|
|
7f4443 |
diff -up nss/gtests/ssl_gtest/ssl_auth_unittest.cc.reorder-cipher-suites-gtests nss/gtests/ssl_gtest/ssl_auth_unittest.cc
|
|
|
7f4443 |
--- nss/gtests/ssl_gtest/ssl_auth_unittest.cc.reorder-cipher-suites-gtests 2017-09-20 08:47:27.000000000 +0200
|
|
|
7f4443 |
+++ nss/gtests/ssl_gtest/ssl_auth_unittest.cc 2017-10-06 16:41:39.223713982 +0200
|
|
|
7f4443 |
@@ -222,7 +222,9 @@ static SSLNamedGroup NamedGroupForEcdsa3
|
|
|
7f4443 |
// NSS tries to match the group size to the symmetric cipher. In TLS 1.1 and
|
|
|
7f4443 |
// 1.0, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA is the highest priority suite, so
|
|
|
7f4443 |
// we use P-384. With TLS 1.2 on we pick AES-128 GCM so use x25519.
|
|
|
7f4443 |
- if (version <= SSL_LIBRARY_VERSION_TLS_1_1) {
|
|
|
7f4443 |
+ // FIXME: In RHEL, we assign TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
|
|
|
7f4443 |
+ // a higher priority than AES-128 GCM.
|
|
|
7f4443 |
+ if (version <= SSL_LIBRARY_VERSION_TLS_1_2) {
|
|
|
7f4443 |
return ssl_grp_ec_secp384r1;
|
|
|
7f4443 |
}
|
|
|
7f4443 |
return ssl_grp_ec_curve25519;
|
|
|
7f4443 |
@@ -806,20 +808,24 @@ INSTANTIATE_TEST_CASE_P(
|
|
|
7f4443 |
::testing::Values(TlsAgent::kServerEcdsa256),
|
|
|
7f4443 |
::testing::Values(ssl_auth_ecdsa),
|
|
|
7f4443 |
::testing::Values(ssl_sig_ecdsa_secp256r1_sha256)));
|
|
|
7f4443 |
+ // FIXME: In RHEL, we assign TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
|
|
|
7f4443 |
+ // a higher priority than AES-128 GCM, and that causes the following
|
|
|
7f4443 |
+ // 3 TLS 1.2 tests to fail.
|
|
|
7f4443 |
INSTANTIATE_TEST_CASE_P(
|
|
|
7f4443 |
SignatureSchemeEcdsaP384, TlsSignatureSchemeConfiguration,
|
|
|
7f4443 |
::testing::Combine(TlsConnectTestBase::kTlsVariantsAll,
|
|
|
7f4443 |
- TlsConnectTestBase::kTlsV12Plus,
|
|
|
7f4443 |
+ TlsConnectTestBase::kTlsV13,
|
|
|
7f4443 |
::testing::Values(TlsAgent::kServerEcdsa384),
|
|
|
7f4443 |
::testing::Values(ssl_auth_ecdsa),
|
|
|
7f4443 |
::testing::Values(ssl_sig_ecdsa_secp384r1_sha384)));
|
|
|
7f4443 |
INSTANTIATE_TEST_CASE_P(
|
|
|
7f4443 |
SignatureSchemeEcdsaP521, TlsSignatureSchemeConfiguration,
|
|
|
7f4443 |
::testing::Combine(TlsConnectTestBase::kTlsVariantsAll,
|
|
|
7f4443 |
- TlsConnectTestBase::kTlsV12Plus,
|
|
|
7f4443 |
+ TlsConnectTestBase::kTlsV13,
|
|
|
7f4443 |
::testing::Values(TlsAgent::kServerEcdsa521),
|
|
|
7f4443 |
::testing::Values(ssl_auth_ecdsa),
|
|
|
7f4443 |
::testing::Values(ssl_sig_ecdsa_secp521r1_sha512)));
|
|
|
7f4443 |
+#if 0
|
|
|
7f4443 |
INSTANTIATE_TEST_CASE_P(
|
|
|
7f4443 |
SignatureSchemeEcdsaSha1, TlsSignatureSchemeConfiguration,
|
|
|
7f4443 |
::testing::Combine(TlsConnectTestBase::kTlsVariantsAll,
|
|
|
7f4443 |
@@ -828,4 +834,5 @@ INSTANTIATE_TEST_CASE_P(
|
|
|
7f4443 |
TlsAgent::kServerEcdsa384),
|
|
|
7f4443 |
::testing::Values(ssl_auth_ecdsa),
|
|
|
7f4443 |
::testing::Values(ssl_sig_ecdsa_sha1)));
|
|
|
7f4443 |
+#endif
|
|
|
7f4443 |
}
|