summaryrefslogtreecommitdiff
path: root/src/cli-debug.c
diff options
context:
space:
mode:
authorNikos Mavrogiannopoulos <nmav@redhat.com>2014-11-04 14:44:27 +0100
committerNikos Mavrogiannopoulos <nmav@redhat.com>2014-11-04 14:49:24 +0100
commita75b1af2bff4e4c770a37198f399c3cc7c438aec (patch)
tree9a25f3be6e28524d83921e1cdcd652606675aa09 /src/cli-debug.c
parent7716aff4a3d08065e806c8e2304f183a2b273c23 (diff)
downloadgnutls-a75b1af2bff4e4c770a37198f399c3cc7c438aec.tar.gz
enhanced gnutls-cli-debug verbose output (uses files for mass text)
Diffstat (limited to 'src/cli-debug.c')
-rw-r--r--src/cli-debug.c16
1 files changed, 8 insertions, 8 deletions
diff --git a/src/cli-debug.c b/src/cli-debug.c
index 95e6b1dd22..300ab4b78c 100644
--- a/src/cli-debug.c
+++ b/src/cli-debug.c
@@ -109,8 +109,8 @@ static const TLS_TEST tls_tests[] = {
test_safe_renegotiation_scsv,
"yes", "no", "dunno"},
{"encrypt-then-MAC (RFC7366) support", test_etm, "yes", "no", "dunno"},
- {"extended master secret (draft-ietf-tls-session-hash) support", test_ext_master_secret, "yes", "no", "dunno"},
- {"for HTTPS server name", test_server, "", "failed",
+ {"ext master secret (draft-ietf-tls-session-hash) support", test_ext_master_secret, "yes", "no", "dunno"},
+ {"for HTTPS server name", test_server, NULL, "failed",
"not checked"},
{"for version rollback bug in RSA PMS", test_rsa_pms, "no", "yes",
"dunno"},
@@ -129,8 +129,8 @@ static const TLS_TEST tls_tests[] = {
{"whether cipher suites not in SSL 3.0 spec are accepted",
test_unknown_ciphersuites, "yes", "no", "dunno"},
{"whether a bogus TLS record version in the client hello is accepted", test_version_oob, "yes", "no", "dunno"},
- {"for certificate information", test_certificate, "", "", ""},
- {"for trusted CAs", test_server_cas, "", "", ""},
+ {"for certificate information", test_certificate, NULL, "", ""},
+ {"for trusted CAs", test_server_cas, NULL, "", ""},
{"whether the server understands TLS closure alerts", test_bye,
"yes", "no", "partially"},
/* the fact that is after the closure alert test does matter.
@@ -141,12 +141,12 @@ static const TLS_TEST tls_tests[] = {
{"for anonymous authentication support", test_anonymous, "yes",
"no",
"dunno"},
- {"anonymous Diffie-Hellman group info", test_dhe_group, "", "N/A",
+ {"anonymous Diffie-Hellman group info", test_dhe_group, NULL, "N/A",
"N/A"},
#endif
{"for ephemeral Diffie-Hellman support", test_dhe, "yes", "no",
"dunno"},
- {"ephemeral Diffie-Hellman group info", test_dhe_group, "", "N/A",
+ {"ephemeral Diffie-Hellman group info", test_dhe_group, NULL, "N/A",
"N/A"},
{"for ephemeral EC Diffie-Hellman support", test_ecdhe, "yes",
"no",
@@ -158,9 +158,9 @@ static const TLS_TEST tls_tests[] = {
"dunno"},
{"for AES-128-CBC cipher (RFC3268) support", test_aes, "yes", "no",
"dunno"},
- {"for CAMELLIA-128-GCM (RFC6367) cipher support", test_camellia_gcm, "yes", "no",
+ {"for CAMELLIA-128-GCM cipher (RFC6367) support", test_camellia_gcm, "yes", "no",
"dunno"},
- {"for CAMELLIA-128-CBC (RFC5932) cipher support", test_camellia_cbc, "yes", "no",
+ {"for CAMELLIA-128-CBC cipher (RFC5932) support", test_camellia_cbc, "yes", "no",
"dunno"},
{"for 3DES-CBC cipher (RFC2246) support", test_3des, "yes", "no", "dunno"},
{"for ARCFOUR 128 cipher (RFC2246) support", test_arcfour, "yes", "no",