Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 922338 Details for
Bug 1123435
Flaws in test script and conditional compile for disabling SSL2 and export suites support
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
[patch]
removal from to sslcov.txt of SSL2 and export tests cases
sslcov.patch (text/plain), 4.27 KB, created by
Elio Maldonado Batiz
on 2014-07-29 20:35:12 UTC
(
hide
)
Description:
removal from to sslcov.txt of SSL2 and export tests cases
Filename:
MIME Type:
Creator:
Elio Maldonado Batiz
Created:
2014-07-29 20:35:12 UTC
Size:
4.27 KB
patch
obsolete
>*** sslcov.txt 2014-06-24 13:45:27.000000000 -0700 >--- sslcov.txt.disableSSL2test 2014-07-29 13:15:57.463569838 -0700 >*************** >*** 5,90 **** > # This file enables test coverage of the various SSL ciphers > # > # NOTE: SSL2 ciphers are independent of whether TLS is enabled or not. We > # mix up the enable functions so we can tests boths paths. > # > # Enable Enable Cipher Test Name > # EC TLS > # >- noECC SSL3 A SSL2_RC4_128_WITH_MD5 >- noECC TLS10 B SSL2_RC4_128_EXPORT40_WITH_MD5 >- noECC TLS10 C SSL2_RC2_128_CBC_WITH_MD5 >- noECC SSL3 D SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 >- noECC TLS10 E SSL2_DES_64_CBC_WITH_MD5 >- noECC SSL3 F SSL2_DES_192_EDE3_CBC_WITH_MD5 >- # >- noECC TLS11 B SSL2_RC4_128_EXPORT40_WITH_MD5 >- noECC TLS11 C SSL2_RC2_128_CBC_WITH_MD5 >- noECC TLS11 E SSL2_DES_64_CBC_WITH_MD5 > # > noECC SSL3 c SSL3_RSA_WITH_RC4_128_MD5 > noECC SSL3 d SSL3_RSA_WITH_3DES_EDE_CBC_SHA > noECC SSL3 e SSL3_RSA_WITH_DES_CBC_SHA >- noECC SSL3 f SSL3_RSA_EXPORT_WITH_RC4_40_MD5 >- noECC SSL3 g SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 > noECC SSL3 i SSL3_RSA_WITH_NULL_MD5 > noECC SSL3 j SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA > noECC SSL3 k SSL3_RSA_FIPS_WITH_DES_CBC_SHA >- noECC SSL3 l SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) >- noECC SSL3 m SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) > noECC SSL3 n SSL3_RSA_WITH_RC4_128_SHA > noECC SSL3 v SSL3_RSA_WITH_AES_128_CBC_SHA > noECC SSL3 y SSL3_RSA_WITH_AES_256_CBC_SHA > noECC SSL3 z SSL3_RSA_WITH_NULL_SHA > # noECC SSL3 :0041 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA > # noECC SSL3 :0084 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA > # > noECC TLS10 c TLS_RSA_WITH_RC4_128_MD5 > noECC TLS10 d TLS_RSA_WITH_3DES_EDE_CBC_SHA > noECC TLS10 e TLS_RSA_WITH_DES_CBC_SHA >- noECC TLS10 f TLS_RSA_EXPORT_WITH_RC4_40_MD5 >- noECC TLS10 g TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 > noECC TLS10 i TLS_RSA_WITH_NULL_MD5 > noECC TLS10 j TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA > noECC TLS10 k TLS_RSA_FIPS_WITH_DES_CBC_SHA >- noECC TLS10 l TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) >- noECC TLS10 m TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) > noECC TLS10 n TLS_RSA_WITH_RC4_128_SHA > noECC TLS10 v TLS_RSA_WITH_AES_128_CBC_SHA > noECC TLS10 y TLS_RSA_WITH_AES_256_CBC_SHA > noECC TLS10 z TLS_RSA_WITH_NULL_SHA > # noECC TLS10 :0041 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA > # noECC TLS10 :0084 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA > # > # > noECC TLS11 c TLS11_RSA_WITH_RC4_128_MD5 > noECC TLS11 d TLS11_RSA_WITH_3DES_EDE_CBC_SHA > noECC TLS11 e TLS11_RSA_WITH_DES_CBC_SHA >- # 40 bit ciphers not allowed in tls 1.1 >- # noECC TLS11 f TLS11_RSA_EXPORT_WITH_RC4_40_MD5 >- # noECC TLS11 g TLS11_RSA_EXPORT_WITH_RC2_CBC_40_MD5 > noECC TLS11 i TLS11_RSA_WITH_NULL_MD5 > noECC TLS11 j TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA > noECC TLS11 k TLS11_RSA_FIPS_WITH_DES_CBC_SHA >- noECC TLS11 l TLS11_RSA_EXPORT_WITH_DES_CBC_SHA (new) >- noECC TLS11 m TLS11_RSA_EXPORT_WITH_RC4_56_SHA (new) > noECC TLS11 n TLS11_RSA_WITH_RC4_128_SHA > noECC TLS11 v TLS11_RSA_WITH_AES_128_CBC_SHA > noECC TLS11 y TLS11_RSA_WITH_AES_256_CBC_SHA > noECC TLS11 z TLS11_RSA_WITH_NULL_SHA > # > noECC TLS12 c TLS12_RSA_WITH_RC4_128_MD5 > noECC TLS12 d TLS12_RSA_WITH_3DES_EDE_CBC_SHA > noECC TLS12 e TLS12_RSA_WITH_DES_CBC_SHA > noECC TLS12 i TLS12_RSA_WITH_NULL_MD5 > noECC TLS12 j TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA > noECC TLS12 k TLS12_RSA_FIPS_WITH_DES_CBC_SHA >- noECC TLS12 l TLS12_RSA_EXPORT_WITH_DES_CBC_SHA (new) >- noECC TLS12 m TLS12_RSA_EXPORT_WITH_RC4_56_SHA (new) > noECC TLS12 n TLS12_RSA_WITH_RC4_128_SHA > noECC TLS12 v TLS12_RSA_WITH_AES_128_CBC_SHA > noECC TLS12 y TLS12_RSA_WITH_AES_256_CBC_SHA > noECC TLS12 z TLS12_RSA_WITH_NULL_SHA > noECC TLS12 :003B TLS12_RSA_WITH_NULL_SHA256 > noECC TLS12 :003C TLS12_RSA_WITH_AES_128_CBC_SHA256 > noECC TLS12 :003D TLS12_RSA_WITH_AES_256_CBC_SHA256 > noECC TLS12 :009C TLS12_RSA_WITH_AES_128_GCM_SHA256 >--- 5,65 ----
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Diff
View Attachment As Raw
Flags:
rrelyea
: review+
Actions:
View
|
Diff
Attachments on
bug 1123435
:
921077
|
921080
|
921082
| 922338 |
922339
|
922341
|
922344
|
922640
|
922673
|
922728
|
922970
|
986851
|
988982
|
989305
|
1058571
|
1059558
|
1061267
|
1061281