summaryrefslogtreecommitdiffstats
path: root/test
diff options
context:
space:
mode:
authorDaiki Ueno <dueno@redhat.com>2021-10-10 09:14:06 +0200
committerTomas Mraz <tomas@openssl.org>2022-04-06 13:15:27 +0200
commit7c78932b9a4330fb7c8db72b3fb37cbff1401f8b (patch)
tree64e277a30f976eb05ee7757e5b25247b9eb10c7e /test
parenta5fb9605329fb939abb536c1604d44a511741624 (diff)
KTLS: Enable KTLS for receiving as well in TLS 1.3
This removes a guard condition that prevents KTLS being enabled for receiving in TLS 1.3. Use the correct sequence number and BIO for receive vs transmit offload. Co-authored-by: John Baldwin <jhb@FreeBSD.org> Signed-off-by: Daiki Ueno <dueno@redhat.com> Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/17942)
Diffstat (limited to 'test')
-rw-r--r--test/sslapitest.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/test/sslapitest.c b/test/sslapitest.c
index c7d52817e5..b95d6201ed 100644
--- a/test/sslapitest.c
+++ b/test/sslapitest.c
@@ -1242,7 +1242,7 @@ static int execute_test_ktls(int cis_ktls, int sis_ktls,
#if defined(OPENSSL_NO_KTLS_RX)
rx_supported = 0;
#else
- rx_supported = (tls_version != TLS1_3_VERSION);
+ rx_supported = 1;
#endif
if (!cis_ktls || !rx_supported) {
if (!TEST_false(BIO_get_ktls_recv(clientssl->rbio)))