e41f67
diff --git a/ext/openssl/extconf.rb b/ext/openssl/extconf.rb
e41f67
index fedcb93..53ad621 100644
e41f67
--- a/ext/openssl/extconf.rb
e41f67
+++ b/ext/openssl/extconf.rb
e41f67
@@ -169,6 +169,7 @@ have_func("SSL_CTX_set_post_handshake_auth")
e41f67
 
e41f67
 # added in 1.1.1
e41f67
 have_func("EVP_PKEY_check")
e41f67
+have_func("SSL_CTX_set_ciphersuites")
e41f67
 
e41f67
 # added in 3.0.0
e41f67
 have_func("SSL_set0_tmp_dh_pkey")
e41f67
diff --git a/ext/openssl/ossl.h b/ext/openssl/ossl.h
e41f67
index 4b51268..2ab8aea 100644
e41f67
--- a/ext/openssl/ossl.h
e41f67
+++ b/ext/openssl/ossl.h
e41f67
@@ -43,13 +43,13 @@
e41f67
 #ifndef LIBRESSL_VERSION_NUMBER
e41f67
 # define OSSL_IS_LIBRESSL 0
e41f67
 # define OSSL_OPENSSL_PREREQ(maj, min, pat) \
e41f67
-      (OPENSSL_VERSION_NUMBER >= (maj << 28) | (min << 20) | (pat << 12))
e41f67
+      (OPENSSL_VERSION_NUMBER >= ((maj << 28) | (min << 20) | (pat << 12)))
e41f67
 # define OSSL_LIBRESSL_PREREQ(maj, min, pat) 0
e41f67
 #else
e41f67
 # define OSSL_IS_LIBRESSL 1
e41f67
 # define OSSL_OPENSSL_PREREQ(maj, min, pat) 0
e41f67
 # define OSSL_LIBRESSL_PREREQ(maj, min, pat) \
e41f67
-      (LIBRESSL_VERSION_NUMBER >= (maj << 28) | (min << 20) | (pat << 12))
e41f67
+      (LIBRESSL_VERSION_NUMBER >= ((maj << 28) | (min << 20) | (pat << 12)))
e41f67
 #endif
e41f67
 
e41f67
 #if !defined(OPENSSL_NO_ENGINE) && !OSSL_OPENSSL_PREREQ(3, 0, 0)
e41f67
diff --git a/ext/openssl/ossl_asn1.c b/ext/openssl/ossl_asn1.c
e41f67
index a61d3ee..0d3fa9a 100644
e41f67
--- a/ext/openssl/ossl_asn1.c
e41f67
+++ b/ext/openssl/ossl_asn1.c
e41f67
@@ -1522,7 +1522,7 @@ Init_ossl_asn1(void)
e41f67
      *
e41f67
      * An Array that stores the name of a given tag number. These names are
e41f67
      * the same as the name of the tag constant that is additionally defined,
e41f67
-     * e.g. +UNIVERSAL_TAG_NAME[2] = "INTEGER"+ and +OpenSSL::ASN1::INTEGER = 2+.
e41f67
+     * e.g. <tt>UNIVERSAL_TAG_NAME[2] = "INTEGER"</tt> and <tt>OpenSSL::ASN1::INTEGER = 2</tt>.
e41f67
      *
e41f67
      * == Example usage
e41f67
      *
e41f67
diff --git a/ext/openssl/ossl_pkey.c b/ext/openssl/ossl_pkey.c
e41f67
index 2a4835a..24d0da4 100644
e41f67
--- a/ext/openssl/ossl_pkey.c
e41f67
+++ b/ext/openssl/ossl_pkey.c
e41f67
@@ -670,7 +670,7 @@ ossl_pkey_export_traditional(int argc, VALUE *argv, VALUE self, int to_der)
e41f67
 	}
e41f67
     }
e41f67
     else {
e41f67
-#if OPENSSL_VERSION_NUMBER >= 0x10100000 && !defined(LIBRESSL_VERSION_NUMBER)
e41f67
+#if OSSL_OPENSSL_PREREQ(1, 1, 0) || OSSL_LIBRESSL_PREREQ(3, 5, 0)
e41f67
 	if (!PEM_write_bio_PrivateKey_traditional(bio, pkey, enc, NULL, 0,
e41f67
 						  ossl_pem_passwd_cb,
e41f67
 						  (void *)pass)) {
e41f67
diff --git a/ext/openssl/ossl_ssl.c b/ext/openssl/ossl_ssl.c
e41f67
index 9a0682a..af262d9 100644
e41f67
--- a/ext/openssl/ossl_ssl.c
e41f67
+++ b/ext/openssl/ossl_ssl.c
e41f67
@@ -959,27 +959,13 @@ ossl_sslctx_get_ciphers(VALUE self)
e41f67
     return ary;
e41f67
 }
e41f67
 
e41f67
-/*
e41f67
- * call-seq:
e41f67
- *    ctx.ciphers = "cipher1:cipher2:..."
e41f67
- *    ctx.ciphers = [name, ...]
e41f67
- *    ctx.ciphers = [[name, version, bits, alg_bits], ...]
e41f67
- *
e41f67
- * Sets the list of available cipher suites for this context.  Note in a server
e41f67
- * context some ciphers require the appropriate certificates.  For example, an
e41f67
- * RSA cipher suite can only be chosen when an RSA certificate is available.
e41f67
- */
e41f67
 static VALUE
e41f67
-ossl_sslctx_set_ciphers(VALUE self, VALUE v)
e41f67
+build_cipher_string(VALUE v)
e41f67
 {
e41f67
-    SSL_CTX *ctx;
e41f67
     VALUE str, elem;
e41f67
     int i;
e41f67
 
e41f67
-    rb_check_frozen(self);
e41f67
-    if (NIL_P(v))
e41f67
-	return v;
e41f67
-    else if (RB_TYPE_P(v, T_ARRAY)) {
e41f67
+    if (RB_TYPE_P(v, T_ARRAY)) {
e41f67
         str = rb_str_new(0, 0);
e41f67
         for (i = 0; i < RARRAY_LEN(v); i++) {
e41f67
             elem = rb_ary_entry(v, i);
e41f67
@@ -993,14 +979,67 @@ ossl_sslctx_set_ciphers(VALUE self, VALUE v)
e41f67
         StringValue(str);
e41f67
     }
e41f67
 
e41f67
+    return str;
e41f67
+}
e41f67
+
e41f67
+/*
e41f67
+ * call-seq:
e41f67
+ *    ctx.ciphers = "cipher1:cipher2:..."
e41f67
+ *    ctx.ciphers = [name, ...]
e41f67
+ *    ctx.ciphers = [[name, version, bits, alg_bits], ...]
e41f67
+ *
e41f67
+ * Sets the list of available cipher suites for this context.  Note in a server
e41f67
+ * context some ciphers require the appropriate certificates.  For example, an
e41f67
+ * RSA cipher suite can only be chosen when an RSA certificate is available.
e41f67
+ */
e41f67
+static VALUE
e41f67
+ossl_sslctx_set_ciphers(VALUE self, VALUE v)
e41f67
+{
e41f67
+    SSL_CTX *ctx;
e41f67
+    VALUE str;
e41f67
+
e41f67
+    rb_check_frozen(self);
e41f67
+    if (NIL_P(v))
e41f67
+        return v;
e41f67
+
e41f67
+    str = build_cipher_string(v);
e41f67
+
e41f67
     GetSSLCTX(self, ctx);
e41f67
-    if (!SSL_CTX_set_cipher_list(ctx, StringValueCStr(str))) {
e41f67
+    if (!SSL_CTX_set_cipher_list(ctx, StringValueCStr(str)))
e41f67
         ossl_raise(eSSLError, "SSL_CTX_set_cipher_list");
e41f67
-    }
e41f67
 
e41f67
     return v;
e41f67
 }
e41f67
 
e41f67
+#ifdef HAVE_SSL_CTX_SET_CIPHERSUITES
e41f67
+/*
e41f67
+ * call-seq:
e41f67
+ *    ctx.ciphersuites = "cipher1:cipher2:..."
e41f67
+ *    ctx.ciphersuites = [name, ...]
e41f67
+ *    ctx.ciphersuites = [[name, version, bits, alg_bits], ...]
e41f67
+ *
e41f67
+ * Sets the list of available TLSv1.3 cipher suites for this context.
e41f67
+ */
e41f67
+static VALUE
e41f67
+ossl_sslctx_set_ciphersuites(VALUE self, VALUE v)
e41f67
+{
e41f67
+    SSL_CTX *ctx;
e41f67
+    VALUE str;
e41f67
+
e41f67
+    rb_check_frozen(self);
e41f67
+    if (NIL_P(v))
e41f67
+        return v;
e41f67
+
e41f67
+    str = build_cipher_string(v);
e41f67
+
e41f67
+    GetSSLCTX(self, ctx);
e41f67
+    if (!SSL_CTX_set_ciphersuites(ctx, StringValueCStr(str)))
e41f67
+        ossl_raise(eSSLError, "SSL_CTX_set_ciphersuites");
e41f67
+
e41f67
+    return v;
e41f67
+}
e41f67
+#endif
e41f67
+
e41f67
 #ifndef OPENSSL_NO_DH
e41f67
 /*
e41f67
  * call-seq:
e41f67
@@ -2703,6 +2742,9 @@ Init_ossl_ssl(void)
e41f67
 			     ossl_sslctx_set_minmax_proto_version, 2);
e41f67
     rb_define_method(cSSLContext, "ciphers",     ossl_sslctx_get_ciphers, 0);
e41f67
     rb_define_method(cSSLContext, "ciphers=",    ossl_sslctx_set_ciphers, 1);
e41f67
+#ifdef HAVE_SSL_CTX_SET_CIPHERSUITES
e41f67
+    rb_define_method(cSSLContext, "ciphersuites=", ossl_sslctx_set_ciphersuites, 1);
e41f67
+#endif
e41f67
 #ifndef OPENSSL_NO_DH
e41f67
     rb_define_method(cSSLContext, "tmp_dh=", ossl_sslctx_set_tmp_dh, 1);
e41f67
 #endif
e41f67
diff --git a/test/openssl/test_asn1.rb b/test/openssl/test_asn1.rb
e41f67
index 0fd7971..c79bc14 100644
e41f67
--- a/test/openssl/test_asn1.rb
e41f67
+++ b/test/openssl/test_asn1.rb
e41f67
@@ -14,7 +14,7 @@ class  OpenSSL::TestASN1 < OpenSSL::TestCase
e41f67
       ["keyUsage","keyCertSign, cRLSign",true],
e41f67
       ["subjectKeyIdentifier","hash",false],
e41f67
     ]
e41f67
-    dgst = OpenSSL::Digest.new('SHA1')
e41f67
+    dgst = OpenSSL::Digest.new('SHA256')
e41f67
     cert = OpenSSL::TestUtils.issue_cert(
e41f67
       subj, key, s, exts, nil, nil, digest: dgst, not_before: now, not_after: now+3600)
e41f67
 
e41f67
@@ -42,7 +42,7 @@ class  OpenSSL::TestASN1 < OpenSSL::TestCase
e41f67
     assert_equal(OpenSSL::ASN1::Sequence, sig.class)
e41f67
     assert_equal(2, sig.value.size)
e41f67
     assert_equal(OpenSSL::ASN1::ObjectId, sig.value[0].class)
e41f67
-    assert_equal("1.2.840.113549.1.1.5", sig.value[0].oid)
e41f67
+    assert_equal("1.2.840.113549.1.1.11", sig.value[0].oid)
e41f67
     assert_equal(OpenSSL::ASN1::Null, sig.value[1].class)
e41f67
 
e41f67
     dn = tbs_cert.value[3] # issuer
e41f67
@@ -189,7 +189,7 @@ class  OpenSSL::TestASN1 < OpenSSL::TestCase
e41f67
     assert_equal(OpenSSL::ASN1::Null, pkey.value[0].value[1].class)
e41f67
 
e41f67
     assert_equal(OpenSSL::ASN1::BitString, sig_val.class)
e41f67
-    cululated_sig = key.sign(OpenSSL::Digest.new('SHA1'), tbs_cert.to_der)
e41f67
+    cululated_sig = key.sign(OpenSSL::Digest.new('SHA256'), tbs_cert.to_der)
e41f67
     assert_equal(cululated_sig, sig_val.value)
e41f67
   end
e41f67
 
e41f67
diff --git a/test/openssl/test_ns_spki.rb b/test/openssl/test_ns_spki.rb
e41f67
index ed3be86..383931b 100644
e41f67
--- a/test/openssl/test_ns_spki.rb
e41f67
+++ b/test/openssl/test_ns_spki.rb
e41f67
@@ -22,7 +22,7 @@ class OpenSSL::TestNSSPI < OpenSSL::TestCase
e41f67
     spki = OpenSSL::Netscape::SPKI.new
e41f67
     spki.challenge = "RandomString"
e41f67
     spki.public_key = key1.public_key
e41f67
-    spki.sign(key1, OpenSSL::Digest.new('SHA1'))
e41f67
+    spki.sign(key1, OpenSSL::Digest.new('SHA256'))
e41f67
     assert(spki.verify(spki.public_key))
e41f67
     assert(spki.verify(key1.public_key))
e41f67
     assert(!spki.verify(key2.public_key))
e41f67
diff --git a/test/openssl/test_pkey_dsa.rb b/test/openssl/test_pkey_dsa.rb
e41f67
index 726b7db..08213df 100644
e41f67
--- a/test/openssl/test_pkey_dsa.rb
e41f67
+++ b/test/openssl/test_pkey_dsa.rb
e41f67
@@ -36,8 +36,8 @@ class OpenSSL::TestPKeyDSA < OpenSSL::PKeyTestCase
e41f67
       assert_equal true, dsa512.verify(OpenSSL::Digest.new('DSS1'), signature, data)
e41f67
     end
e41f67
 
e41f67
-    signature = dsa512.sign("SHA1", data)
e41f67
-    assert_equal true, dsa512.verify("SHA1", signature, data)
e41f67
+    signature = dsa512.sign("SHA256", data)
e41f67
+    assert_equal true, dsa512.verify("SHA256", signature, data)
e41f67
 
e41f67
     signature0 = (<<~'end;').unpack("m")[0]
e41f67
       MCwCFH5h40plgU5Fh0Z4wvEEpz0eE9SnAhRPbkRB8ggsN/vsSEYMXvJwjGg/
e41f67
diff --git a/test/openssl/test_pkey_ec.rb b/test/openssl/test_pkey_ec.rb
e41f67
index ffe5a94..c06fe6f 100644
e41f67
--- a/test/openssl/test_pkey_ec.rb
e41f67
+++ b/test/openssl/test_pkey_ec.rb
e41f67
@@ -98,8 +98,8 @@ class OpenSSL::TestEC < OpenSSL::PKeyTestCase
e41f67
   def test_sign_verify
e41f67
     p256 = Fixtures.pkey("p256")
e41f67
     data = "Sign me!"
e41f67
-    signature = p256.sign("SHA1", data)
e41f67
-    assert_equal true, p256.verify("SHA1", signature, data)
e41f67
+    signature = p256.sign("SHA256", data)
e41f67
+    assert_equal true, p256.verify("SHA256", signature, data)
e41f67
 
e41f67
     signature0 = (<<~'end;').unpack("m")[0]
e41f67
       MEQCIEOTY/hD7eI8a0qlzxkIt8LLZ8uwiaSfVbjX2dPAvN11AiAQdCYx56Fq
e41f67
diff --git a/test/openssl/test_pkey_rsa.rb b/test/openssl/test_pkey_rsa.rb
e41f67
index 4bb39ed..9e06e43 100644
e41f67
--- a/test/openssl/test_pkey_rsa.rb
e41f67
+++ b/test/openssl/test_pkey_rsa.rb
e41f67
@@ -80,8 +80,8 @@ class OpenSSL::TestPKeyRSA < OpenSSL::PKeyTestCase
e41f67
   def test_sign_verify
e41f67
     rsa1024 = Fixtures.pkey("rsa1024")
e41f67
     data = "Sign me!"
e41f67
-    signature = rsa1024.sign("SHA1", data)
e41f67
-    assert_equal true, rsa1024.verify("SHA1", signature, data)
e41f67
+    signature = rsa1024.sign("SHA256", data)
e41f67
+    assert_equal true, rsa1024.verify("SHA256", signature, data)
e41f67
 
e41f67
     signature0 = (<<~'end;').unpack("m")[0]
e41f67
       oLCgbprPvfhM4pjFQiDTFeWI9Sk+Og7Nh9TmIZ/xSxf2CGXQrptlwo7NQ28+
e41f67
@@ -113,10 +113,10 @@ class OpenSSL::TestPKeyRSA < OpenSSL::PKeyTestCase
e41f67
   def test_sign_verify_raw
e41f67
     key = Fixtures.pkey("rsa-1")
e41f67
     data = "Sign me!"
e41f67
-    hash = OpenSSL::Digest.digest("SHA1", data)
e41f67
-    signature = key.sign_raw("SHA1", hash)
e41f67
-    assert_equal true, key.verify_raw("SHA1", signature, hash)
e41f67
-    assert_equal true, key.verify("SHA1", signature, data)
e41f67
+    hash = OpenSSL::Digest.digest("SHA256", data)
e41f67
+    signature = key.sign_raw("SHA256", hash)
e41f67
+    assert_equal true, key.verify_raw("SHA256", signature, hash)
e41f67
+    assert_equal true, key.verify("SHA256", signature, data)
e41f67
 
e41f67
     # Too long data
e41f67
     assert_raise(OpenSSL::PKey::PKeyError) {
e41f67
@@ -129,9 +129,9 @@ class OpenSSL::TestPKeyRSA < OpenSSL::PKeyTestCase
e41f67
       "rsa_pss_saltlen" => 20,
e41f67
       "rsa_mgf1_md" => "SHA256"
e41f67
     }
e41f67
-    sig_pss = key.sign_raw("SHA1", hash, pssopts)
e41f67
-    assert_equal true, key.verify("SHA1", sig_pss, data, pssopts)
e41f67
-    assert_equal true, key.verify_raw("SHA1", sig_pss, hash, pssopts)
e41f67
+    sig_pss = key.sign_raw("SHA256", hash, pssopts)
e41f67
+    assert_equal true, key.verify("SHA256", sig_pss, data, pssopts)
e41f67
+    assert_equal true, key.verify_raw("SHA256", sig_pss, hash, pssopts)
e41f67
   end
e41f67
 
e41f67
   def test_sign_verify_raw_legacy
e41f67
diff --git a/test/openssl/test_ssl.rb b/test/openssl/test_ssl.rb
e41f67
index a7607da..3ba8b39 100644
e41f67
--- a/test/openssl/test_ssl.rb
e41f67
+++ b/test/openssl/test_ssl.rb
e41f67
@@ -676,10 +676,16 @@ class OpenSSL::TestSSL < OpenSSL::SSLTestCase
e41f67
     #     buzz.example.net, respectively).  ...
e41f67
     assert_equal(true, OpenSSL::SSL.verify_certificate_identity(
e41f67
       create_cert_with_san('DNS:baz*.example.com'), 'baz1.example.com'))
e41f67
+
e41f67
+    # LibreSSL 3.5.0+ doesn't support other wildcard certificates
e41f67
+    # (it isn't required to, as RFC states MAY, not MUST)
e41f67
+    return if libressl?(3, 5, 0)
e41f67
+
e41f67
     assert_equal(true, OpenSSL::SSL.verify_certificate_identity(
e41f67
       create_cert_with_san('DNS:*baz.example.com'), 'foobaz.example.com'))
e41f67
     assert_equal(true, OpenSSL::SSL.verify_certificate_identity(
e41f67
       create_cert_with_san('DNS:b*z.example.com'), 'buzz.example.com'))
e41f67
+
e41f67
     # Section 6.4.3 of RFC6125 states that client should NOT match identifier
e41f67
     # where wildcard is other than left-most label.
e41f67
     #
e41f67
@@ -1563,6 +1569,99 @@ class OpenSSL::TestSSL < OpenSSL::SSLTestCase
e41f67
     end
e41f67
   end
e41f67
 
e41f67
+  def test_ciphersuites_method_tls_connection
e41f67
+    ssl_ctx = OpenSSL::SSL::SSLContext.new
e41f67
+    if !tls13_supported? || !ssl_ctx.respond_to?(:ciphersuites=)
e41f67
+      pend 'TLS 1.3 not supported'
e41f67
+    end
e41f67
+
e41f67
+    csuite = ['TLS_AES_128_GCM_SHA256', 'TLSv1.3', 128, 128]
e41f67
+    inputs = [csuite[0], [csuite[0]], [csuite]]
e41f67
+
e41f67
+    start_server do |port|
e41f67
+      inputs.each do |input|
e41f67
+        cli_ctx = OpenSSL::SSL::SSLContext.new
e41f67
+        cli_ctx.min_version = cli_ctx.max_version = OpenSSL::SSL::TLS1_3_VERSION
e41f67
+        cli_ctx.ciphersuites = input
e41f67
+
e41f67
+        server_connect(port, cli_ctx) do |ssl|
e41f67
+          assert_equal('TLSv1.3', ssl.ssl_version)
e41f67
+          if libressl?(3, 4, 0) && !libressl?(3, 5, 0)
e41f67
+            assert_equal("AEAD-AES128-GCM-SHA256", ssl.cipher[0]) 
e41f67
+          else
e41f67
+            assert_equal(csuite[0], ssl.cipher[0]) 
e41f67
+          end
e41f67
+          ssl.puts('abc'); assert_equal("abc\n", ssl.gets)
e41f67
+        end
e41f67
+      end
e41f67
+    end
e41f67
+  end
e41f67
+
e41f67
+  def test_ciphersuites_method_nil_argument
e41f67
+    ssl_ctx = OpenSSL::SSL::SSLContext.new
e41f67
+    pend 'ciphersuites= method is missing' unless ssl_ctx.respond_to?(:ciphersuites=)
e41f67
+
e41f67
+    assert_nothing_raised { ssl_ctx.ciphersuites = nil }
e41f67
+  end
e41f67
+
e41f67
+  def test_ciphersuites_method_frozen_object
e41f67
+    ssl_ctx = OpenSSL::SSL::SSLContext.new
e41f67
+    pend 'ciphersuites= method is missing' unless ssl_ctx.respond_to?(:ciphersuites=)
e41f67
+
e41f67
+    ssl_ctx.freeze
e41f67
+    assert_raise(FrozenError) { ssl_ctx.ciphersuites = 'TLS_AES_256_GCM_SHA384' }
e41f67
+  end
e41f67
+
e41f67
+  def test_ciphersuites_method_bogus_csuite
e41f67
+    ssl_ctx = OpenSSL::SSL::SSLContext.new
e41f67
+    pend 'ciphersuites= method is missing' unless ssl_ctx.respond_to?(:ciphersuites=)
e41f67
+
e41f67
+    assert_raise_with_message(
e41f67
+      OpenSSL::SSL::SSLError,
e41f67
+      /SSL_CTX_set_ciphersuites: no cipher match/i
e41f67
+    ) { ssl_ctx.ciphersuites = 'BOGUS' }
e41f67
+  end
e41f67
+
e41f67
+  def test_ciphers_method_tls_connection
e41f67
+    csuite = ['ECDHE-RSA-AES256-GCM-SHA384', 'TLSv1.2', 256, 256]
e41f67
+    inputs = [csuite[0], [csuite[0]], [csuite]]
e41f67
+
e41f67
+    start_server do |port|
e41f67
+      inputs.each do |input|
e41f67
+        cli_ctx = OpenSSL::SSL::SSLContext.new
e41f67
+        cli_ctx.min_version = cli_ctx.max_version = OpenSSL::SSL::TLS1_2_VERSION
e41f67
+        cli_ctx.ciphers = input
e41f67
+
e41f67
+        server_connect(port, cli_ctx) do |ssl|
e41f67
+          assert_equal('TLSv1.2', ssl.ssl_version)
e41f67
+          assert_equal(csuite[0], ssl.cipher[0])
e41f67
+          ssl.puts('abc'); assert_equal("abc\n", ssl.gets)
e41f67
+        end
e41f67
+      end
e41f67
+    end
e41f67
+  end
e41f67
+
e41f67
+  def test_ciphers_method_nil_argument
e41f67
+    ssl_ctx = OpenSSL::SSL::SSLContext.new
e41f67
+    assert_nothing_raised { ssl_ctx.ciphers = nil }
e41f67
+  end
e41f67
+
e41f67
+  def test_ciphers_method_frozen_object
e41f67
+    ssl_ctx = OpenSSL::SSL::SSLContext.new
e41f67
+
e41f67
+    ssl_ctx.freeze
e41f67
+    assert_raise(FrozenError) { ssl_ctx.ciphers = 'ECDHE-RSA-AES128-SHA' }
e41f67
+  end
e41f67
+
e41f67
+  def test_ciphers_method_bogus_csuite
e41f67
+    ssl_ctx = OpenSSL::SSL::SSLContext.new
e41f67
+
e41f67
+    assert_raise_with_message(
e41f67
+      OpenSSL::SSL::SSLError,
e41f67
+      /SSL_CTX_set_cipher_list: no cipher match/i
e41f67
+    ) { ssl_ctx.ciphers = 'BOGUS' }
e41f67
+  end
e41f67
+
e41f67
   def test_connect_works_when_setting_dh_callback_to_nil
e41f67
     ctx_proc = -> ctx {
e41f67
       ctx.max_version = :TLS1_2
e41f67
diff --git a/test/openssl/test_x509cert.rb b/test/openssl/test_x509cert.rb
e41f67
index d696b98..4e2bd0c 100644
e41f67
--- a/test/openssl/test_x509cert.rb
e41f67
+++ b/test/openssl/test_x509cert.rb
e41f67
@@ -180,6 +180,7 @@ class OpenSSL::TestX509Certificate < OpenSSL::TestCase
e41f67
     assert_equal(false, certificate_error_returns_false { cert.verify(@dsa512) })
e41f67
     cert.serial = 2
e41f67
     assert_equal(false, cert.verify(@rsa2048))
e41f67
+  rescue OpenSSL::X509::CertificateError # RHEL 9 disables SHA1
e41f67
   end
e41f67
 
e41f67
   def test_sign_and_verify_rsa_md5
e41f67
@@ -226,9 +227,8 @@ class OpenSSL::TestX509Certificate < OpenSSL::TestCase
e41f67
     assert_equal("dsa_with_SHA256", cert.signature_algorithm)
e41f67
     # TODO: need more tests for dsa + sha2
e41f67
 
e41f67
-    # SHA1 is allowed from OpenSSL 1.0.0 (0.9.8 requires DSS1)
e41f67
-    cert = issue_cert(@ca, @dsa256, 1, [], nil, nil, digest: "sha1")
e41f67
-    assert_equal("dsaWithSHA1", cert.signature_algorithm)
e41f67
+    cert = issue_cert(@ca, @dsa256, 1, [], nil, nil, digest: "sha512")
e41f67
+    assert_equal("dsa_with_SHA512", cert.signature_algorithm)
e41f67
   end
e41f67
 
e41f67
   def test_check_private_key
e41f67
diff --git a/test/openssl/test_x509crl.rb b/test/openssl/test_x509crl.rb
e41f67
index bcdb0a6..146ee07 100644
e41f67
--- a/test/openssl/test_x509crl.rb
e41f67
+++ b/test/openssl/test_x509crl.rb
e41f67
@@ -20,7 +20,7 @@ class OpenSSL::TestX509CRL < OpenSSL::TestCase
e41f67
 
e41f67
     cert = issue_cert(@ca, @rsa2048, 1, [], nil, nil)
e41f67
     crl = issue_crl([], 1, now, now+1600, [],
e41f67
-                    cert, @rsa2048, OpenSSL::Digest.new('SHA1'))
e41f67
+                    cert, @rsa2048, OpenSSL::Digest.new('SHA256'))
e41f67
     assert_equal(1, crl.version)
e41f67
     assert_equal(cert.issuer.to_der, crl.issuer.to_der)
e41f67
     assert_equal(now, crl.last_update)
e41f67
@@ -57,7 +57,7 @@ class OpenSSL::TestX509CRL < OpenSSL::TestCase
e41f67
     ]
e41f67
     cert = issue_cert(@ca, @rsa2048, 1, [], nil, nil)
e41f67
     crl = issue_crl(revoke_info, 1, Time.now, Time.now+1600, [],
e41f67
-                    cert, @rsa2048, OpenSSL::Digest.new('SHA1'))
e41f67
+                    cert, @rsa2048, OpenSSL::Digest.new('SHA256'))
e41f67
     revoked = crl.revoked
e41f67
     assert_equal(5, revoked.size)
e41f67
     assert_equal(1, revoked[0].serial)
e41f67
@@ -98,7 +98,7 @@ class OpenSSL::TestX509CRL < OpenSSL::TestCase
e41f67
 
e41f67
     revoke_info = (1..1000).collect{|i| [i, now, 0] }
e41f67
     crl = issue_crl(revoke_info, 1, Time.now, Time.now+1600, [],
e41f67
-                    cert, @rsa2048, OpenSSL::Digest.new('SHA1'))
e41f67
+                    cert, @rsa2048, OpenSSL::Digest.new('SHA256'))
e41f67
     revoked = crl.revoked
e41f67
     assert_equal(1000, revoked.size)
e41f67
     assert_equal(1, revoked[0].serial)
e41f67
@@ -124,7 +124,7 @@ class OpenSSL::TestX509CRL < OpenSSL::TestCase
e41f67
 
e41f67
     cert = issue_cert(@ca, @rsa2048, 1, cert_exts, nil, nil)
e41f67
     crl = issue_crl([], 1, Time.now, Time.now+1600, crl_exts,
e41f67
-                    cert, @rsa2048, OpenSSL::Digest.new('SHA1'))
e41f67
+                    cert, @rsa2048, OpenSSL::Digest.new('SHA256'))
e41f67
     exts = crl.extensions
e41f67
     assert_equal(3, exts.size)
e41f67
     assert_equal("1", exts[0].value)
e41f67
@@ -160,24 +160,24 @@ class OpenSSL::TestX509CRL < OpenSSL::TestCase
e41f67
     assert_equal(false, exts[2].critical?)
e41f67
 
e41f67
     no_ext_crl = issue_crl([], 1, Time.now, Time.now+1600, [],
e41f67
-      cert, @rsa2048, OpenSSL::Digest.new('SHA1'))
e41f67
+      cert, @rsa2048, OpenSSL::Digest.new('SHA256'))
e41f67
     assert_equal nil, no_ext_crl.authority_key_identifier
e41f67
   end
e41f67
 
e41f67
   def test_crlnumber
e41f67
     cert = issue_cert(@ca, @rsa2048, 1, [], nil, nil)
e41f67
     crl = issue_crl([], 1, Time.now, Time.now+1600, [],
e41f67
-                    cert, @rsa2048, OpenSSL::Digest.new('SHA1'))
e41f67
+                    cert, @rsa2048, OpenSSL::Digest.new('SHA256'))
e41f67
     assert_match(1.to_s, crl.extensions[0].value)
e41f67
     assert_match(/X509v3 CRL Number:\s+#{1}/m, crl.to_text)
e41f67
 
e41f67
     crl = issue_crl([], 2**32, Time.now, Time.now+1600, [],
e41f67
-                    cert, @rsa2048, OpenSSL::Digest.new('SHA1'))
e41f67
+                    cert, @rsa2048, OpenSSL::Digest.new('SHA256'))
e41f67
     assert_match((2**32).to_s, crl.extensions[0].value)
e41f67
     assert_match(/X509v3 CRL Number:\s+#{2**32}/m, crl.to_text)
e41f67
 
e41f67
     crl = issue_crl([], 2**100, Time.now, Time.now+1600, [],
e41f67
-                    cert, @rsa2048, OpenSSL::Digest.new('SHA1'))
e41f67
+                    cert, @rsa2048, OpenSSL::Digest.new('SHA256'))
e41f67
     assert_match(/X509v3 CRL Number:\s+#{2**100}/m, crl.to_text)
e41f67
     assert_match((2**100).to_s, crl.extensions[0].value)
e41f67
   end
e41f67
@@ -185,7 +185,7 @@ class OpenSSL::TestX509CRL < OpenSSL::TestCase
e41f67
   def test_sign_and_verify
e41f67
     cert = issue_cert(@ca, @rsa2048, 1, [], nil, nil)
e41f67
     crl = issue_crl([], 1, Time.now, Time.now+1600, [],
e41f67
-                    cert, @rsa2048, OpenSSL::Digest.new('SHA1'))
e41f67
+                    cert, @rsa2048, OpenSSL::Digest.new('SHA256'))
e41f67
     assert_equal(false, crl.verify(@rsa1024))
e41f67
     assert_equal(true,  crl.verify(@rsa2048))
e41f67
     assert_equal(false, crl_error_returns_false { crl.verify(@dsa256) })
e41f67
@@ -195,7 +195,7 @@ class OpenSSL::TestX509CRL < OpenSSL::TestCase
e41f67
 
e41f67
     cert = issue_cert(@ca, @dsa512, 1, [], nil, nil)
e41f67
     crl = issue_crl([], 1, Time.now, Time.now+1600, [],
e41f67
-                    cert, @dsa512, OpenSSL::Digest.new('SHA1'))
e41f67
+                    cert, @dsa512, OpenSSL::Digest.new('SHA256'))
e41f67
     assert_equal(false, crl_error_returns_false { crl.verify(@rsa1024) })
e41f67
     assert_equal(false, crl_error_returns_false { crl.verify(@rsa2048) })
e41f67
     assert_equal(false, crl.verify(@dsa256))
e41f67
diff --git a/test/openssl/test_x509req.rb b/test/openssl/test_x509req.rb
e41f67
index ee9c678..a84b162 100644
e41f67
--- a/test/openssl/test_x509req.rb
e41f67
+++ b/test/openssl/test_x509req.rb
e41f67
@@ -23,31 +23,31 @@ class OpenSSL::TestX509Request < OpenSSL::TestCase
e41f67
   end
e41f67
 
e41f67
   def test_public_key
e41f67
-    req = issue_csr(0, @dn, @rsa1024, OpenSSL::Digest.new('SHA1'))
e41f67
+    req = issue_csr(0, @dn, @rsa1024, OpenSSL::Digest.new('SHA256'))
e41f67
     assert_equal(@rsa1024.public_key.to_der, req.public_key.to_der)
e41f67
     req = OpenSSL::X509::Request.new(req.to_der)
e41f67
     assert_equal(@rsa1024.public_key.to_der, req.public_key.to_der)
e41f67
 
e41f67
-    req = issue_csr(0, @dn, @dsa512, OpenSSL::Digest.new('SHA1'))
e41f67
+    req = issue_csr(0, @dn, @dsa512, OpenSSL::Digest.new('SHA256'))
e41f67
     assert_equal(@dsa512.public_key.to_der, req.public_key.to_der)
e41f67
     req = OpenSSL::X509::Request.new(req.to_der)
e41f67
     assert_equal(@dsa512.public_key.to_der, req.public_key.to_der)
e41f67
   end
e41f67
 
e41f67
   def test_version
e41f67
-    req = issue_csr(0, @dn, @rsa1024, OpenSSL::Digest.new('SHA1'))
e41f67
+    req = issue_csr(0, @dn, @rsa1024, OpenSSL::Digest.new('SHA256'))
e41f67
     assert_equal(0, req.version)
e41f67
     req = OpenSSL::X509::Request.new(req.to_der)
e41f67
     assert_equal(0, req.version)
e41f67
 
e41f67
-    req = issue_csr(1, @dn, @rsa1024, OpenSSL::Digest.new('SHA1'))
e41f67
+    req = issue_csr(1, @dn, @rsa1024, OpenSSL::Digest.new('SHA256'))
e41f67
     assert_equal(1, req.version)
e41f67
     req = OpenSSL::X509::Request.new(req.to_der)
e41f67
     assert_equal(1, req.version)
e41f67
   end
e41f67
 
e41f67
   def test_subject
e41f67
-    req = issue_csr(0, @dn, @rsa1024, OpenSSL::Digest.new('SHA1'))
e41f67
+    req = issue_csr(0, @dn, @rsa1024, OpenSSL::Digest.new('SHA256'))
e41f67
     assert_equal(@dn.to_der, req.subject.to_der)
e41f67
     req = OpenSSL::X509::Request.new(req.to_der)
e41f67
     assert_equal(@dn.to_der, req.subject.to_der)
e41f67
@@ -78,9 +78,9 @@ class OpenSSL::TestX509Request < OpenSSL::TestCase
e41f67
       OpenSSL::X509::Attribute.new("msExtReq", attrval),
e41f67
     ]
e41f67
 
e41f67
-    req0 = issue_csr(0, @dn, @rsa1024, OpenSSL::Digest.new('SHA1'))
e41f67
+    req0 = issue_csr(0, @dn, @rsa1024, OpenSSL::Digest.new('SHA256'))
e41f67
     attrs.each{|attr| req0.add_attribute(attr) }
e41f67
-    req1 = issue_csr(0, @dn, @rsa1024, OpenSSL::Digest.new('SHA1'))
e41f67
+    req1 = issue_csr(0, @dn, @rsa1024, OpenSSL::Digest.new('SHA256'))
e41f67
     req1.attributes = attrs
e41f67
     assert_equal(req0.to_der, req1.to_der)
e41f67
 
e41f67
@@ -101,7 +101,7 @@ class OpenSSL::TestX509Request < OpenSSL::TestCase
e41f67
   end
e41f67
 
e41f67
   def test_sign_and_verify_rsa_sha1
e41f67
-    req = issue_csr(0, @dn, @rsa1024, OpenSSL::Digest.new('SHA1'))
e41f67
+    req = issue_csr(0, @dn, @rsa1024, OpenSSL::Digest.new('SHA256'))
e41f67
     assert_equal(true,  req.verify(@rsa1024))
e41f67
     assert_equal(false, req.verify(@rsa2048))
e41f67
     assert_equal(false, request_error_returns_false { req.verify(@dsa256) })
e41f67
@@ -122,7 +122,7 @@ class OpenSSL::TestX509Request < OpenSSL::TestCase
e41f67
   end
e41f67
 
e41f67
   def test_sign_and_verify_dsa
e41f67
-    req = issue_csr(0, @dn, @dsa512, OpenSSL::Digest.new('SHA1'))
e41f67
+    req = issue_csr(0, @dn, @dsa512, OpenSSL::Digest.new('SHA256'))
e41f67
     assert_equal(false, request_error_returns_false { req.verify(@rsa1024) })
e41f67
     assert_equal(false, request_error_returns_false { req.verify(@rsa2048) })
e41f67
     assert_equal(false, req.verify(@dsa256))
e41f67
@@ -137,13 +137,13 @@ class OpenSSL::TestX509Request < OpenSSL::TestCase
e41f67
   end
e41f67
 
e41f67
   def test_dup
e41f67
-    req = issue_csr(0, @dn, @rsa1024, OpenSSL::Digest.new('SHA1'))
e41f67
+    req = issue_csr(0, @dn, @rsa1024, OpenSSL::Digest.new('SHA256'))
e41f67
     assert_equal(req.to_der, req.dup.to_der)
e41f67
   end
e41f67
 
e41f67
   def test_eq
e41f67
-    req1 = issue_csr(0, @dn, @rsa1024, "sha1")
e41f67
-    req2 = issue_csr(0, @dn, @rsa1024, "sha1")
e41f67
+    req1 = issue_csr(0, @dn, @rsa1024, "sha512")
e41f67
+    req2 = issue_csr(0, @dn, @rsa1024, "sha512")
e41f67
     req3 = issue_csr(0, @dn, @rsa1024, "sha256")
e41f67
 
e41f67
     assert_equal false, req1 == 12345