diff options
author | tb <> | 2022-02-05 18:18:18 +0000 |
---|---|---|
committer | tb <> | 2022-02-05 18:18:18 +0000 |
commit | 853bb6e844ee6365e958fc2e64686a6fdd24459c (patch) | |
tree | 26b86cb618fa624cd2a6c747425dd6207aa32c42 /src/lib/libssl/ssl_ciphers.c | |
parent | c7cd75e51d33708442e984b9b2e0ef9c09472ae7 (diff) | |
download | openbsd-853bb6e844ee6365e958fc2e64686a6fdd24459c.tar.gz openbsd-853bb6e844ee6365e958fc2e64686a6fdd24459c.tar.bz2 openbsd-853bb6e844ee6365e958fc2e64686a6fdd24459c.zip |
Switch TLSv1.3 cipher names from AEAD- to OpenSSL's TLS_
OpenSSL chose to break the previous naming convention for ciphers and
to adopt TLS_* "RFC" names instead. Unfortunately, these names are
exposed in several APIs and some language bindings test for these
non-standard names instead of cipher values, which is ... unfortunate
(others would say "plain crazy").
We currently have to maintain patches in regress and ports (p5-Net-SSLeay,
openssl-ruby-tests - which means that Ruby will pick this up at some point)
to work around this difference and that's just not worth the effort.
The old AEAD- names will become aliases and continue to work, but in
openssl ciphers and netcat output the TLS_* names will now be displayed.
"I would be very happy if this gets committed" bluhm
ok beck inoguchi, begrudgingly ok jsing
Diffstat (limited to 'src/lib/libssl/ssl_ciphers.c')
-rw-r--r-- | src/lib/libssl/ssl_ciphers.c | 22 |
1 files changed, 11 insertions, 11 deletions
diff --git a/src/lib/libssl/ssl_ciphers.c b/src/lib/libssl/ssl_ciphers.c index 7ac40126ed..3174ae9c26 100644 --- a/src/lib/libssl/ssl_ciphers.c +++ b/src/lib/libssl/ssl_ciphers.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ssl_ciphers.c,v 1.12 2022/02/05 14:54:10 jsing Exp $ */ | 1 | /* $OpenBSD: ssl_ciphers.c,v 1.13 2022/02/05 18:18:18 tb Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2015-2017 Doug Hogan <doug@openbsd.org> | 3 | * Copyright (c) 2015-2017 Doug Hogan <doug@openbsd.org> |
4 | * Copyright (c) 2015-2018, 2020 Joel Sing <jsing@openbsd.org> | 4 | * Copyright (c) 2015-2018, 2020 Joel Sing <jsing@openbsd.org> |
@@ -168,28 +168,28 @@ struct ssl_tls13_ciphersuite { | |||
168 | 168 | ||
169 | static const struct ssl_tls13_ciphersuite ssl_tls13_ciphersuites[] = { | 169 | static const struct ssl_tls13_ciphersuite ssl_tls13_ciphersuites[] = { |
170 | { | 170 | { |
171 | .name = TLS1_3_TXT_AES_128_GCM_SHA256, | 171 | .name = TLS1_3_RFC_AES_128_GCM_SHA256, |
172 | .alias = "TLS_AES_128_GCM_SHA256", | 172 | .alias = TLS1_3_TXT_AES_128_GCM_SHA256, |
173 | .cid = TLS1_3_CK_AES_128_GCM_SHA256, | 173 | .cid = TLS1_3_CK_AES_128_GCM_SHA256, |
174 | }, | 174 | }, |
175 | { | 175 | { |
176 | .name = TLS1_3_TXT_AES_256_GCM_SHA384, | 176 | .name = TLS1_3_RFC_AES_256_GCM_SHA384, |
177 | .alias = "TLS_AES_256_GCM_SHA384", | 177 | .alias = TLS1_3_TXT_AES_256_GCM_SHA384, |
178 | .cid = TLS1_3_CK_AES_256_GCM_SHA384, | 178 | .cid = TLS1_3_CK_AES_256_GCM_SHA384, |
179 | }, | 179 | }, |
180 | { | 180 | { |
181 | .name = TLS1_3_TXT_CHACHA20_POLY1305_SHA256, | 181 | .name = TLS1_3_RFC_CHACHA20_POLY1305_SHA256, |
182 | .alias = "TLS_CHACHA20_POLY1305_SHA256", | 182 | .alias = TLS1_3_TXT_CHACHA20_POLY1305_SHA256, |
183 | .cid = TLS1_3_CK_CHACHA20_POLY1305_SHA256, | 183 | .cid = TLS1_3_CK_CHACHA20_POLY1305_SHA256, |
184 | }, | 184 | }, |
185 | { | 185 | { |
186 | .name = TLS1_3_TXT_AES_128_CCM_SHA256, | 186 | .name = TLS1_3_RFC_AES_128_CCM_SHA256, |
187 | .alias = "TLS_AES_128_CCM_SHA256", | 187 | .alias = TLS1_3_TXT_AES_128_CCM_SHA256, |
188 | .cid = TLS1_3_CK_AES_128_CCM_SHA256, | 188 | .cid = TLS1_3_CK_AES_128_CCM_SHA256, |
189 | }, | 189 | }, |
190 | { | 190 | { |
191 | .name = TLS1_3_TXT_AES_128_CCM_8_SHA256, | 191 | .name = TLS1_3_RFC_AES_128_CCM_8_SHA256, |
192 | .alias = "TLS_AES_128_CCM_8_SHA256", | 192 | .alias = TLS1_3_TXT_AES_128_CCM_8_SHA256, |
193 | .cid = TLS1_3_CK_AES_128_CCM_8_SHA256, | 193 | .cid = TLS1_3_CK_AES_128_CCM_8_SHA256, |
194 | }, | 194 | }, |
195 | { | 195 | { |