diff options
author | Nikos Mavrogiannopoulos <nmav@redhat.com> | 2017-05-30 10:59:53 +0200 |
---|---|---|
committer | Nikos Mavrogiannopoulos <nmav@redhat.com> | 2017-05-31 14:50:19 +0200 |
commit | 3ffcff8ddf994e94c6c9c693be0a520ea825fa91 (patch) | |
tree | 3329ae6611809686d6a16c30e780c2d61509de62 /tests/client_dsa_key.c | |
parent | af511c871e54181417990a19f6e8ba054a9557ab (diff) | |
download | gnutls-3ffcff8ddf994e94c6c9c693be0a520ea825fa91.tar.gz |
tests: modify tests to allow signatures with SHA1
There were several tests that were utilizing SHA1 signatures but were
not failing due to the bug in gnutls_pubkey_verify_hash2().
Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
Diffstat (limited to 'tests/client_dsa_key.c')
-rw-r--r-- | tests/client_dsa_key.c | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/tests/client_dsa_key.c b/tests/client_dsa_key.c index a1bfb85f3e..eb2794ea81 100644 --- a/tests/client_dsa_key.c +++ b/tests/client_dsa_key.c @@ -84,6 +84,7 @@ void doit(void) /* test gnutls_certificate_flags() */ gnutls_certificate_allocate_credentials(&serv_cred); gnutls_certificate_set_flags(serv_cred, GNUTLS_CERTIFICATE_SKIP_KEY_CERT_MATCH); + gnutls_certificate_set_verify_flags(serv_cred, GNUTLS_VERIFY_ALLOW_SIGN_WITH_SHA1); ret = gnutls_certificate_set_x509_trust_mem(serv_cred, &ca3_cert, GNUTLS_X509_FMT_PEM); if (ret < 0) |