Don't run a CT specifc test if CT is disabled
authorMatt Caswell <matt@openssl.org>
Thu, 24 Aug 2017 13:49:32 +0000 (14:49 +0100)
committerMatt Caswell <matt@openssl.org>
Fri, 25 Aug 2017 09:37:22 +0000 (10:37 +0100)
Reviewed-by: Rich Salz <rsalz@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/4245)

test/recipes/70-test_sslextension.t

index ce25c787af2f15699043d31c745f4fb1bc04546b..0622e4deccd9b07e14fed815a86fe6c1436d216b 100644 (file)
@@ -160,7 +160,7 @@ sub inject_unsolicited_extension
 }
 
 SKIP: {
-    skip "TLS <= 1.2 disabled", 2 if alldisabled(("tls1", "tls1_1", "tls1_2"));
+    skip "TLS <= 1.2 disabled", 1 if alldisabled(("tls1", "tls1_1", "tls1_2"));
     #Test 4: Inject an unsolicited extension (<= TLSv1.2)
     $proxy->clear();
     $proxy->filter(\&inject_unsolicited_extension);
@@ -168,7 +168,11 @@ SKIP: {
     $proxy->clientflags("-no_tls1_3 -noservername");
     $proxy->start();
     ok(TLSProxy::Message->fail(), "Unsolicited server name extension");
+}
 
+SKIP: {
+    skip "TLS <= 1.2 or CT disabled", 1
+        if alldisabled(("tls1", "tls1_1", "tls1_2")) || disabled("ct");
     #Test 5: Same as above for the SCT extension which has special handling
     $proxy->clear();
     $testtype = UNSOLICITED_SCT;