summaryrefslogtreecommitdiffstats
path: root/test
diff options
context:
space:
mode:
authorMatt Caswell <matt@openssl.org>2017-01-03 10:01:39 +0000
committerMatt Caswell <matt@openssl.org>2017-01-10 23:02:50 +0000
commitfe3066ee4072e226601209f1b5fb1d343457cef8 (patch)
tree39f697885987aab5e0a9ad2603089fd84ee3dbe2 /test
parent16abbd11cdc2124f12d90efffb5cd79236e72fa0 (diff)
Extend PSS signature support to TLSv1.2
TLSv1.3 introduces PSS based sigalgs. Offering these in a TLSv1.3 client implies that the client is prepared to accept these sigalgs even in TLSv1.2. Reviewed-by: Rich Salz <rsalz@openssl.org> (Merged from https://github.com/openssl/openssl/pull/2157)
Diffstat (limited to 'test')
-rwxr-xr-xtest/recipes/70-test_sslsigalgs.t6
1 files changed, 3 insertions, 3 deletions
diff --git a/test/recipes/70-test_sslsigalgs.t b/test/recipes/70-test_sslsigalgs.t
index 954b9c5038..1a7aeddc13 100755
--- a/test/recipes/70-test_sslsigalgs.t
+++ b/test/recipes/70-test_sslsigalgs.t
@@ -146,12 +146,12 @@ SKIP: {
$proxy->start();
ok(TLSProxy::Message->success, "No PSS TLSv1.2 sigalgs");
- #Test 13: Sending only TLSv1.3 PSS sig algs in TLSv1.2 should fail
+ #Test 13: Sending only TLSv1.3 PSS sig algs in TLSv1.2 should succeed
$proxy->clear();
$testtype = PSS_ONLY_SIG_ALGS;
- $proxy->clientflags("-no_tls1_3");
+ $proxy->serverflags("-no_tls1_3");
$proxy->start();
- ok(TLSProxy::Message->fail, "PSS only sigalgs in TLSv1.2");
+ ok(TLSProxy::Message->success, "PSS only sigalgs in TLSv1.2");
#Test 14: Sending a valid sig algs list but not including a sig type that
# matches the certificate should fail in TLSv1.2