aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorMatt Caswell <matt@openssl.org>2018-08-20 17:44:58 +0100
committerMatt Caswell <matt@openssl.org>2018-08-22 15:15:19 +0100
commit3e7cb13dff37795f022a1bedc5951130099a0fc6 (patch)
tree41e38ab2bcca41797964b61744cd7f71a13a20b4
parentb5b993b2295be98e23fa8bb570b2c38c5bf8aaf3 (diff)
downloadopenssl-3e7cb13dff37795f022a1bedc5951130099a0fc6.zip
openssl-3e7cb13dff37795f022a1bedc5951130099a0fc6.tar.gz
openssl-3e7cb13dff37795f022a1bedc5951130099a0fc6.tar.bz2
Test that a client protocol "hole" doesn't get detected as a downgrade
Reviewed-by: Viktor Dukhovni <viktor@openssl.org> (Merged from https://github.com/openssl/openssl/pull/7013)
-rw-r--r--test/recipes/70-test_tls13downgrade.t12
1 files changed, 11 insertions, 1 deletions
diff --git a/test/recipes/70-test_tls13downgrade.t b/test/recipes/70-test_tls13downgrade.t
index f7c8812..b84ca69 100644
--- a/test/recipes/70-test_tls13downgrade.t
+++ b/test/recipes/70-test_tls13downgrade.t
@@ -45,7 +45,7 @@ use constant {
$proxy->filter(\&downgrade_filter);
my $testtype = DOWNGRADE_TO_TLS_1_2;
$proxy->start() or plan skip_all => "Unable to start up Proxy for tests";
-plan tests => 4;
+plan tests => 5;
ok(TLSProxy::Message->fail(), "Downgrade TLSv1.3 to TLSv1.2");
#Test 2: Downgrade from TLSv1.3 to TLSv1.1
@@ -73,6 +73,16 @@ ok(TLSProxy::Message->fail()
&& $alert->description() == TLSProxy::Message::AL_DESC_ILLEGAL_PARAMETER,
"Fallback from TLSv1.3");
+SKIP: {
+ skip "TLSv1.1 disabled", 1 if disabled("tls1_1");
+ #Test 5: A protocol "hole" should not be detected as a downgrade
+ $proxy->clear();
+ $proxy->filter(undef);
+ $proxy->clientflags("-no_tls1_2");
+ $proxy->start();
+ ok(TLSProxy::Message->success(), "TLSv1.2 protocol hole");
+}
+
sub downgrade_filter
{
my $proxy = shift;