diff options
author | Nikos Mavrogiannopoulos <nmav@redhat.com> | 2017-07-11 14:07:43 +0200 |
---|---|---|
committer | Nikos Mavrogiannopoulos <nmav@redhat.com> | 2018-02-19 15:29:33 +0100 |
commit | 36dd5a9db4f80c1b46ba340b3d997e94af7bd60c (patch) | |
tree | 2fce575fe442a334ae2cc7aaa6fcdeb561274d82 /tests/server_ecdsa_key.c | |
parent | d94ae0c1f7dd35203763917781d76d57d1a4a302 (diff) | |
download | gnutls-36dd5a9db4f80c1b46ba340b3d997e94af7bd60c.tar.gz |
tests: updated for the new behavior of handshake
Previously at handshake we would negotiate a ciphersuite and certificate
and later figure out a signature algorithm. Now we negotiate all at once,
so we no longer reach situations where mid-way of handshake we figure we
have no signature algorithm to use. Update the test cases relying on that
behavior to account the new one.
Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
Diffstat (limited to 'tests/server_ecdsa_key.c')
-rw-r--r-- | tests/server_ecdsa_key.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/tests/server_ecdsa_key.c b/tests/server_ecdsa_key.c index b290d7d91f..93cb005503 100644 --- a/tests/server_ecdsa_key.c +++ b/tests/server_ecdsa_key.c @@ -89,7 +89,7 @@ void doit(void) } test_cli_serv_expect(serv_cred, cli_cred, "NORMAL", "NORMAL:-SIGN-ALL", NULL, GNUTLS_E_AGAIN, GNUTLS_E_UNSUPPORTED_SIGNATURE_ALGORITHM); - test_cli_serv_expect(serv_cred, cli_cred, "NORMAL", "NORMAL:-SIGN-ECDSA-SHA224:-SIGN-ECDSA-SHA1:-SIGN-ECDSA-SHA256:-SIGN-ECDSA-SHA384:-SIGN-ECDSA-SHA512", NULL, GNUTLS_E_NO_CIPHER_SUITES, GNUTLS_E_AGAIN); + test_cli_serv_expect(serv_cred, cli_cred, "NORMAL", "NORMAL:-SIGN-ECDSA-SHA224:-SIGN-ECDSA-SHA1:-SIGN-ECDSA-SHA256:-SIGN-ECDSA-SHA384:-SIGN-ECDSA-SHA512:-SIGN-ECDSA-SECP256R1-SHA256:-SIGN-ECDSA-SECP384R1-SHA384:-SIGN-ECDSA-SECP521R1-SHA512", NULL, GNUTLS_E_NO_CIPHER_SUITES, GNUTLS_E_AGAIN); gnutls_certificate_free_credentials(serv_cred); gnutls_certificate_free_credentials(cli_cred); |