diff options
author | Matt Caswell <matt@openssl.org> | 2016-11-07 14:44:38 +0000 |
---|---|---|
committer | Matt Caswell <matt@openssl.org> | 2016-11-07 15:52:33 +0000 |
commit | 185c29b14eafb9ddacffb82b10c4609e49686e66 (patch) | |
tree | fcce43be27a0f23043bd2f10f3294e69f53bba24 /test | |
parent | 5d71f7ea291761777a2b2a84f340ffb38b3ea14a (diff) |
test_sslcbcpadding only makes sense <TLS1.3
We may get failures if we run it in TLS1.3, and it makes no sense anyway
so force TLS1.2
Reviewed-by: Rich Salz <rsalz@openssl.org>
Diffstat (limited to 'test')
-rw-r--r-- | test/recipes/70-test_sslcbcpadding.t | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/test/recipes/70-test_sslcbcpadding.t b/test/recipes/70-test_sslcbcpadding.t index 22825a096d..8d3d6fc4b9 100644 --- a/test/recipes/70-test_sslcbcpadding.t +++ b/test/recipes/70-test_sslcbcpadding.t @@ -48,6 +48,7 @@ ok(TLSProxy::Message->success(), "Maximally-padded record test"); # Test that invalid padding is rejected. foreach my $offset (@test_offsets) { $proxy->clear(); + $proxy->serverflags("-tls1_2"); $bad_padding_offset = $offset; $proxy->start(); ok(TLSProxy::Message->fail(), "Invalid padding byte $bad_padding_offset"); |