aboutsummaryrefslogtreecommitdiff
path: root/openssl/src
diff options
context:
space:
mode:
authorSteven Fackler <[email protected]>2016-10-13 20:03:02 -0700
committerSteven Fackler <[email protected]>2016-10-13 20:03:02 -0700
commit5b29fc9d6954e32cc20482e5e3d1d65f8d7cf252 (patch)
tree6bb6b25edbc60a13c72895a50847474e1cfdbfb8 /openssl/src
parentFix tests on windows (diff)
downloadrust-openssl-5b29fc9d6954e32cc20482e5e3d1d65f8d7cf252.tar.xz
rust-openssl-5b29fc9d6954e32cc20482e5e3d1d65f8d7cf252.zip
Disable npn tests on < 1.0.2
s_client doesn't seem to support the required flag before then.
Diffstat (limited to 'openssl/src')
-rw-r--r--openssl/src/ssl/tests/mod.rs2
1 files changed, 2 insertions, 0 deletions
diff --git a/openssl/src/ssl/tests/mod.rs b/openssl/src/ssl/tests/mod.rs
index 2cd4e05e..f5078648 100644
--- a/openssl/src/ssl/tests/mod.rs
+++ b/openssl/src/ssl/tests/mod.rs
@@ -605,6 +605,7 @@ fn test_connect_with_alpn_successful_multiple_matching() {
/// Tests that when both the client as well as the server use NPN and their
/// lists of supported protocols have an overlap, the correct protocol is chosen.
#[test]
+#[cfg(feature = "openssl-102")]
fn test_connect_with_npn_successful_multiple_matching() {
let (_s, stream) = Server::new_alpn();
let mut ctx = SslContext::new(Tls).unwrap();
@@ -651,6 +652,7 @@ fn test_connect_with_alpn_successful_single_match() {
/// lists of supported protocols have an overlap -- with only ONE protocol
/// being valid for both.
#[test]
+#[cfg(feature = "openssl-102")]
fn test_connect_with_npn_successful_single_match() {
let (_s, stream) = Server::new_alpn();
let mut ctx = SslContext::new(Tls).unwrap();