summaryrefslogtreecommitdiff
path: root/test/sslapitest.c
diff options
context:
space:
mode:
authorTodd Short <todd.short@me.com>2022-12-05 10:30:27 -0500
committerTomas Mraz <tomas@openssl.org>2022-12-08 16:25:04 +0100
commit2dded44a4911250acb989a535d2bad0bcf0ccc78 (patch)
treee6eeaa8aa24d81f212388c623fbd80327ed43a88 /test/sslapitest.c
parent61203c2c59df5d0022e316a4fe614e5d18907715 (diff)
downloadopenssl-new-2dded44a4911250acb989a535d2bad0bcf0ccc78.tar.gz
Fix `no-ec enable-ktls` build
The KTLS test uses a TLSv1.2 cipher that uses ECDHE Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19841)
Diffstat (limited to 'test/sslapitest.c')
-rw-r--r--test/sslapitest.c2
1 files changed, 2 insertions, 0 deletions
diff --git a/test/sslapitest.c b/test/sslapitest.c
index 074a957576..3cb355a2ea 100644
--- a/test/sslapitest.c
+++ b/test/sslapitest.c
@@ -1450,7 +1450,9 @@ static struct ktls_test_cipher {
{ TLS1_2_VERSION, "AES256-GCM-SHA384"},
# endif
# ifdef OPENSSL_KTLS_CHACHA20_POLY1305
+# ifndef OPENSSL_NO_EC
{ TLS1_2_VERSION, "ECDHE-RSA-CHACHA20-POLY1305"},
+# endif
# endif
# endif
# if !defined(OSSL_NO_USABLE_TLS1_3)