Fix `no-ec enable-ktls` build
authorTodd Short <todd.short@me.com>
Mon, 5 Dec 2022 15:30:27 +0000 (10:30 -0500)
committerTomas Mraz <tomas@openssl.org>
Thu, 8 Dec 2022 15:25:04 +0000 (16:25 +0100)
The KTLS test uses a TLSv1.2 cipher that uses ECDHE

Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Paul Dale <pauli@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/19841)

test/sslapitest.c

index 074a9575760ac104d9a54cf445eb2d1747d9320b..3cb355a2eac3c6730c406c18de04eedf9384f976 100644 (file)
@@ -1450,7 +1450,9 @@ static struct ktls_test_cipher {
     { TLS1_2_VERSION, "AES256-GCM-SHA384"},
 #  endif
 #  ifdef OPENSSL_KTLS_CHACHA20_POLY1305
+#    ifndef OPENSSL_NO_EC
     { TLS1_2_VERSION, "ECDHE-RSA-CHACHA20-POLY1305"},
+#    endif
 #  endif
 # endif
 # if !defined(OSSL_NO_USABLE_TLS1_3)