]> git.ipfire.org Git - thirdparty/openssl.git/commit
Repair downgrade tests
authorAnton Tieleman <git@oneton.nl>
Mon, 28 Apr 2025 11:30:01 +0000 (13:30 +0200)
committerTomas Mraz <tomas@openssl.org>
Mon, 5 May 2025 13:52:03 +0000 (15:52 +0200)
commit540723b77fea706e11600fce245353ea91aa7d60
tree82af0b28c5cd9da13d18d450dce063a631ff3e9a
parent89ce595ca3b532f3cf89825d1de90d0af099435f
Repair downgrade tests

A number of these tests were failing for the wrong reasons. The intention is to verify
that the client sends an illegal parameter alert when an unexpected downgrade signal
is received. Instead, a number of tests failed because TLS1.1 was not available. The
tests are adapted to explicitly check for an illegal parameter alert from the client.

Client and server flags are updated to enable TLS1.1 where required and a few tests
requiring TLS1.1 were moved to be disabled when TLS1.1 is not available.

Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27535)
test/recipes/70-test_tls13downgrade.t