diff options
author | Phil Pennock <pdp@exim.org> | 2012-05-16 12:15:26 -0400 |
---|---|---|
committer | Phil Pennock <pdp@exim.org> | 2012-05-16 12:15:26 -0400 |
commit | 17c761988f30054827a9951761d93ffeeaad0cb7 (patch) | |
tree | 10d8b048f0c7059c28a2ad5e4257a19e46d47267 /test/scripts | |
parent | f675bf30a2ce6242cfc7c3e3997ec5d68a1fca7a (diff) |
Overhaul of GnuTLS code.
GnuTLS code re-done, using cut&paste for preservation where appropriate.
Stop using deprecated APIs. Stop hard-coding lists of ciphers.
Use gnutls_priority_init() instead.
Turns tls_require_ciphers into a string in the GnuTLS case, not just
OpenSSL case.
Deprecate three gnutls_require_* options; now ignored but not errors.
(No warnings yet).
Added TLS SNI support.
Made the channel binding integration theoretically actually work. I had
it guarded by an #ifdef but the value used was an enum instead. Oops.
Fixed.
New code much more amenable to future work permitting TLS in callouts.
DH param sizes now chosen by GnuTLS maintainers, we use "normal"; that's
suddenly a lot more bits, so the saved filename was changed too.
(GNUTLS_SEC_PARAM_NORMAL).
DH param setup only done for servers now, since clients don't need/use
it.
GnuTLS a lot more robust to library negotiation using stuff we don't
support, error-ing out quickly for other authentication systems (PGP,
etc).
Renamed pseudo_random_number() to vaguely_random_number() which makes
the nature clearer.
GnuTLS now provides a vaguely_random_number() implementation, to match
OpenSSL.
Pull in <inttypes.h> to make the recent arithmetic changes compile on
MacOS.
Nuke test 2011 which related to the gnutls_require_* options now
non-functional.
Diffstat (limited to 'test/scripts')
-rw-r--r-- | test/scripts/2000-GnuTLS/2011 | 39 |
1 files changed, 0 insertions, 39 deletions
diff --git a/test/scripts/2000-GnuTLS/2011 b/test/scripts/2000-GnuTLS/2011 deleted file mode 100644 index 6f72fba80..000000000 --- a/test/scripts/2000-GnuTLS/2011 +++ /dev/null @@ -1,39 +0,0 @@ -# TLS client & server: (gnu)tls_require_xxx -gnutls -# Start up the server -exim -DSERVER=server -bd -oX PORT_D -**** -# This puts a message on the queue (queue_only is set). -exim userx@test.ex -Testing -**** -# This will fail to deliver encrypted because there are no acceptable -# ciphers, so it will deliver in clear. -exim -qf -DCREQCIP=tls_require_ciphers=IDEA-CBC-MD5 -**** -# This delivers the message to the server, where it will remain -# on the queue because queue_only is set. -exim -qf -DCREQCIP=tls_require_ciphers=IDEA-CBC-MD5:DES-CBC3-SHA:RSA_ARCFOUR_SHA -**** -# So we can deliver it again and again, with different parameters. -exim -qf -DCREQMAC=gnutls_require_mac=MD5 -**** -exim -qf -DCREQMAC=gnutls_require_mac=!SHA1 -**** -exim -qf -DCREQMAC=gnutls_require_mac=MD5:SHA -**** -exim -qf -DCREQMAC=gnutls_require_kx=!DHE -**** -exim -qf -DCREQMAC=gnutls_require_protocols=SSL3 -**** -# Restart the server with a cipher restriction -killdaemon -exim -DSERVER=server \ - -DSREQCIP=tls_require_ciphers=ARCFOUR \ - -DSREQMAC=gnutls_require_mac=MD5 \ - -bd -oX PORT_D -**** -exim -qf -**** -killdaemon -no_msglog_check |