[openssl-commits] [openssl] master update
Matt Caswell
matt at openssl.org
Fri Aug 25 09:45:33 UTC 2017
The branch master has been updated
via a5e65f7c5ea04f26a6c1745f9a34b63b6956c063 (commit)
from a610934c3bdf2c0aafc633d4245efe3df289d716 (commit)
- Log -----------------------------------------------------------------
commit a5e65f7c5ea04f26a6c1745f9a34b63b6956c063
Author: Matt Caswell <matt at openssl.org>
Date: Thu Aug 24 14:49:32 2017 +0100
Don't run a CT specifc test if CT is disabled
Reviewed-by: Rich Salz <rsalz at openssl.org>
(Merged from https://github.com/openssl/openssl/pull/4245)
-----------------------------------------------------------------------
Summary of changes:
test/recipes/70-test_sslextension.t | 6 +++++-
1 file changed, 5 insertions(+), 1 deletion(-)
diff --git a/test/recipes/70-test_sslextension.t b/test/recipes/70-test_sslextension.t
index ce25c78..0622e4d 100644
--- a/test/recipes/70-test_sslextension.t
+++ b/test/recipes/70-test_sslextension.t
@@ -160,7 +160,7 @@ sub inject_unsolicited_extension
}
SKIP: {
- skip "TLS <= 1.2 disabled", 2 if alldisabled(("tls1", "tls1_1", "tls1_2"));
+ skip "TLS <= 1.2 disabled", 1 if alldisabled(("tls1", "tls1_1", "tls1_2"));
#Test 4: Inject an unsolicited extension (<= TLSv1.2)
$proxy->clear();
$proxy->filter(\&inject_unsolicited_extension);
@@ -168,7 +168,11 @@ SKIP: {
$proxy->clientflags("-no_tls1_3 -noservername");
$proxy->start();
ok(TLSProxy::Message->fail(), "Unsolicited server name extension");
+}
+SKIP: {
+ skip "TLS <= 1.2 or CT disabled", 1
+ if alldisabled(("tls1", "tls1_1", "tls1_2")) || disabled("ct");
#Test 5: Same as above for the SCT extension which has special handling
$proxy->clear();
$testtype = UNSOLICITED_SCT;
More information about the openssl-commits
mailing list