Blame SOURCES/openssl-1.1.1-no-brainpool.patch

9b88be
diff -up openssl-1.1.1d/test/ssl-tests/20-cert-select.conf.in.no-brainpool openssl-1.1.1d/test/ssl-tests/20-cert-select.conf.in
9b88be
--- openssl-1.1.1d/test/ssl-tests/20-cert-select.conf.in.no-brainpool	2019-09-10 15:13:07.000000000 +0200
9b88be
+++ openssl-1.1.1d/test/ssl-tests/20-cert-select.conf.in	2019-09-13 15:11:07.358687169 +0200
9b88be
@@ -147,22 +147,22 @@ our @tests = (
9b88be
     {
9b88be
         name => "ECDSA with brainpool",
9b88be
         server =>  {
9b88be
-            "Certificate" => test_pem("server-ecdsa-brainpoolP256r1-cert.pem"),
9b88be
-            "PrivateKey" => test_pem("server-ecdsa-brainpoolP256r1-key.pem"),
9b88be
-            "Groups" => "brainpoolP256r1",
9b88be
+            "Certificate" => test_pem("server-ecdsa-cert.pem"),
9b88be
+            "PrivateKey" => test_pem("server-ecdsa-key.pem"),
9b88be
+#            "Groups" => "brainpoolP256r1",
9b88be
         },
9b88be
         client => {
9b88be
             #We don't restrict this to TLSv1.2, although use of brainpool
9b88be
             #should force this anyway so that this should succeed
9b88be
             "CipherString" => "aECDSA",
9b88be
             "RequestCAFile" => test_pem("root-cert.pem"),
9b88be
-            "Groups" => "brainpoolP256r1",
9b88be
+#            "Groups" => "brainpoolP256r1",
9b88be
         },
9b88be
         test   => {
9b88be
-            "ExpectedServerCertType" =>, "brainpoolP256r1",
9b88be
-            "ExpectedServerSignType" =>, "EC",
9b88be
+#            "ExpectedServerCertType" =>, "brainpoolP256r1",
9b88be
+#            "ExpectedServerSignType" =>, "EC",
9b88be
             # Note: certificate_authorities not sent for TLS < 1.3
9b88be
-            "ExpectedServerCANames" =>, "empty",
9b88be
+#            "ExpectedServerCANames" =>, "empty",
9b88be
             "ExpectedResult" => "Success"
9b88be
         },
9b88be
     },
9b88be
@@ -853,18 +853,18 @@ my @tests_tls_1_3 = (
9b88be
     {
9b88be
         name => "TLS 1.3 ECDSA with brainpool",
9b88be
         server =>  {
9b88be
-            "Certificate" => test_pem("server-ecdsa-brainpoolP256r1-cert.pem"),
9b88be
-            "PrivateKey" => test_pem("server-ecdsa-brainpoolP256r1-key.pem"),
9b88be
-            "Groups" => "brainpoolP256r1",
9b88be
+            "Certificate" => test_pem("server-ecdsa-cert.pem"),
9b88be
+            "PrivateKey" => test_pem("server-ecdsa-key.pem"),
9b88be
+#            "Groups" => "brainpoolP256r1",
9b88be
         },
9b88be
         client => {
9b88be
             "RequestCAFile" => test_pem("root-cert.pem"),
9b88be
-            "Groups" => "brainpoolP256r1",
9b88be
+#            "Groups" => "brainpoolP256r1",
9b88be
             "MinProtocol" => "TLSv1.3",
9b88be
             "MaxProtocol" => "TLSv1.3"
9b88be
         },
9b88be
         test   => {
9b88be
-            "ExpectedResult" => "ServerFail"
9b88be
+            "ExpectedResult" => "Success"
9b88be
         },
9b88be
     },
9b88be
 );
9b88be
diff -up openssl-1.1.1d/test/ssl-tests/20-cert-select.conf.no-brainpool openssl-1.1.1d/test/ssl-tests/20-cert-select.conf
9b88be
--- openssl-1.1.1d/test/ssl-tests/20-cert-select.conf.no-brainpool	2019-09-10 15:13:07.000000000 +0200
9b88be
+++ openssl-1.1.1d/test/ssl-tests/20-cert-select.conf	2019-09-13 15:12:27.380288469 +0200
9b88be
@@ -238,23 +238,18 @@ server = 5-ECDSA with brainpool-server
9b88be
 client = 5-ECDSA with brainpool-client
9b88be
 
9b88be
 [5-ECDSA with brainpool-server]
9b88be
-Certificate = ${ENV::TEST_CERTS_DIR}/server-ecdsa-brainpoolP256r1-cert.pem
9b88be
+Certificate = ${ENV::TEST_CERTS_DIR}/server-ecdsa-cert.pem
9b88be
 CipherString = DEFAULT
9b88be
-Groups = brainpoolP256r1
9b88be
-PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ecdsa-brainpoolP256r1-key.pem
9b88be
+PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ecdsa-key.pem
9b88be
 
9b88be
 [5-ECDSA with brainpool-client]
9b88be
 CipherString = aECDSA
9b88be
-Groups = brainpoolP256r1
9b88be
 RequestCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
9b88be
 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
9b88be
 VerifyMode = Peer
9b88be
 
9b88be
 [test-5]
9b88be
 ExpectedResult = Success
9b88be
-ExpectedServerCANames = empty
9b88be
-ExpectedServerCertType = brainpoolP256r1
9b88be
-ExpectedServerSignType = EC
9b88be
 
9b88be
 
9b88be
 # ===========================================================
9b88be
@@ -1713,14 +1708,12 @@ server = 52-TLS 1.3 ECDSA with brainpool
9b88be
 client = 52-TLS 1.3 ECDSA with brainpool-client
9b88be
 
9b88be
 [52-TLS 1.3 ECDSA with brainpool-server]
9b88be
-Certificate = ${ENV::TEST_CERTS_DIR}/server-ecdsa-brainpoolP256r1-cert.pem
9b88be
+Certificate = ${ENV::TEST_CERTS_DIR}/server-ecdsa-cert.pem
9b88be
 CipherString = DEFAULT
9b88be
-Groups = brainpoolP256r1
9b88be
-PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ecdsa-brainpoolP256r1-key.pem
9b88be
+PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ecdsa-key.pem
9b88be
 
9b88be
 [52-TLS 1.3 ECDSA with brainpool-client]
9b88be
 CipherString = DEFAULT
9b88be
-Groups = brainpoolP256r1
9b88be
 MaxProtocol = TLSv1.3
9b88be
 MinProtocol = TLSv1.3
9b88be
 RequestCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
9b88be
@@ -1728,7 +1721,7 @@ VerifyCAFile = ${ENV::TEST_CERTS_DIR}/ro
9b88be
 VerifyMode = Peer
9b88be
 
9b88be
 [test-52]
9b88be
-ExpectedResult = ServerFail
9b88be
+ExpectedResult = Success
9b88be
 
9b88be
 
9b88be
 # ===========================================================