prot = TLS1_3_VERSION;
break;
#else
- return 1;
+ return TEST_skip("TLS 1.3 not supported");
#endif
case 1:
prot = TLS1_2_VERSION;
break;
#else
- return 1;
+ return TEST_skip("TLS 1.2 not supported");
#endif
case 2:
prot = TLS1_1_VERSION;
break;
#else
- return 1;
+ return TEST_skip("TLS 1.1 not supported");
#endif
case 3:
prot = TLS1_VERSION;
break;
#else
- return 1;
+ return TEST_skip("TLS 1 not supported");
#endif
case 4:
prot = SSL3_VERSION;
break;
#else
- return 1;
+ return TEST_skip("SSL 3 not supported");
#endif
case 5:
cmeth = DTLS_client_method();
break;
#else
- return 1;
+ return TEST_skip("DTLS 1.2 not supported");
#endif
case 6:
#ifndef OPENSSL_NO_DTLS1
+ if (is_fips)
+ return TEST_skip("DTLS 1 not supported by FIPS provider");
prot = DTLS1_VERSION;
smeth = DTLS_server_method();
cmeth = DTLS_client_method();
break;
#else
- return 1;
+ return TEST_skip("DTLS 1 not supported");
#endif
default:
return 0;
}
- if ((prot < TLS1_2_VERSION || prot == DTLS1_VERSION) && is_fips)
- return 1;
+ if (is_fips && prot < TLS1_2_VERSION)
+ return TEST_skip("TLS versions < 1.2 not supported by FIPS provider");
/* Maximal sized message of zeros */
msg = OPENSSL_zalloc(SSL3_RT_MAX_PLAIN_LENGTH);