bedevere-bot
Copy link

GH-25321 is a backport of this pull request to the 3.8 branch.

miss-islington added a commit that referenced this pull request Apr 9, 2021
…-25319)

ripemd160 is not available in OpenSSL 3.0.0's default crypto provider.
It's only present in legacy provider.

Signed-off-by: Christian Heimes <[email protected]>
(cherry picked from commit 2d7fdc9)

Co-authored-by: Christian Heimes <[email protected]>
miss-islington added a commit that referenced this pull request Apr 9, 2021
…-25319)

ripemd160 is not available in OpenSSL 3.0.0's default crypto provider.
It's only present in legacy provider.

Signed-off-by: Christian Heimes <[email protected]>
(cherry picked from commit 2d7fdc9)

Co-authored-by: Christian Heimes <[email protected]>
stratakis pushed a commit to stratakis/cpython that referenced this pull request Mar 11, 2024
…thonGH-25319)

ripemd160 is not available in OpenSSL 3.0.0's default crypto provider.
It's only present in legacy provider.

Signed-off-by: Christian Heimes <[email protected]>
(cherry picked from commit 2d7fdc9)

Co-authored-by: Christian Heimes <[email protected]>
mcepl pushed a commit to openSUSE-Python/cpython that referenced this pull request Apr 2, 2024
…thonGH-25319)

ripemd160 is not available in OpenSSL 3.0.0's default crypto provider.
It's only present in legacy provider.

Signed-off-by: Christian Heimes <[email protected]>
(cherry picked from commit 2d7fdc9)

Co-authored-by: Christian Heimes <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
docs Documentation in the Doc dir skip news
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants