]> git.ipfire.org Git - thirdparty/openssl.git/commit
Repair downgrade tests
authorAnton Tieleman <git@oneton.nl>
Mon, 28 Apr 2025 11:30:01 +0000 (13:30 +0200)
committerTomas Mraz <tomas@openssl.org>
Tue, 29 Apr 2025 17:31:15 +0000 (19:31 +0200)
commit7535f26210afa386fe9021a79dbaea13fbb9e649
treee7a19cc7ef8c46180230bcf53a3e8b41dd669a08
parent1d770fc6a9a0a7d6e20f3232180b80c366c2d4df
Repair downgrade tests

A number of these tests were failing for the wrong reasons. The intention is to verify
that the client sends an illegal parameter alert when an unexpected downgrade signal
is received. Instead, a number of tests failed because TLS1.1 was not available. The
tests are adapted to explicitly check for an illegal parameter alert from the client.

Client and server flags are updated to enable TLS1.1 where required and a few tests
requiring TLS1.1 were moved to be disabled when TLS1.1 is not available.

Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27518)
test/recipes/70-test_tls13downgrade.t