summaryrefslogtreecommitdiff
path: root/src/regress/lib/libtls/gotls
diff options
context:
space:
mode:
authorbeck <>2023-07-02 06:37:27 +0000
committerbeck <>2023-07-02 06:37:27 +0000
commit908a2337ae4c28163a92b9fda969dbdd36bc634b (patch)
tree4bacb3a3d0ace64e696059ed29bf6c2df878b8b4 /src/regress/lib/libtls/gotls
parentb19abb3cde834d2cceba4bba1da858c2c4897b5e (diff)
downloadopenbsd-908a2337ae4c28163a92b9fda969dbdd36bc634b.tar.gz
openbsd-908a2337ae4c28163a92b9fda969dbdd36bc634b.tar.bz2
openbsd-908a2337ae4c28163a92b9fda969dbdd36bc634b.zip
Remove the ability to do tls 1.0 and 1.1 from libtls.
With this change any requests from configurations to request versions of tls before tls 1.2 will use tls 1.2. This prepares us to deprecate tls 1.0 and tls 1.1 support from libssl. ok tb@
Diffstat (limited to 'src/regress/lib/libtls/gotls')
-rw-r--r--src/regress/lib/libtls/gotls/tls.go2
-rw-r--r--src/regress/lib/libtls/gotls/tls_test.go8
2 files changed, 4 insertions, 6 deletions
diff --git a/src/regress/lib/libtls/gotls/tls.go b/src/regress/lib/libtls/gotls/tls.go
index cf3e84c030..3029d58c35 100644
--- a/src/regress/lib/libtls/gotls/tls.go
+++ b/src/regress/lib/libtls/gotls/tls.go
@@ -45,8 +45,6 @@ const (
45) 45)
46 46
47var protocolNames = map[ProtocolVersion]string{ 47var protocolNames = map[ProtocolVersion]string{
48 ProtocolTLSv10: "TLSv1",
49 ProtocolTLSv11: "TLSv1.1",
50 ProtocolTLSv12: "TLSv1.2", 48 ProtocolTLSv12: "TLSv1.2",
51 ProtocolTLSv13: "TLSv1.3", 49 ProtocolTLSv13: "TLSv1.3",
52 ProtocolsAll: "all", 50 ProtocolsAll: "all",
diff --git a/src/regress/lib/libtls/gotls/tls_test.go b/src/regress/lib/libtls/gotls/tls_test.go
index f6c6cfcdd5..2b7ce2c19e 100644
--- a/src/regress/lib/libtls/gotls/tls_test.go
+++ b/src/regress/lib/libtls/gotls/tls_test.go
@@ -251,11 +251,11 @@ func TestTLSVersions(t *testing.T) {
251 {tls.VersionSSL30, tls.VersionTLS12, ProtocolTLSv12, false}, 251 {tls.VersionSSL30, tls.VersionTLS12, ProtocolTLSv12, false},
252 {tls.VersionTLS10, tls.VersionTLS12, ProtocolTLSv12, false}, 252 {tls.VersionTLS10, tls.VersionTLS12, ProtocolTLSv12, false},
253 {tls.VersionTLS11, tls.VersionTLS12, ProtocolTLSv12, false}, 253 {tls.VersionTLS11, tls.VersionTLS12, ProtocolTLSv12, false},
254 {tls.VersionSSL30, tls.VersionTLS11, ProtocolTLSv11, false}, 254 {tls.VersionSSL30, tls.VersionTLS11, ProtocolTLSv11, true},
255 {tls.VersionSSL30, tls.VersionTLS10, ProtocolTLSv10, false}, 255 {tls.VersionSSL30, tls.VersionTLS10, ProtocolTLSv10, true},
256 {tls.VersionSSL30, tls.VersionSSL30, 0, true}, 256 {tls.VersionSSL30, tls.VersionSSL30, 0, true},
257 {tls.VersionTLS10, tls.VersionTLS10, ProtocolTLSv10, false}, 257 {tls.VersionTLS10, tls.VersionTLS10, ProtocolTLSv10, true},
258 {tls.VersionTLS11, tls.VersionTLS11, ProtocolTLSv11, false}, 258 {tls.VersionTLS11, tls.VersionTLS11, ProtocolTLSv11, true},
259 {tls.VersionTLS12, tls.VersionTLS12, ProtocolTLSv12, false}, 259 {tls.VersionTLS12, tls.VersionTLS12, ProtocolTLSv12, false},
260 } 260 }
261 for i, test := range tests { 261 for i, test := range tests {