From 8edf1b4494e271144dc3d536176c31ce68f879c6 Mon Sep 17 00:00:00 2001 From: Frederik Wedel-Heinen Date: Tue, 28 Jan 2025 09:46:47 +0100 Subject: [PATCH] test_server_mtu_larger_than_max_fragment_length() should be run for DTLS 1.3 Previously it was forced to run on DTLS 1.2>. But the underlying issue was fixed on master and it works now that the feature branch has been rebased on top of a more recent master. Reviewed-by: Matt Caswell Reviewed-by: Tomas Mraz (Merged from https://github.com/openssl/openssl/pull/26574) --- test/dtls_mtu_test.c | 7 ------- 1 file changed, 7 deletions(-) diff --git a/test/dtls_mtu_test.c b/test/dtls_mtu_test.c index a68c72f411e..2fc8f021d3d 100644 --- a/test/dtls_mtu_test.c +++ b/test/dtls_mtu_test.c @@ -217,13 +217,6 @@ static int test_server_mtu_larger_than_max_fragment_length(void) NULL, NULL))) goto end; - /** - * TODO(DTLSv1.3): Test fails with - * SSL routines:tls_parse_ctos_maxfragmentlen:ssl3 ext invalid max fragment length: - * ssl/statem/extensions_srvr.c:202: - */ - OPENSSL_assert(SSL_set_max_proto_version(clnt_ssl, DTLS1_2_VERSION) == 1); - SSL_set_options(srvr_ssl, SSL_OP_NO_QUERY_MTU); if (!TEST_true(DTLS_set_link_mtu(srvr_ssl, 1500))) goto end; -- 2.47.2