summaryrefslogtreecommitdiff
path: root/tests
diff options
context:
space:
mode:
authorNikos Mavrogiannopoulos <nmav@redhat.com>2018-04-04 15:28:37 +0200
committerNikos Mavrogiannopoulos <nmav@redhat.com>2018-04-06 13:28:55 +0200
commit7d60d1e971ac8412b2592666a121008987e23f1e (patch)
treebb77ca61d788f6f7754083b603a6122b75c53196 /tests
parent3437fdde655a73af380018ce22435628d557036e (diff)
downloadgnutls-7d60d1e971ac8412b2592666a121008987e23f1e.tar.gz
psk: save the username on auth info struct under TLS1.3
Add the necessary tests to verify that gnutls_psk_server_get_username() reports the right username under TLS1.2 and TLS1.3. Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
Diffstat (limited to 'tests')
-rw-r--r--tests/psk-file.c7
1 files changed, 7 insertions, 0 deletions
diff --git a/tests/psk-file.c b/tests/psk-file.c
index 59f6f2d4a2..a6df3f0467 100644
--- a/tests/psk-file.c
+++ b/tests/psk-file.c
@@ -179,6 +179,7 @@ static void server(int sd, const char *prio, const char *user, int expect_fail,
gnutls_psk_server_credentials_t server_pskcred;
int ret, kx;
gnutls_session_t session;
+ const char *pskid;
char buffer[MAX_BUF + 1];
char *psk_file = getenv("PSK_FILE");
char *desc;
@@ -269,6 +270,12 @@ static void server(int sd, const char *prio, const char *user, int expect_fail,
if (expect_fail)
fail("server: expected failure but connection succeeded!\n");
+ pskid = gnutls_psk_server_get_username(session);
+ if (pskid == NULL || strcmp(pskid, user) != 0) {
+ fail("server: username (%s), does not match expected (%s)\n",
+ pskid, user);
+ }
+
if (exp_kx && kx != exp_kx) {
fail("server: expected key exchange %s, but got %s\n",
gnutls_kx_get_name(exp_kx),