diff options
author | Stefan Sørensen <stefan.sorensen@spectralink.com> | 2016-08-08 13:31:18 +0200 |
---|---|---|
committer | Nikos Mavrogiannopoulos <nmav@redhat.com> | 2016-08-09 10:14:11 +0200 |
commit | 11833bfd026392d952504abb02ed8ca229d788c7 (patch) | |
tree | 9c2362eb2fbeaf01b22051d3a4253c0e600226e5 /tests/x509-cert-callback-legacy.c | |
parent | c269b007eed114a215ace1c92c1ae368f4400810 (diff) | |
download | gnutls-11833bfd026392d952504abb02ed8ca229d788c7.tar.gz |
Change ca3 and related certificate to include an intermediate CA in the chain.
Also update a bunch of test-cases to support chains with an intermediate CA.
Signed-off-by: Stefan Sørensen <stefan.sorensen@spectralink.com>
Diffstat (limited to 'tests/x509-cert-callback-legacy.c')
-rw-r--r-- | tests/x509-cert-callback-legacy.c | 12 |
1 files changed, 6 insertions, 6 deletions
diff --git a/tests/x509-cert-callback-legacy.c b/tests/x509-cert-callback-legacy.c index 257dbaa998..caf515f711 100644 --- a/tests/x509-cert-callback-legacy.c +++ b/tests/x509-cert-callback-legacy.c @@ -63,7 +63,7 @@ cert_callback(gnutls_session_t session, st->cert_type = GNUTLS_CRT_X509; - ret = gnutls_x509_crt_list_import2(&crts, &crts_size, &cli_ca3_cert, GNUTLS_X509_FMT_PEM, + ret = gnutls_x509_crt_list_import2(&crts, &crts_size, &cli_ca3_cert_chain, GNUTLS_X509_FMT_PEM, GNUTLS_X509_CRT_LIST_FAIL_IF_UNSORTED); if (ret < 0) { fail("error: %s\n", gnutls_strerror(ret)); @@ -105,7 +105,7 @@ server_cert_callback(gnutls_session_t session, st->cert_type = GNUTLS_CRT_X509; - ret = gnutls_x509_crt_list_import2(&crts, &crts_size, &server_ca3_cert, GNUTLS_X509_FMT_PEM, + ret = gnutls_x509_crt_list_import2(&crts, &crts_size, &server_ca3_cert_chain, GNUTLS_X509_FMT_PEM, GNUTLS_X509_CRT_LIST_FAIL_IF_UNSORTED); if (ret < 0) { fail("error: %s\n", gnutls_strerror(ret)); @@ -217,7 +217,7 @@ void doit(void) gnutls_x509_crt_init(&crt); ret = - gnutls_x509_crt_import(crt, &server_ca3_localhost_cert, + gnutls_x509_crt_import(crt, &server_ca3_localhost_cert_chain, GNUTLS_X509_FMT_PEM); if (ret < 0) { fail("gnutls_x509_crt_import: %s\n", @@ -255,7 +255,7 @@ void doit(void) gnutls_x509_crt_init(&crt); ret = - gnutls_x509_crt_import(crt, &cli_ca3_cert, + gnutls_x509_crt_import(crt, &cli_ca3_cert_chain, GNUTLS_X509_FMT_PEM); if (ret < 0) { fail("gnutls_x509_crt_import: %s\n", @@ -295,7 +295,7 @@ void doit(void) data[1].data = (void *)GNUTLS_KP_TLS_WWW_SERVER; gnutls_certificate_get_peers(client, &cert_list_size); - if (cert_list_size != 1) { + if (cert_list_size != 2) { fprintf(stderr, "received a certificate list of %d!\n", cert_list_size); exit(1); @@ -321,7 +321,7 @@ void doit(void) data[1].data = (void *)GNUTLS_KP_TLS_WWW_CLIENT; gnutls_certificate_get_peers(client, &cert_list_size); - if (cert_list_size != 1) { + if (cert_list_size != 2) { fprintf(stderr, "received a certificate list of %d!\n", cert_list_size); exit(1); |