Revision 4264ecd4cebf7cee4bd437f1739e9f4297ae5b70 authored by Matt Caswell on 01 May 2020, 08:17:40 UTC, committed by Matt Caswell on 06 May 2020, 10:49:59 UTC
We were not correctly detecting whether TLSv1.3 ciphersuites could
actually be supported by the available provider implementations. For
example a FIPS client would still offer CHACHA20-POLY1305 based
ciphersuites even though it couldn't actually use them. Similarly on
the server would try to use CHACHA20-POLY1305 and then fail the
handshake.

Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org>
(Merged from https://github.com/openssl/openssl/pull/11700)
1 parent 15dd075
Raw File
platform.pm
package platform;

use strict;
use warnings;
use vars qw(@ISA);

# Callers must make sure @INC has the build directory
use configdata;

my $module = $target{perl_platform} || 'Unix';
(my $module_path = $module) =~ s|::|/|g;

require "platform/$module_path.pm";
@ISA = ("platform::$module");

1;

__END__
back to top