forked from wolfSSL/wolfssl
update test conf to fix jenkins failures
This commit is contained in:
@@ -49,7 +49,6 @@
|
||||
|
||||
# client TLSv1.2, should fail
|
||||
-v 3
|
||||
-l ECDHE-RSA-AES256-GCM-SHA384
|
||||
-H exitWithRet
|
||||
|
||||
# server TLSv1.2
|
||||
@@ -59,7 +58,6 @@
|
||||
|
||||
# client TLSv1.3, should fail
|
||||
-v 4
|
||||
-l TLS13-AES128-GCM-SHA256
|
||||
-H exitWithRet
|
||||
|
||||
# server TLSv1.2
|
||||
@@ -73,7 +71,6 @@
|
||||
# expect to be failure
|
||||
-7 4
|
||||
-v d
|
||||
-l TLS13-AES128-GCM-SHA256
|
||||
-H exitWithRet
|
||||
|
||||
# server
|
||||
@@ -88,7 +85,6 @@
|
||||
# minimum downgradable TLSv 1.3
|
||||
-7 4
|
||||
-v d
|
||||
-l TLS13-AES128-GCM-SHA256
|
||||
|
||||
# server
|
||||
# enable downgrade
|
||||
@@ -99,7 +95,6 @@
|
||||
|
||||
# client TLSv 1.2
|
||||
-v 3
|
||||
-l ECDHE-RSA-AES256-GCM-SHA384
|
||||
|
||||
# server
|
||||
# enable downgrade
|
||||
@@ -112,5 +107,4 @@
|
||||
|
||||
# client TLSv 1.2
|
||||
-v 3
|
||||
-l ECDHE-RSA-AES256-GCM-SHA384
|
||||
-H exitWithRet
|
||||
|
Reference in New Issue
Block a user