Fix TLS 1.3 downgrade detection tests.

They weren't updated for the new version negotiation. (Though right now
they're just testing that we *don't* implement the downgrade detection
because it's a draft version.)

Change-Id: I4c983ebcdf3180d682833caf1e0063467ea41544
Reviewed-on: https://boringssl-review.googlesource.com/11406
Commit-Queue: David Benjamin <davidben@google.com>
Reviewed-by: Adam Langley <agl@google.com>
This commit is contained in:
David Benjamin 2016-09-30 15:15:01 -04:00 committed by Adam Langley
parent 7f0965a66d
commit 592b532dda

View File

@ -4387,6 +4387,7 @@ func addVersionNegotiationTests() {
NegotiateVersion: VersionTLS12,
},
},
expectedVersion: VersionTLS12,
// TODO(davidben): This test should fail once TLS 1.3 is final
// and the fallback signal restored.
})
@ -4395,9 +4396,10 @@ func addVersionNegotiationTests() {
name: "Downgrade-TLS12-Server",
config: Config{
Bugs: ProtocolBugs{
SendClientVersion: VersionTLS12,
SendSupportedVersions: []uint16{VersionTLS12},
},
},
expectedVersion: VersionTLS12,
// TODO(davidben): This test should fail once TLS 1.3 is final
// and the fallback signal restored.
})