summaryrefslogtreecommitdiff
path: root/tests/server_ecdsa_key.c
diff options
context:
space:
mode:
authorNikos Mavrogiannopoulos <nmav@redhat.com>2017-07-11 14:07:43 +0200
committerNikos Mavrogiannopoulos <nmav@redhat.com>2018-02-19 15:29:33 +0100
commit36dd5a9db4f80c1b46ba340b3d997e94af7bd60c (patch)
tree2fce575fe442a334ae2cc7aaa6fcdeb561274d82 /tests/server_ecdsa_key.c
parentd94ae0c1f7dd35203763917781d76d57d1a4a302 (diff)
downloadgnutls-36dd5a9db4f80c1b46ba340b3d997e94af7bd60c.tar.gz
tests: updated for the new behavior of handshake
Previously at handshake we would negotiate a ciphersuite and certificate and later figure out a signature algorithm. Now we negotiate all at once, so we no longer reach situations where mid-way of handshake we figure we have no signature algorithm to use. Update the test cases relying on that behavior to account the new one. Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
Diffstat (limited to 'tests/server_ecdsa_key.c')
-rw-r--r--tests/server_ecdsa_key.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/tests/server_ecdsa_key.c b/tests/server_ecdsa_key.c
index b290d7d91f..93cb005503 100644
--- a/tests/server_ecdsa_key.c
+++ b/tests/server_ecdsa_key.c
@@ -89,7 +89,7 @@ void doit(void)
}
test_cli_serv_expect(serv_cred, cli_cred, "NORMAL", "NORMAL:-SIGN-ALL", NULL, GNUTLS_E_AGAIN, GNUTLS_E_UNSUPPORTED_SIGNATURE_ALGORITHM);
- test_cli_serv_expect(serv_cred, cli_cred, "NORMAL", "NORMAL:-SIGN-ECDSA-SHA224:-SIGN-ECDSA-SHA1:-SIGN-ECDSA-SHA256:-SIGN-ECDSA-SHA384:-SIGN-ECDSA-SHA512", NULL, GNUTLS_E_NO_CIPHER_SUITES, GNUTLS_E_AGAIN);
+ test_cli_serv_expect(serv_cred, cli_cred, "NORMAL", "NORMAL:-SIGN-ECDSA-SHA224:-SIGN-ECDSA-SHA1:-SIGN-ECDSA-SHA256:-SIGN-ECDSA-SHA384:-SIGN-ECDSA-SHA512:-SIGN-ECDSA-SECP256R1-SHA256:-SIGN-ECDSA-SECP384R1-SHA384:-SIGN-ECDSA-SECP521R1-SHA512", NULL, GNUTLS_E_NO_CIPHER_SUITES, GNUTLS_E_AGAIN);
gnutls_certificate_free_credentials(serv_cred);
gnutls_certificate_free_credentials(cli_cred);