test: pin optional client auth test to a TLS 1.2 policy #4914
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
#4765
Description of changes:
Pin tests in
s2n_optional_client_auth_test
to a TLS 1.2 security policy.Callout:
Why do we need this change?
These tests iterate thru all ciphers in the security policy and attempt a handshake. Currently all ciphers in the security policy are able to negotiate TLS1.2. When we introduce TLS 1.3 support to the default policy (by adding TLS1.3 ciphers),
s2n_disable_tls13_in_test()
will work by setting thes2n_highest_protocol_version
to TLS1.2 to prevent negotiating TLS1.3.However, TLS1.3 only ciphers are not able to negotiate TLS1.2, causing the tests to fail.
Testing:
Existing tests should continue to pass.
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.