Fix no-dh builds
One of the new tests uses a DH based ciphersuite. That test should be disabled if DH is disabled. Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/2217)
This commit is contained in:
parent
e3bc1305ec
commit
928933f92f
1 changed files with 13 additions and 8 deletions
|
@ -93,14 +93,19 @@ SKIP: {
|
||||||
$proxy->start();
|
$proxy->start();
|
||||||
ok(TLSProxy::Message->fail, "Corrupt <=TLSv1.2 CertVerify");
|
ok(TLSProxy::Message->fail, "Corrupt <=TLSv1.2 CertVerify");
|
||||||
|
|
||||||
#Test 4: Corrupting a ServerKeyExchange signature in <=TLSv1.2 should fail
|
SKIP: {
|
||||||
$proxy->clear();
|
skip "DH disabled", 1 if disabled("dh");
|
||||||
$testtype = CORRUPT_TLS1_2_SERVER_KEY_EXCHANGE;
|
|
||||||
$proxy->clientflags("-no_tls1_3");
|
#Test 4: Corrupting a ServerKeyExchange signature in <=TLSv1.2 should
|
||||||
$proxy->cipherc('DHE-RSA-AES128-SHA');
|
#fail
|
||||||
$proxy->ciphers('DHE-RSA-AES128-SHA');
|
$proxy->clear();
|
||||||
$proxy->start();
|
$testtype = CORRUPT_TLS1_2_SERVER_KEY_EXCHANGE;
|
||||||
ok(TLSProxy::Message->fail, "Corrupt <=TLSv1.2 ServerKeyExchange");
|
$proxy->clientflags("-no_tls1_3");
|
||||||
|
$proxy->cipherc('DHE-RSA-AES128-SHA');
|
||||||
|
$proxy->ciphers('DHE-RSA-AES128-SHA');
|
||||||
|
$proxy->start();
|
||||||
|
ok(TLSProxy::Message->fail, "Corrupt <=TLSv1.2 ServerKeyExchange");
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
sub signature_filter
|
sub signature_filter
|
||||||
|
|
Loading…
Reference in a new issue