]> git.ipfire.org Git - thirdparty/openssl.git/commitdiff
test_server_mtu_larger_than_max_fragment_length() should be run for DTLS 1.3
authorFrederik Wedel-Heinen <frederik.wedel-heinen@dencrypt.dk>
Tue, 28 Jan 2025 08:46:47 +0000 (09:46 +0100)
committerTomas Mraz <tomas@openssl.org>
Tue, 25 Mar 2025 19:29:13 +0000 (20:29 +0100)
Previously it was forced to run on DTLS 1.2>. But the underlying issue was fixed on master and it works now that the feature branch has been rebased on top of a more recent master.

Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/26574)

test/dtls_mtu_test.c

index a68c72f411ed4431c8772e0727b805236f587043..2fc8f021d3df9e7d04f348161fbc247b5516cfd8 100644 (file)
@@ -217,13 +217,6 @@ static int test_server_mtu_larger_than_max_fragment_length(void)
                                       NULL, NULL)))
         goto end;
 
-    /**
-     * TODO(DTLSv1.3): Test fails with
-     * SSL routines:tls_parse_ctos_maxfragmentlen:ssl3 ext invalid max fragment length:
-     *      ssl/statem/extensions_srvr.c:202:
-     */
-    OPENSSL_assert(SSL_set_max_proto_version(clnt_ssl, DTLS1_2_VERSION) == 1);
-
     SSL_set_options(srvr_ssl, SSL_OP_NO_QUERY_MTU);
     if (!TEST_true(DTLS_set_link_mtu(srvr_ssl, 1500)))
         goto end;