openssl/test/ssl-tests
Matt Caswell 9afc6c5431 Fix the check for suitable groups and TLSv1.3
If we have TLSv1.3 enabled then we must have at least one TLSv1.3 capable
group available. This check was not always working

Reviewed-by: Ben Kaduk <kaduk@mit.edu>
(Merged from https://github.com/openssl/openssl/pull/14430)
2021-03-08 15:32:04 +00:00
..
01-simple.cnf
01-simple.cnf.in
02-protocol-version.cnf
02-protocol-version.cnf.in
03-custom_verify.cnf
03-custom_verify.cnf.in
04-client_auth.cnf
04-client_auth.cnf.in
05-sni.cnf
05-sni.cnf.in
06-sni-ticket.cnf
06-sni-ticket.cnf.in
07-dtls-protocol-version.cnf
07-dtls-protocol-version.cnf.in
08-npn.cnf
08-npn.cnf.in
09-alpn.cnf
09-alpn.cnf.in
10-resumption.cnf
10-resumption.cnf.in
11-dtls_resumption.cnf
11-dtls_resumption.cnf.in
12-ct.cnf
12-ct.cnf.in
13-fragmentation.cnf
13-fragmentation.cnf.in
14-curves.cnf
14-curves.cnf.in
15-certstatus.cnf
15-certstatus.cnf.in
16-dtls-certstatus.cnf
16-dtls-certstatus.cnf.in
17-renegotiate.cnf
17-renegotiate.cnf.in
18-dtls-renegotiate.cnf
18-dtls-renegotiate.cnf.in
19-mac-then-encrypt.cnf
19-mac-then-encrypt.cnf.in
20-cert-select.cnf
20-cert-select.cnf.in
21-key-update.cnf
21-key-update.cnf.in
22-compression.cnf
22-compression.cnf.in
23-srp.cnf
23-srp.cnf.in
24-padding.cnf
24-padding.cnf.in
25-cipher.cnf
25-cipher.cnf.in
26-tls13_client_auth.cnf
26-tls13_client_auth.cnf.in
27-ticket-appdata.cnf
27-ticket-appdata.cnf.in
28-seclevel.cnf
28-seclevel.cnf.in
29-dtls-sctp-label-bug.cnf
29-dtls-sctp-label-bug.cnf.in
30-extended-master-secret.cnf
30-extended-master-secret.cnf.in
protocol_version.pm
ssltests_base.pm