boringssl/ssl/test
David Benjamin 39ebf53dd3 Check the server did not use a TLS 1.2 cipher suite pre-TLS 1.2.
This check got refactored in OpenSSL 1.0.2 and broke in the process. Fix this
and add a test. Otherwise things like client auth can get slightly confused; it
will try to sign the MD5/SHA-1 hash, but the TLS 1.2 cipher suite may not use
SSL_HANDSHAKE_MAC_DEFAULT, so those digests won't be available.

Based on upstream's 226751ae4a1f3e00021c43399d7bb51a99c22c17.

Change-Id: I5b864d3a696f3187b849c53b872c24fb7df27924
Reviewed-on: https://boringssl-review.googlesource.com/1696
Reviewed-by: Adam Langley <agl@google.com>
2014-09-02 23:41:34 +00:00
..
runner Check the server did not use a TLS 1.2 cipher suite pre-TLS 1.2. 2014-09-02 23:41:34 +00:00
async_bio.cc Add initial DTLS tests. 2014-08-14 16:55:45 +00:00
async_bio.h Add initial DTLS tests. 2014-08-14 16:55:45 +00:00
bssl_shim.cc Add a test for SSL_OP_TLS_D5_BUG. 2014-09-02 22:43:54 +00:00
CMakeLists.txt Add initial DTLS tests. 2014-08-14 16:55:45 +00:00
packeted_bio.cc Add initial DTLS tests. 2014-08-14 16:55:45 +00:00
packeted_bio.h Add initial DTLS tests. 2014-08-14 16:55:45 +00:00
test_config.cc Add a test for SSL_OP_TLS_D5_BUG. 2014-09-02 22:43:54 +00:00
test_config.h Add a test for SSL_OP_TLS_D5_BUG. 2014-09-02 22:43:54 +00:00