Fix rsa_test to properly test RSA_SSLV23_PADDING
authorMatt Caswell <matt@openssl.org>
Fri, 22 Jan 2021 16:50:11 +0000 (16:50 +0000)
committerMatt Caswell <matt@openssl.org>
Tue, 16 Feb 2021 11:38:22 +0000 (11:38 +0000)
commit481a88f13c44996a008195791ea0dc076b968774
tree44c01103c1f572a4fbb4cfdab8d7452eb5ade594
parent901f1ef7dacb6b3bde63233a1f623e1fa2f0f058
Fix rsa_test to properly test RSA_SSLV23_PADDING

We test all three cases:
- An SSLv2 only client talking to a TLS capable server
- A TLS capable client talking to an SSLv2 only server
- A TLS capable client talking to a TLS capable server (should fail due
to detecting a rollback attack)

Reviewed-by: Paul Dale <pauli@openssl.org>
test/rsa_test.c