diff options
| author | Benjamin Cheng <[email protected]> | 2018-06-17 17:00:22 -0400 |
|---|---|---|
| committer | Benjamin Cheng <[email protected]> | 2018-06-17 17:00:22 -0400 |
| commit | bf86580beca3034714d822c03a9b2441c29112a3 (patch) | |
| tree | 2fe105907f44abc4914f5ea21699894d9315052b | |
| parent | Ensure psk test callbacks are called (diff) | |
| download | rust-openssl-bf86580beca3034714d822c03a9b2441c29112a3.tar.xz rust-openssl-bf86580beca3034714d822c03a9b2441c29112a3.zip | |
Disable TLSv1.3 for psk_ciphers test
| -rw-r--r-- | openssl/src/ssl/test.rs | 7 |
1 files changed, 7 insertions, 0 deletions
diff --git a/openssl/src/ssl/test.rs b/openssl/src/ssl/test.rs index a8a797a2..af51be0c 100644 --- a/openssl/src/ssl/test.rs +++ b/openssl/src/ssl/test.rs @@ -1565,6 +1565,13 @@ fn psk_ciphers() { let stream = TcpStream::connect(("127.0.0.1", port)).unwrap(); let mut ctx = SslContext::builder(SslMethod::tls()).unwrap(); + // TLS 1.3 has no DH suites, and openssl isn't happy if the max version has no suites :( + #[cfg(ossl111)] + { + ctx.set_options(super::SslOptions { + bits: ::ffi::SSL_OP_NO_TLSv1_3, + }); + } ctx.set_cipher_list(CIPHER).unwrap(); ctx.set_psk_client_callback(move |_, _, identity, psk| { identity[..CLIENT_IDENT.len()].copy_from_slice(&CLIENT_IDENT); |