VirtualBox

Ignore:
Timestamp:
Sep 4, 2024 11:32:47 AM (6 months ago)
Author:
vboxsync
Message:

openssl-3.1.7: Applied and adjusted our OpenSSL changes to 3.1.7. bugref:10757

Location:
trunk/src/libs/openssl-3.1.7
Files:
2 edited

Legend:

Unmodified
Added
Removed
  • trunk/src/libs/openssl-3.1.7

    • Property svn:mergeinfo
      •  

        old new  
        2525/vendor/openssl/3.0.3:151497-151729
        2626/vendor/openssl/3.0.7:154371
         27/vendor/openssl/3.1.7:164675-164677
  • trunk/src/libs/openssl-3.1.7/test/ssl-tests/20-cert-select.cnf.in

    r104078 r105945  
    330330    },
    331331    {
    332         name => "Ed25519 CipherString and Curves Selection",
    333         server => $server,
    334         client => {
    335             "CipherString" => "aECDSA",
    336             "MaxProtocol" => "TLSv1.2",
    337             "SignatureAlgorithms" => "ECDSA+SHA256:ed25519",
    338             # Excluding P-256 from the supported curves list means server
    339             # certificate should be Ed25519 and not P-256
    340             "Curves" => "X25519"
    341         },
    342         test   => {
    343             "ExpectedServerCertType" =>, "Ed25519",
    344             "ExpectedServerSignType" =>, "Ed25519",
    345             "ExpectedResult" => "Success"
    346         },
    347     },
    348     {
    349         name => "Ed448 CipherString and Curves Selection",
    350         server => $server,
    351         client => {
    352             "CipherString" => "aECDSA",
    353             "MaxProtocol" => "TLSv1.2",
    354             "SignatureAlgorithms" => "ECDSA+SHA256:ed448",
    355             "VerifyCAFile" => test_pem("root-ed448-cert.pem"),
    356             # Excluding P-256 from the supported curves list means server
    357             # certificate should be Ed25519 and not P-256
    358             "Curves" => "X448"
    359         },
    360         test   => {
    361             "ExpectedServerCertType" =>, "Ed448",
    362             "ExpectedServerSignType" =>, "Ed448",
    363             "ExpectedResult" => "Success"
    364         },
    365     },
    366     {
    367332        name => "TLS 1.2 Ed25519 Client Auth",
    368333        server => {
     
    444409            # Note: certificate_authorities not sent for TLS < 1.3
    445410            "ExpectedServerCANames" =>, "empty",
     411            "ExpectedResult" => "Success"
     412        },
     413    },
     414    {
     415        name => "Ed25519 CipherString and Curves Selection",
     416        server => $server,
     417        client => {
     418            "CipherString" => "aECDSA",
     419            "MaxProtocol" => "TLSv1.2",
     420            "SignatureAlgorithms" => "ECDSA+SHA256:ed25519",
     421            # Excluding P-256 from the supported curves list means server
     422            # certificate should be Ed25519 and not P-256
     423            "Curves" => "X25519"
     424        },
     425        test   => {
     426            "ExpectedServerCertType" =>, "Ed25519",
     427            "ExpectedServerSignType" =>, "Ed25519",
     428            "ExpectedResult" => "Success"
     429        },
     430    },
     431    {
     432        name => "Ed448 CipherString and Curves Selection",
     433        server => $server,
     434        client => {
     435            "CipherString" => "aECDSA",
     436            "MaxProtocol" => "TLSv1.2",
     437            "SignatureAlgorithms" => "ECDSA+SHA256:ed448",
     438            "VerifyCAFile" => test_pem("root-ed448-cert.pem"),
     439            # Excluding P-256 from the supported curves list means server
     440            # certificate should be Ed25519 and not P-256
     441            "Curves" => "X448"
     442        },
     443        test   => {
     444            "ExpectedServerCertType" =>, "Ed448",
     445            "ExpectedServerSignType" =>, "Ed448",
    446446            "ExpectedResult" => "Success"
    447447        },
Note: See TracChangeset for help on using the changeset viewer.

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette