th5/testdata
Adam Langley cfd077fd28 crypto/tls: support AES-128-CBC cipher suites with SHA-256.
These were new with TLS 1.2 and, reportedly, some servers require it.
Since it's easy, this change adds suport for three flavours of
AES-128-CBC with SHA-256 MACs.

Other testdata/ files have to be updated because this changes the list
of cipher suites offered by default by the client.

Fixes #15487.

Change-Id: I1b14330c31eeda20185409a37072343552c3464f
Reviewed-on: https://go-review.googlesource.com/27315
Run-TryBot: Adam Langley <agl@golang.org>
Reviewed-by: Brad Fitzpatrick <bradfitz@golang.org>
Reviewed-by: Jonathan Rudenberg <jonathan@titanous.com>
TryBot-Result: Gobot Gobot <gobot@golang.org>
2016-08-18 21:46:46 +00:00
..
Client-TLSv10-ClientCert-ECDSA-ECDSA crypto/tls: support AES-128-CBC cipher suites with SHA-256. 2016-08-18 21:46:46 +00:00
Client-TLSv10-ClientCert-ECDSA-RSA crypto/tls: support AES-128-CBC cipher suites with SHA-256. 2016-08-18 21:46:46 +00:00
Client-TLSv10-ClientCert-RSA-ECDSA crypto/tls: support AES-128-CBC cipher suites with SHA-256. 2016-08-18 21:46:46 +00:00
Client-TLSv10-ClientCert-RSA-RSA crypto/tls: support AES-128-CBC cipher suites with SHA-256. 2016-08-18 21:46:46 +00:00
Client-TLSv10-ECDHE-ECDSA-AES crypto/tls: support AES-128-CBC cipher suites with SHA-256. 2016-08-18 21:46:46 +00:00
Client-TLSv10-ECDHE-RSA-AES crypto/tls: support AES-128-CBC cipher suites with SHA-256. 2016-08-18 21:46:46 +00:00
Client-TLSv10-RSA-RC4 crypto/tls: support AES-128-CBC cipher suites with SHA-256. 2016-08-18 21:46:46 +00:00
Client-TLSv11-ECDHE-ECDSA-AES crypto/tls: support AES-128-CBC cipher suites with SHA-256. 2016-08-18 21:46:46 +00:00
Client-TLSv11-ECDHE-RSA-AES crypto/tls: support AES-128-CBC cipher suites with SHA-256. 2016-08-18 21:46:46 +00:00
Client-TLSv11-RSA-RC4 crypto/tls: support AES-128-CBC cipher suites with SHA-256. 2016-08-18 21:46:46 +00:00
Client-TLSv12-AES128-GCM-SHA256 crypto/tls: support AES-128-CBC cipher suites with SHA-256. 2016-08-18 21:46:46 +00:00
Client-TLSv12-AES128-SHA256 crypto/tls: support AES-128-CBC cipher suites with SHA-256. 2016-08-18 21:46:46 +00:00
Client-TLSv12-AES256-GCM-SHA384 crypto/tls: support AES-128-CBC cipher suites with SHA-256. 2016-08-18 21:46:46 +00:00
Client-TLSv12-ALPN crypto/tls: support AES-128-CBC cipher suites with SHA-256. 2016-08-18 21:46:46 +00:00
Client-TLSv12-ALPN-NoMatch crypto/tls: support AES-128-CBC cipher suites with SHA-256. 2016-08-18 21:46:46 +00:00
Client-TLSv12-ClientCert-ECDSA-ECDSA crypto/tls: support AES-128-CBC cipher suites with SHA-256. 2016-08-18 21:46:46 +00:00
Client-TLSv12-ClientCert-ECDSA-RSA crypto/tls: support AES-128-CBC cipher suites with SHA-256. 2016-08-18 21:46:46 +00:00
Client-TLSv12-ClientCert-RSA-AES256-GCM-SHA384 crypto/tls: support AES-128-CBC cipher suites with SHA-256. 2016-08-18 21:46:46 +00:00
Client-TLSv12-ClientCert-RSA-ECDSA crypto/tls: support AES-128-CBC cipher suites with SHA-256. 2016-08-18 21:46:46 +00:00
Client-TLSv12-ClientCert-RSA-RSA crypto/tls: support AES-128-CBC cipher suites with SHA-256. 2016-08-18 21:46:46 +00:00
Client-TLSv12-ECDHE-ECDSA-AES crypto/tls: support AES-128-CBC cipher suites with SHA-256. 2016-08-18 21:46:46 +00:00
Client-TLSv12-ECDHE-ECDSA-AES128-SHA256 crypto/tls: support AES-128-CBC cipher suites with SHA-256. 2016-08-18 21:46:46 +00:00
Client-TLSv12-ECDHE-ECDSA-AES256-GCM-SHA384 crypto/tls: support AES-128-CBC cipher suites with SHA-256. 2016-08-18 21:46:46 +00:00
Client-TLSv12-ECDHE-ECDSA-AES-GCM crypto/tls: support AES-128-CBC cipher suites with SHA-256. 2016-08-18 21:46:46 +00:00
Client-TLSv12-ECDHE-RSA-AES crypto/tls: support AES-128-CBC cipher suites with SHA-256. 2016-08-18 21:46:46 +00:00
Client-TLSv12-ECDHE-RSA-AES128-SHA256 crypto/tls: support AES-128-CBC cipher suites with SHA-256. 2016-08-18 21:46:46 +00:00
Client-TLSv12-RenegotiateOnce crypto/tls: support AES-128-CBC cipher suites with SHA-256. 2016-08-18 21:46:46 +00:00
Client-TLSv12-RenegotiateTwice crypto/tls: support AES-128-CBC cipher suites with SHA-256. 2016-08-18 21:46:46 +00:00
Client-TLSv12-RenegotiateTwiceRejected crypto/tls: support AES-128-CBC cipher suites with SHA-256. 2016-08-18 21:46:46 +00:00
Client-TLSv12-RenegotiationRejected crypto/tls: support AES-128-CBC cipher suites with SHA-256. 2016-08-18 21:46:46 +00:00
Client-TLSv12-RSA-RC4 crypto/tls: support AES-128-CBC cipher suites with SHA-256. 2016-08-18 21:46:46 +00:00
Client-TLSv12-SCT crypto/tls: support AES-128-CBC cipher suites with SHA-256. 2016-08-18 21:46:46 +00:00
Server-SSLv3-RSA-3DES crypto/x509: require a NULL parameters for RSA public keys. 2016-08-17 23:47:18 +00:00
Server-SSLv3-RSA-AES crypto/x509: require a NULL parameters for RSA public keys. 2016-08-17 23:47:18 +00:00
Server-SSLv3-RSA-RC4 crypto/x509: require a NULL parameters for RSA public keys. 2016-08-17 23:47:18 +00:00
Server-TLSv10-ECDHE-ECDSA-AES crypto/x509: require a NULL parameters for RSA public keys. 2016-08-17 23:47:18 +00:00
Server-TLSv10-RSA-3DES crypto/x509: require a NULL parameters for RSA public keys. 2016-08-17 23:47:18 +00:00
Server-TLSv10-RSA-AES crypto/x509: require a NULL parameters for RSA public keys. 2016-08-17 23:47:18 +00:00
Server-TLSv10-RSA-RC4 crypto/x509: require a NULL parameters for RSA public keys. 2016-08-17 23:47:18 +00:00
Server-TLSv11-FallbackSCSV crypto/x509: require a NULL parameters for RSA public keys. 2016-08-17 23:47:18 +00:00
Server-TLSv11-RSA-RC4 crypto/x509: require a NULL parameters for RSA public keys. 2016-08-17 23:47:18 +00:00
Server-TLSv12-ALPN crypto/x509: require a NULL parameters for RSA public keys. 2016-08-17 23:47:18 +00:00
Server-TLSv12-ALPN-NoMatch crypto/x509: require a NULL parameters for RSA public keys. 2016-08-17 23:47:18 +00:00
Server-TLSv12-CipherSuiteCertPreferenceECDSA crypto/x509: require a NULL parameters for RSA public keys. 2016-08-17 23:47:18 +00:00
Server-TLSv12-CipherSuiteCertPreferenceRSA crypto/x509: require a NULL parameters for RSA public keys. 2016-08-17 23:47:18 +00:00
Server-TLSv12-ClientAuthRequestedAndECDSAGiven crypto/x509: require a NULL parameters for RSA public keys. 2016-08-17 23:47:18 +00:00
Server-TLSv12-ClientAuthRequestedAndGiven crypto/x509: require a NULL parameters for RSA public keys. 2016-08-17 23:47:18 +00:00
Server-TLSv12-ClientAuthRequestedNotGiven crypto/x509: require a NULL parameters for RSA public keys. 2016-08-17 23:47:18 +00:00
Server-TLSv12-ECDHE-ECDSA-AES crypto/x509: require a NULL parameters for RSA public keys. 2016-08-17 23:47:18 +00:00
Server-TLSv12-IssueTicket crypto/x509: require a NULL parameters for RSA public keys. 2016-08-17 23:47:18 +00:00
Server-TLSv12-IssueTicketPreDisable crypto/x509: require a NULL parameters for RSA public keys. 2016-08-17 23:47:18 +00:00
Server-TLSv12-Resume crypto/x509: require a NULL parameters for RSA public keys. 2016-08-17 23:47:18 +00:00
Server-TLSv12-ResumeDisabled crypto/x509: require a NULL parameters for RSA public keys. 2016-08-17 23:47:18 +00:00
Server-TLSv12-RSA-3DES crypto/x509: require a NULL parameters for RSA public keys. 2016-08-17 23:47:18 +00:00
Server-TLSv12-RSA-AES crypto/x509: require a NULL parameters for RSA public keys. 2016-08-17 23:47:18 +00:00
Server-TLSv12-RSA-AES256-GCM-SHA384 crypto/x509: require a NULL parameters for RSA public keys. 2016-08-17 23:47:18 +00:00
Server-TLSv12-RSA-AES-GCM crypto/x509: require a NULL parameters for RSA public keys. 2016-08-17 23:47:18 +00:00
Server-TLSv12-RSA-RC4 crypto/x509: require a NULL parameters for RSA public keys. 2016-08-17 23:47:18 +00:00
Server-TLSv12-SNI crypto/x509: require a NULL parameters for RSA public keys. 2016-08-17 23:47:18 +00:00
Server-TLSv12-SNI-GetCertificate crypto/x509: require a NULL parameters for RSA public keys. 2016-08-17 23:47:18 +00:00
Server-TLSv12-SNI-GetCertificateNotFound crypto/x509: require a NULL parameters for RSA public keys. 2016-08-17 23:47:18 +00:00