Skip to content

Clarify comments and API behaviour for equal-preference for TLS 1.3 #2873

Merged
torben-hansen merged 3 commits intoaws:mainfrom
torben-hansen:2814_cipher_suites_pref
Dec 3, 2025
Merged

Clarify comments and API behaviour for equal-preference for TLS 1.3 #2873
torben-hansen merged 3 commits intoaws:mainfrom
torben-hansen:2814_cipher_suites_pref

Conversation

@torben-hansen
Copy link
Copy Markdown
Contributor

Issues:

#2814

Description of changes:

The algorithm used to compute the negotiated cipher suite in TLS 1.3 is different than the one used for the older versions. Clarify what this means for equal-preference groups.

Call-outs:

There is some leftover work to do for this part of the negotiation implementation. Firstly, one can consider whether to consolidate the the negotiation algorithm for cipher suites over all TLS versions. Secondly, if not, how/if should one support SSL_OP_CIPHER_SERVER_PREFERENCE as a condition, that is not applied in TLS 1.3 as described in #2814.

Testing:

No code harmed, yet.

By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license and the ISC license.

@torben-hansen torben-hansen requested a review from a team as a code owner December 2, 2025 00:19
@codecov-commenter
Copy link
Copy Markdown

codecov-commenter commented Dec 2, 2025

Codecov Report

✅ All modified and coverable lines are covered by tests.
✅ Project coverage is 78.24%. Comparing base (b5e2f86) to head (5ba2296).
⚠️ Report is 170 commits behind head on main.

Additional details and impacted files
@@            Coverage Diff             @@
##             main    #2873      +/-   ##
==========================================
- Coverage   78.24%   78.24%   -0.01%     
==========================================
  Files         683      683              
  Lines      117388   117389       +1     
  Branches    16497    16497              
==========================================
- Hits        91853    91851       -2     
  Misses      24649    24649              
- Partials      886      889       +3     

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.

@torben-hansen torben-hansen enabled auto-merge (squash) December 3, 2025 15:29
@torben-hansen torben-hansen merged commit 9f3de9b into aws:main Dec 3, 2025
466 of 471 checks passed
justsmth pushed a commit that referenced this pull request Dec 12, 2025
## What's Changed
* Add encap/decapKeyCheck support in ACVP by @samuel40791765 in
#2872
* Clarify comments and API behaviour for equal-preference for TLS 1.3 by
@torben-hansen in #2873
* Add support for external contexts in ML-DSA ACVP by @samuel40791765 in
#2880
* Route ML-DSA ACVP to the right APIs by @samuel40791765 in
#2884
* Add sha1 CLI by @nhatnghiho in #2885
* Fix openssl comparison tests by @justsmth in
#2888
* tool-openssl: pkcs8 error output on decrypt by @justsmth in
#2883
* Add RSA_X931_PADDING to rsa.h by @justsmth in
#2889
* Bump urllib3 from 2.5.0 to 2.6.0 in /tests/ci by @dependabot[bot] in
#2886
* Run ACCP integration tests on aarch64 by @WillChilds-Klein in
#2894
* Blowfish OFB Block Cipher Mode Support by @skmcgrail in
#2892

By submitting this pull request, I confirm that my contribution is made
under the terms of the Apache 2.0 license and the ISC license.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants