summaryrefslogtreecommitdiff
path: root/tests/server_ecdsa_key.c
Commit message (Collapse)AuthorAgeFilesLines
* tests: updated for new behavior of disabling protocols on missing signature ↵Nikos Mavrogiannopoulos2018-02-191-1/+1
| | | | | | algorithms Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* tests: updated for the new behavior of handshakeNikos Mavrogiannopoulos2018-02-191-1/+1
| | | | | | | | | | Previously at handshake we would negotiate a ciphersuite and certificate and later figure out a signature algorithm. Now we negotiate all at once, so we no longer reach situations where mid-way of handshake we figure we have no signature algorithm to use. Update the test cases relying on that behavior to account the new one. Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* tests: updated for errors returned due to early signature selectionNikos Mavrogiannopoulos2017-08-041-1/+1
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* handshake: return better error code on unwanted algorithmNikos Mavrogiannopoulos2017-07-171-1/+1
| | | | | | | | That is, when a signature algorithm is available which was not asked by the peer, then return GNUTLS_E_UNWANTED_ALGORITHM instead of the UNKNOWN_ALGORITHM. Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* tests: added check for server-side ECDSA keysNikos Mavrogiannopoulos2016-09-221-0/+101
These tests check whether a server ECDSA key will be rejected by the client in case the client has no ECDSA signature algorithms available.