diff options
| author | jsing <> | 2020-04-06 16:52:26 +0000 |
|---|---|---|
| committer | jsing <> | 2020-04-06 16:52:26 +0000 |
| commit | 0b1475e1f5215e43f5fcc79ad509d32f65a83c6f (patch) | |
| tree | 205033d3d61932f5a620ece51188245856998603 | |
| parent | be66c879415485c87d2569593a12ae42cc24c953 (diff) | |
| download | openbsd-0b1475e1f5215e43f5fcc79ad509d32f65a83c6f.tar.gz openbsd-0b1475e1f5215e43f5fcc79ad509d32f65a83c6f.tar.bz2 openbsd-0b1475e1f5215e43f5fcc79ad509d32f65a83c6f.zip | |
Add tests that cover TLSv1.2 and disable those that trigger TLSv1.3.
This allows the test to pass again.
| -rw-r--r-- | src/regress/lib/libssl/client/clienttest.c | 35 |
1 files changed, 32 insertions, 3 deletions
diff --git a/src/regress/lib/libssl/client/clienttest.c b/src/regress/lib/libssl/client/clienttest.c index 3156ef13aa..3487348c9e 100644 --- a/src/regress/lib/libssl/client/clienttest.c +++ b/src/regress/lib/libssl/client/clienttest.c | |||
| @@ -200,13 +200,22 @@ static struct client_hello_test client_hello_tests[] = { | |||
| 200 | .random_start = SSL3_RANDOM_OFFSET, | 200 | .random_start = SSL3_RANDOM_OFFSET, |
| 201 | .ssl_method = TLSv1_2_client_method, | 201 | .ssl_method = TLSv1_2_client_method, |
| 202 | }, | 202 | }, |
| 203 | #if 0 | ||
| 203 | { | 204 | { |
| 204 | .desc = "SSLv23 default", | 205 | .desc = "SSLv23 default", |
| 205 | .protocol = TLS1_2_VERSION, | 206 | .protocol = TLS1_3_VERSION, |
| 206 | .random_start = SSL3_RANDOM_OFFSET, | 207 | .random_start = SSL3_RANDOM_OFFSET, |
| 207 | .ssl_method = SSLv23_client_method, | 208 | .ssl_method = SSLv23_client_method, |
| 208 | .ssl_options = 0, | 209 | .ssl_options = 0, |
| 209 | }, | 210 | }, |
| 211 | #endif | ||
| 212 | { | ||
| 213 | .desc = "SSLv23 default (no TLSv1.3)", | ||
| 214 | .protocol = TLS1_2_VERSION, | ||
| 215 | .random_start = SSL3_RANDOM_OFFSET, | ||
| 216 | .ssl_method = SSLv23_client_method, | ||
| 217 | .ssl_options = SSL_OP_NO_TLSv1_3, | ||
| 218 | }, | ||
| 210 | { | 219 | { |
| 211 | .desc = "SSLv23 (no TLSv1.2)", | 220 | .desc = "SSLv23 (no TLSv1.2)", |
| 212 | .protocol = TLS1_1_VERSION, | 221 | .protocol = TLS1_1_VERSION, |
| @@ -221,13 +230,22 @@ static struct client_hello_test client_hello_tests[] = { | |||
| 221 | .ssl_method = SSLv23_client_method, | 230 | .ssl_method = SSLv23_client_method, |
| 222 | .ssl_options = SSL_OP_NO_TLSv1_1, | 231 | .ssl_options = SSL_OP_NO_TLSv1_1, |
| 223 | }, | 232 | }, |
| 233 | #if 0 | ||
| 224 | { | 234 | { |
| 225 | .desc = "TLS default", | 235 | .desc = "TLS default", |
| 226 | .protocol = TLS1_2_VERSION, | 236 | .protocol = TLS1_3_VERSION, |
| 227 | .random_start = SSL3_RANDOM_OFFSET, | 237 | .random_start = SSL3_RANDOM_OFFSET, |
| 228 | .ssl_method = TLS_client_method, | 238 | .ssl_method = TLS_client_method, |
| 229 | .ssl_options = 0, | 239 | .ssl_options = 0, |
| 230 | }, | 240 | }, |
| 241 | #endif | ||
| 242 | { | ||
| 243 | .desc = "TLS (no TLSv1.3)", | ||
| 244 | .protocol = TLS1_2_VERSION, | ||
| 245 | .random_start = SSL3_RANDOM_OFFSET, | ||
| 246 | .ssl_method = TLS_client_method, | ||
| 247 | .ssl_options = SSL_OP_NO_TLSv1_3, | ||
| 248 | }, | ||
| 231 | { | 249 | { |
| 232 | .desc = "TLS (no TLSv1.2)", | 250 | .desc = "TLS (no TLSv1.2)", |
| 233 | .protocol = TLS1_1_VERSION, | 251 | .protocol = TLS1_1_VERSION, |
| @@ -242,13 +260,24 @@ static struct client_hello_test client_hello_tests[] = { | |||
| 242 | .ssl_method = TLS_client_method, | 260 | .ssl_method = TLS_client_method, |
| 243 | .ssl_options = SSL_OP_NO_TLSv1_1, | 261 | .ssl_options = SSL_OP_NO_TLSv1_1, |
| 244 | }, | 262 | }, |
| 263 | #if 0 | ||
| 245 | { | 264 | { |
| 246 | .desc = "TLS (no TLSv1.0, no TLSv1.1)", | 265 | .desc = "TLS (no TLSv1.0, no TLSv1.1)", |
| 247 | .protocol = TLS1_2_VERSION, | 266 | .protocol = TLS1_3_VERSION, |
| 248 | .random_start = SSL3_RANDOM_OFFSET, | 267 | .random_start = SSL3_RANDOM_OFFSET, |
| 249 | .ssl_method = TLS_client_method, | 268 | .ssl_method = TLS_client_method, |
| 250 | .ssl_options = SSL_OP_NO_TLSv1 | SSL_OP_NO_TLSv1_1, | 269 | .ssl_options = SSL_OP_NO_TLSv1 | SSL_OP_NO_TLSv1_1, |
| 251 | }, | 270 | }, |
| 271 | #endif | ||
| 272 | #if 0 | ||
| 273 | { | ||
| 274 | .desc = "TLS (no TLSv1.0, no TLSv1.1, no TLSv1.2)", | ||
| 275 | .protocol = TLS1_3_VERSION, | ||
| 276 | .random_start = SSL3_RANDOM_OFFSET, | ||
| 277 | .ssl_method = TLS_client_method, | ||
| 278 | .ssl_options = SSL_OP_NO_TLSv1 | SSL_OP_NO_TLSv1_1 | SSL_OP_NO_TLSv1_2, | ||
| 279 | }, | ||
| 280 | #endif | ||
| 252 | }; | 281 | }; |
| 253 | 282 | ||
| 254 | #define N_CLIENT_HELLO_TESTS \ | 283 | #define N_CLIENT_HELLO_TESTS \ |
