From: Frederik Wedel-Heinen Date: Tue, 28 Jan 2025 08:46:47 +0000 (+0100) Subject: test_server_mtu_larger_than_max_fragment_length() should be run for DTLS 1.3 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=8edf1b4494e271144dc3d536176c31ce68f879c6;p=thirdparty%2Fopenssl.git test_server_mtu_larger_than_max_fragment_length() should be run for DTLS 1.3 Previously it was forced to run on DTLS 1.2>. But the underlying issue was fixed on master and it works now that the feature branch has been rebased on top of a more recent master. Reviewed-by: Matt Caswell Reviewed-by: Tomas Mraz (Merged from https://github.com/openssl/openssl/pull/26574) --- diff --git a/test/dtls_mtu_test.c b/test/dtls_mtu_test.c index a68c72f411e..2fc8f021d3d 100644 --- a/test/dtls_mtu_test.c +++ b/test/dtls_mtu_test.c @@ -217,13 +217,6 @@ static int test_server_mtu_larger_than_max_fragment_length(void) NULL, NULL))) goto end; - /** - * TODO(DTLSv1.3): Test fails with - * SSL routines:tls_parse_ctos_maxfragmentlen:ssl3 ext invalid max fragment length: - * ssl/statem/extensions_srvr.c:202: - */ - OPENSSL_assert(SSL_set_max_proto_version(clnt_ssl, DTLS1_2_VERSION) == 1); - SSL_set_options(srvr_ssl, SSL_OP_NO_QUERY_MTU); if (!TEST_true(DTLS_set_link_mtu(srvr_ssl, 1500))) goto end;