]> git.ipfire.org Git - thirdparty/openssl.git/commitdiff
70-test_tls13hrr.t: Use P-521 instead of X25519 for invalid group test
authorTomas Mraz <tomas@openssl.org>
Fri, 30 Jun 2023 16:12:00 +0000 (18:12 +0200)
committerTomas Mraz <tomas@openssl.org>
Mon, 3 Jul 2023 09:20:33 +0000 (11:20 +0200)
Otherwise this testcase won't work with no-ecx.

Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com>
(Merged from https://github.com/openssl/openssl/pull/21333)

test/recipes/70-test_tls13hrr.t

index 8124106b6886999472ba0114a6517299b61deef2..7941cecc99cdc2e8bef7541690085c6ad5089795 100644 (file)
@@ -83,15 +83,15 @@ ok($fatal_alert, "Server duplicated HRR");
 #        otherwise not valid (e.g. not suitable for TLSv1.3) we should reject it
 #        and not consider it when sending the HRR. We send brainpoolP512r1 in
 #        the ClientHello, which is acceptable to the server but is not valid in
-#        TLSv1.3. We expect the server to select X25519 in the HRR and the
+#        TLSv1.3. We expect the server to select P-521 in the HRR and the
 #        handshake to complete successfully
 SKIP: {
     skip "EC/TLSv1.2 is disabled in this build", 1
         if disabled("ec") || disabled("tls1_2");
 
     $proxy->clear();
-    $proxy->clientflags("-groups P-256:brainpoolP512r1:X25519");
-    $proxy->serverflags("-groups brainpoolP512r1:X25519");
+    $proxy->clientflags("-groups P-256:brainpoolP512r1:P-521");
+    $proxy->serverflags("-groups brainpoolP512r1:P-521");
     $testtype = INVALID_GROUP;
     $proxy->start();
     ok(TLSProxy::Message->success(), "Invalid group with HRR");