diff options
author | Jose <jose@zeroc.com> | 2016-07-01 18:50:05 +0200 |
---|---|---|
committer | Jose <jose@zeroc.com> | 2016-07-01 18:50:05 +0200 |
commit | 0fc0f91dc09fa9c1ad56abdd86a16ac75496e947 (patch) | |
tree | 33a5e608494dab5d93a73019d74cc9dd9f191fc2 /cpp/test | |
parent | Fix to support Debian x32 arch (diff) | |
download | ice-0fc0f91dc09fa9c1ad56abdd86a16ac75496e947.tar.bz2 ice-0fc0f91dc09fa9c1ad56abdd86a16ac75496e947.tar.xz ice-0fc0f91dc09fa9c1ad56abdd86a16ac75496e947.zip |
OpenSSL-1.1.0-pre5 support
Diffstat (limited to 'cpp/test')
-rw-r--r-- | cpp/test/IceSSL/configuration/AllTests.cpp | 30 |
1 files changed, 27 insertions, 3 deletions
diff --git a/cpp/test/IceSSL/configuration/AllTests.cpp b/cpp/test/IceSSL/configuration/AllTests.cpp index 4a0cad36e52..0065e96ab33 100644 --- a/cpp/test/IceSSL/configuration/AllTests.cpp +++ b/cpp/test/IceSSL/configuration/AllTests.cpp @@ -476,6 +476,10 @@ allTests(const CommunicatorPtr& communicator, const string& testDir, bool p12, b initData.properties = createClientProps(defaultProps, defaultDir, defaultHost, p12); initData.properties->setProperty("Ice.InitPlugins", "0"); # ifdef ICE_USE_OPENSSL + // + // With OpenSSL 1.1.0 we need to set SECLEVEL=0 to allow ADH ciphers + // + initData.properties->setProperty("IceSSL.SecurityLevel", "0"); initData.properties->setProperty("IceSSL.Ciphers", "ADH"); # else initData.properties->setProperty("IceSSL.Ciphers", "DH_anon_WITH_AES_256_CBC_SHA"); @@ -489,6 +493,10 @@ allTests(const CommunicatorPtr& communicator, const string& testDir, bool p12, b Test::ServerFactoryPrx fact = Test::ServerFactoryPrx::checkedCast(obj); Test::Properties d = createServerProps(defaultProps, defaultDir, defaultHost, p12); # ifdef ICE_USE_OPENSSL + // + // With OpenSSL 1.1.0 we need to set SECLEVEL=0 to allow ADH ciphers + // + d["IceSSL.SecurityLevel"] = "0"; d["IceSSL.Ciphers"] = "ADH"; # else d["IceSSL.Ciphers"] = "DH_anon_WITH_AES_256_CBC_SHA"; @@ -1197,6 +1205,10 @@ allTests(const CommunicatorPtr& communicator, const string& testDir, bool p12, b InitializationData initData; initData.properties = createClientProps(defaultProps, defaultDir, defaultHost, p12); # ifdef ICE_USE_OPENSSL + // + // With OpenSSL 1.1.0 we need to set SECLEVEL=0 to allow ADH ciphers + // + initData.properties->setProperty("IceSSL.SecurityLevel", "0"); initData.properties->setProperty("IceSSL.Ciphers", "ADH"); # else initData.properties->setProperty("IceSSL.Ciphers", "(DH_anon*)"); @@ -1212,7 +1224,11 @@ allTests(const CommunicatorPtr& communicator, const string& testDir, bool p12, b test(fact); Test::Properties d = createServerProps(defaultProps, defaultDir, defaultHost, p12); # ifdef ICE_USE_OPENSSL + // + // With OpenSSL 1.1.0 we need to set SECLEVEL=0 to allow ADH ciphers + // string cipherSub = "ADH-"; + d["IceSSL.SecurityLevel"] = "0"; d["IceSSL.Ciphers"] = "ADH"; # else string cipherSub = "DH_anon"; @@ -1800,6 +1816,10 @@ allTests(const CommunicatorPtr& communicator, const string& testDir, bool p12, b InitializationData initData; initData.properties = createClientProps(defaultProps, defaultDir, defaultHost, p12); # ifdef ICE_USE_OPENSSL + // + // With OpenSSL 1.1.0 we need to set SECLEVEL=0 to allow ADH ciphers + // + initData.properties->setProperty("IceSSL.SecurityLevel", "0"); initData.properties->setProperty("IceSSL.Ciphers", "ADH"); # else initData.properties->setProperty("IceSSL.Ciphers", "(DH_anon*)"); @@ -1809,6 +1829,10 @@ allTests(const CommunicatorPtr& communicator, const string& testDir, bool p12, b test(fact); Test::Properties d = createServerProps(defaultProps, defaultDir, defaultHost, p12, "s_rsa_ca1", "cacert1"); # ifdef ICE_USE_OPENSSL + // + // With OpenSSL 1.1.0 we need to set SECLEVEL=0 to allow ADH ciphers + // + d["IceSSL.SecurityLevel"] = "0"; string cipherSub = "ADH-"; d["IceSSL.Ciphers"] = "RSA:ADH"; # else @@ -2043,13 +2067,14 @@ allTests(const CommunicatorPtr& communicator, const string& testDir, bool p12, b // InitializationData initData; initData.properties = createClientProps(defaultProps, defaultDir, defaultHost, p12, "c_dsa_ca1", "cacert1"); - initData.properties->setProperty("IceSSL.Ciphers", "DEFAULT:DSS"); + initData.properties->setProperty("IceSSL.Ciphers", "DHE:DSS"); CommunicatorPtr comm = initialize(initData); Test::ServerFactoryPrx fact = Test::ServerFactoryPrx::checkedCast(comm->stringToProxy(factoryRef)); test(fact); Test::Properties d = createServerProps(defaultProps, defaultDir, defaultHost, p12, "s_dsa_ca1", "cacert1"); - d["IceSSL.Ciphers"] = "DEFAULT:DSS"; + d["IceSSL.Ciphers"] = "DHE:DSS"; d["IceSSL.VerifyPeer"] = "1"; + Test::ServerPrx server = fact->createServer(d); try { @@ -2061,7 +2086,6 @@ allTests(const CommunicatorPtr& communicator, const string& testDir, bool p12, b } fact->destroyServer(server); comm->destroy(); - // // Next try a client with an RSA certificate. // |