提交 ee94aeee 编写于 作者: M Matt Caswell

Fix tests for no-nextprotoneg

Fix the 80-test_ssl_test_ctx and 80-test_ssl_new tests when used with the
no-nextprotoneg option
Reviewed-by: NRichard Levitte <levitte@openssl.org>
上级 700b8145
...@@ -49,6 +49,7 @@ my %conf_dependent_tests = ( ...@@ -49,6 +49,7 @@ my %conf_dependent_tests = (
my %skip = ( my %skip = (
"07-dtls-protocol-version.conf" => $no_dtls, "07-dtls-protocol-version.conf" => $no_dtls,
"08-npn.conf" => $no_tls || $no_npn, "08-npn.conf" => $no_tls || $no_npn,
"09-alpn.conf" => $no_tls || $no_npn,
"10-resumption.conf" => disabled("tls1_1") || disabled("tls1_2"), "10-resumption.conf" => disabled("tls1_1") || disabled("tls1_2"),
"11-dtls_resumption.conf" => disabled("dtls1") || disabled("dtls1_2"), "11-dtls_resumption.conf" => disabled("dtls1") || disabled("dtls1_2"),
); );
......
...@@ -295,7 +295,6 @@ const char *ssl_test_method_name(ssl_test_method_t method) ...@@ -295,7 +295,6 @@ const char *ssl_test_method_name(ssl_test_method_t method)
/* NPN and ALPN options */ /* NPN and ALPN options */
/************************************/ /************************************/
#ifndef OPENSSL_NO_NEXTPROTONEG
IMPLEMENT_SSL_TEST_CTX_STRING_OPTION(client_npn_protocols) IMPLEMENT_SSL_TEST_CTX_STRING_OPTION(client_npn_protocols)
IMPLEMENT_SSL_TEST_CTX_STRING_OPTION(server_npn_protocols) IMPLEMENT_SSL_TEST_CTX_STRING_OPTION(server_npn_protocols)
IMPLEMENT_SSL_TEST_CTX_STRING_OPTION(server2_npn_protocols) IMPLEMENT_SSL_TEST_CTX_STRING_OPTION(server2_npn_protocols)
...@@ -304,7 +303,6 @@ IMPLEMENT_SSL_TEST_CTX_STRING_OPTION(client_alpn_protocols) ...@@ -304,7 +303,6 @@ IMPLEMENT_SSL_TEST_CTX_STRING_OPTION(client_alpn_protocols)
IMPLEMENT_SSL_TEST_CTX_STRING_OPTION(server_alpn_protocols) IMPLEMENT_SSL_TEST_CTX_STRING_OPTION(server_alpn_protocols)
IMPLEMENT_SSL_TEST_CTX_STRING_OPTION(server2_alpn_protocols) IMPLEMENT_SSL_TEST_CTX_STRING_OPTION(server2_alpn_protocols)
IMPLEMENT_SSL_TEST_CTX_STRING_OPTION(expected_alpn_protocol) IMPLEMENT_SSL_TEST_CTX_STRING_OPTION(expected_alpn_protocol)
#endif
/***********************/ /***********************/
/* Handshake mode */ /* Handshake mode */
...@@ -374,7 +372,6 @@ static const ssl_test_ctx_option ssl_test_ctx_options[] = { ...@@ -374,7 +372,6 @@ static const ssl_test_ctx_option ssl_test_ctx_options[] = {
{ "ServerNameCallback", &parse_servername_callback }, { "ServerNameCallback", &parse_servername_callback },
{ "SessionTicketExpected", &parse_session_ticket }, { "SessionTicketExpected", &parse_session_ticket },
{ "Method", &parse_test_method }, { "Method", &parse_test_method },
#ifndef OPENSSL_NO_NEXTPROTONEG
{ "ClientNPNProtocols", &parse_client_npn_protocols }, { "ClientNPNProtocols", &parse_client_npn_protocols },
{ "ServerNPNProtocols", &parse_server_npn_protocols }, { "ServerNPNProtocols", &parse_server_npn_protocols },
{ "Server2NPNProtocols", &parse_server2_npn_protocols }, { "Server2NPNProtocols", &parse_server2_npn_protocols },
...@@ -383,7 +380,6 @@ static const ssl_test_ctx_option ssl_test_ctx_options[] = { ...@@ -383,7 +380,6 @@ static const ssl_test_ctx_option ssl_test_ctx_options[] = {
{ "ServerALPNProtocols", &parse_server_alpn_protocols }, { "ServerALPNProtocols", &parse_server_alpn_protocols },
{ "Server2ALPNProtocols", &parse_server2_alpn_protocols }, { "Server2ALPNProtocols", &parse_server2_alpn_protocols },
{ "ExpectedALPNProtocol", &parse_expected_alpn_protocol }, { "ExpectedALPNProtocol", &parse_expected_alpn_protocol },
#endif
{ "HandshakeMode", &parse_handshake_mode }, { "HandshakeMode", &parse_handshake_mode },
{ "ResumptionExpected", &parse_resumption_expected }, { "ResumptionExpected", &parse_resumption_expected },
}; };
......
...@@ -92,7 +92,7 @@ typedef struct ssl_test_ctx { ...@@ -92,7 +92,7 @@ typedef struct ssl_test_ctx {
ssl_session_ticket_t session_ticket_expected; ssl_session_ticket_t session_ticket_expected;
/* Whether the server/client CTX should use DTLS or TLS. */ /* Whether the server/client CTX should use DTLS or TLS. */
ssl_test_method_t method; ssl_test_method_t method;
#ifndef OPENSSL_NO_NEXTPROTONEG
/* /*
* NPN and ALPN protocols supported by the client, server, and second * NPN and ALPN protocols supported by the client, server, and second
* (SNI) server. A comma-separated list. * (SNI) server. A comma-separated list.
...@@ -105,7 +105,7 @@ typedef struct ssl_test_ctx { ...@@ -105,7 +105,7 @@ typedef struct ssl_test_ctx {
char *server_alpn_protocols; char *server_alpn_protocols;
char *server2_alpn_protocols; char *server2_alpn_protocols;
char *expected_alpn_protocol; char *expected_alpn_protocol;
#endif
/* Whether to test a resumed/renegotiated handshake. */ /* Whether to test a resumed/renegotiated handshake. */
ssl_handshake_mode_t handshake_mode; ssl_handshake_mode_t handshake_mode;
/* Whether the second handshake is resumed or a full handshake (boolean). */ /* Whether the second handshake is resumed or a full handshake (boolean). */
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册