Fix TLS 1.3 downgrade detection tests.
They weren't updated for the new version negotiation. (Though right now they're just testing that we *don't* implement the downgrade detection because it's a draft version.) Change-Id: I4c983ebcdf3180d682833caf1e0063467ea41544 Reviewed-on: https://boringssl-review.googlesource.com/11406 Commit-Queue: David Benjamin <davidben@google.com> Reviewed-by: Adam Langley <agl@google.com>
This commit is contained in:
parent
7f0965a66d
commit
592b532dda
@ -4387,6 +4387,7 @@ func addVersionNegotiationTests() {
|
||||
NegotiateVersion: VersionTLS12,
|
||||
},
|
||||
},
|
||||
expectedVersion: VersionTLS12,
|
||||
// TODO(davidben): This test should fail once TLS 1.3 is final
|
||||
// and the fallback signal restored.
|
||||
})
|
||||
@ -4395,9 +4396,10 @@ func addVersionNegotiationTests() {
|
||||
name: "Downgrade-TLS12-Server",
|
||||
config: Config{
|
||||
Bugs: ProtocolBugs{
|
||||
SendClientVersion: VersionTLS12,
|
||||
SendSupportedVersions: []uint16{VersionTLS12},
|
||||
},
|
||||
},
|
||||
expectedVersion: VersionTLS12,
|
||||
// TODO(davidben): This test should fail once TLS 1.3 is final
|
||||
// and the fallback signal restored.
|
||||
})
|
||||
|
Loading…
Reference in New Issue
Block a user