summaryrefslogtreecommitdiff
path: root/tests/client_dsa_key.c
diff options
context:
space:
mode:
authorNikos Mavrogiannopoulos <nmav@redhat.com>2017-05-30 10:59:53 +0200
committerNikos Mavrogiannopoulos <nmav@redhat.com>2017-05-31 14:50:19 +0200
commit3ffcff8ddf994e94c6c9c693be0a520ea825fa91 (patch)
tree3329ae6611809686d6a16c30e780c2d61509de62 /tests/client_dsa_key.c
parentaf511c871e54181417990a19f6e8ba054a9557ab (diff)
downloadgnutls-3ffcff8ddf994e94c6c9c693be0a520ea825fa91.tar.gz
tests: modify tests to allow signatures with SHA1
There were several tests that were utilizing SHA1 signatures but were not failing due to the bug in gnutls_pubkey_verify_hash2(). Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
Diffstat (limited to 'tests/client_dsa_key.c')
-rw-r--r--tests/client_dsa_key.c1
1 files changed, 1 insertions, 0 deletions
diff --git a/tests/client_dsa_key.c b/tests/client_dsa_key.c
index a1bfb85f3e..eb2794ea81 100644
--- a/tests/client_dsa_key.c
+++ b/tests/client_dsa_key.c
@@ -84,6 +84,7 @@ void doit(void)
/* test gnutls_certificate_flags() */
gnutls_certificate_allocate_credentials(&serv_cred);
gnutls_certificate_set_flags(serv_cred, GNUTLS_CERTIFICATE_SKIP_KEY_CERT_MATCH);
+ gnutls_certificate_set_verify_flags(serv_cred, GNUTLS_VERIFY_ALLOW_SIGN_WITH_SHA1);
ret = gnutls_certificate_set_x509_trust_mem(serv_cred, &ca3_cert, GNUTLS_X509_FMT_PEM);
if (ret < 0)