Enable TLSProxy tests on Windows
[openssl.git] / test / recipes / 70-test_sslsignature.t
old mode 100755 (executable)
new mode 100644 (file)
index 732e17e..132ed28
@@ -15,7 +15,7 @@ my $test_name = "test_sslsignature";
 setup($test_name);
 
 plan skip_all => "TLSProxy isn't usable on $^O"
-    if $^O =~ /^(VMS|MSWin32)$/;
+    if $^O =~ /^(VMS)$/;
 
 plan skip_all => "$test_name needs the dynamic engine feature enabled"
     if disabled("engine") || disabled("dynamic-engine");
@@ -93,14 +93,19 @@ SKIP: {
     $proxy->start();
     ok(TLSProxy::Message->fail, "Corrupt <=TLSv1.2 CertVerify");
 
-    #Test 4: Corrupting a ServerKeyExchange signature in <=TLSv1.2 should fail
-    $proxy->clear();
-    $testtype = CORRUPT_TLS1_2_SERVER_KEY_EXCHANGE;
-    $proxy->clientflags("-no_tls1_3");
-    $proxy->cipherc('DHE-RSA-AES128-SHA');
-    $proxy->ciphers('DHE-RSA-AES128-SHA');
-    $proxy->start();
-    ok(TLSProxy::Message->fail, "Corrupt <=TLSv1.2 ServerKeyExchange");
+    SKIP: {
+        skip "DH disabled", 1 if disabled("dh");
+
+        #Test 4: Corrupting a ServerKeyExchange signature in <=TLSv1.2 should
+        #fail
+        $proxy->clear();
+        $testtype = CORRUPT_TLS1_2_SERVER_KEY_EXCHANGE;
+        $proxy->clientflags("-no_tls1_3");
+        $proxy->cipherc('DHE-RSA-AES128-SHA');
+        $proxy->ciphers('DHE-RSA-AES128-SHA');
+        $proxy->start();
+        ok(TLSProxy::Message->fail, "Corrupt <=TLSv1.2 ServerKeyExchange");
+    }
 }
 
 sub signature_filter