forked from wolfSSL/wolfssl
Update testsuite to expect ADH-AES256-GCM-SHA384 to fail with TLSv1.0 and TLSv1.1
This commit is contained in:
@ -1782,21 +1782,25 @@
|
||||
-a
|
||||
-v 2
|
||||
-l ADH-AES256-GCM-SHA384
|
||||
-H exitWithRet
|
||||
|
||||
# client TLSv1.1 ADH-AES256-GCM-SHA384
|
||||
-a
|
||||
-v 2
|
||||
-l ADH-AES256-GCM-SHA384
|
||||
-H exitWithRet
|
||||
|
||||
# server TLSv1.0 ADH-AES256-GCM-SHA384
|
||||
-a
|
||||
-v 1
|
||||
-l ADH-AES256-GCM-SHA384
|
||||
-H exitWithRet
|
||||
|
||||
# client TLSv1.0 ADH-AES256-GCM-SHA384
|
||||
-a
|
||||
-v 1
|
||||
-l ADH-AES256-GCM-SHA384
|
||||
-H exitWithRet
|
||||
|
||||
# server TLSv1 NTRU_RC4
|
||||
-v 1
|
||||
|
Reference in New Issue
Block a user