Do not set @SECLEVEL with boringssl#9989
Conversation
|
Too much duplication. I'd suggest: and |
|
SECLEVEL=0 was OK for a stopgap, but I assume there's a better way to address this. Should the cipher suite value be updated for the more stringent openssl3? This would presumably make boringssl happy too. |
bneradt
left a comment
There was a problem hiding this comment.
I assume tests/gold_tests/tls/tls_client_versions_minmax.test.py will need to be updated with a similar change?
Ah, nevermind. I suppose the issue with these tests is that they force the older TLS versions which OpenSSL 3.0 now requires an explicit SECLEVEL=0 configuration to use. |
Looks good. But no need for the format string. This should work just fine: 'proxy.config.ssl.server.cipher_suite': cipher_suite,Thank you @masaori335 for updating for boringssl. |
28470c8 to
055d4ca
Compare
|
Updated to reduce dups. Please take another look. |
bneradt
left a comment
There was a problem hiding this comment.
Thanks for the update for OpenSSL 3.x
(cherry picked from commit b462f08)
|
Cherry-picked to v9.2.x |
An AuTest filed with boringssl. It looks like boringssl doesn't like the change for the openssl 3.0 (#9753).