mirror of
https://github.com/Mbed-TLS/mbedtls.git
synced 2025-02-21 15:41:00 +00:00
Reorder some tests in ssl-opt.sh
The tests above are required then optional then none. Follow the same pattern here. Just moving things around (see git's --color-moved option). Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com>
This commit is contained in:
parent
58ab9ba0bd
commit
18dd213114
@ -5871,7 +5871,27 @@ run_test "Authentication: server badcert, client none" \
|
||||
-C "send alert level=2 message=48" \
|
||||
-C "X509 - Certificate verification failed"
|
||||
|
||||
# TODO: server goodcert, client none, no trusted CA
|
||||
requires_key_exchange_with_cert_in_tls12_or_tls13_enabled
|
||||
run_test "Authentication: server goodcert, client required, no trusted CA" \
|
||||
"$P_SRV" \
|
||||
"$P_CLI debug_level=3 auth_mode=required ca_file=none ca_path=none" \
|
||||
1 \
|
||||
-c "x509_verify_cert() returned" \
|
||||
-c "! The certificate is not correctly signed by the trusted CA" \
|
||||
-c "! Certificate verification flags"\
|
||||
-c "! mbedtls_ssl_handshake returned" \
|
||||
-c "SSL - No CA Chain is set, but required to operate"
|
||||
|
||||
requires_any_configs_enabled $TLS1_2_KEY_EXCHANGES_WITH_CERT
|
||||
run_test "Authentication: server goodcert, client required, no trusted CA (1.2)" \
|
||||
"$P_SRV force_version=tls12" \
|
||||
"$P_CLI debug_level=3 auth_mode=required ca_file=none ca_path=none" \
|
||||
1 \
|
||||
-c "x509_verify_cert() returned" \
|
||||
-c "! The certificate is not correctly signed by the trusted CA" \
|
||||
-c "! Certificate verification flags"\
|
||||
-c "! mbedtls_ssl_handshake returned" \
|
||||
-c "SSL - No CA Chain is set, but required to operate"
|
||||
|
||||
requires_key_exchange_with_cert_in_tls12_or_tls13_enabled
|
||||
run_test "Authentication: server goodcert, client optional, no trusted CA" \
|
||||
@ -5897,27 +5917,7 @@ run_test "Authentication: server goodcert, client optional, no trusted CA (1.
|
||||
-C "X509 - Certificate verification failed" \
|
||||
-C "SSL - No CA Chain is set, but required to operate"
|
||||
|
||||
requires_key_exchange_with_cert_in_tls12_or_tls13_enabled
|
||||
run_test "Authentication: server goodcert, client required, no trusted CA" \
|
||||
"$P_SRV" \
|
||||
"$P_CLI debug_level=3 auth_mode=required ca_file=none ca_path=none" \
|
||||
1 \
|
||||
-c "x509_verify_cert() returned" \
|
||||
-c "! The certificate is not correctly signed by the trusted CA" \
|
||||
-c "! Certificate verification flags"\
|
||||
-c "! mbedtls_ssl_handshake returned" \
|
||||
-c "SSL - No CA Chain is set, but required to operate"
|
||||
|
||||
requires_any_configs_enabled $TLS1_2_KEY_EXCHANGES_WITH_CERT
|
||||
run_test "Authentication: server goodcert, client required, no trusted CA (1.2)" \
|
||||
"$P_SRV force_version=tls12" \
|
||||
"$P_CLI debug_level=3 auth_mode=required ca_file=none ca_path=none" \
|
||||
1 \
|
||||
-c "x509_verify_cert() returned" \
|
||||
-c "! The certificate is not correctly signed by the trusted CA" \
|
||||
-c "! Certificate verification flags"\
|
||||
-c "! mbedtls_ssl_handshake returned" \
|
||||
-c "SSL - No CA Chain is set, but required to operate"
|
||||
# TODO: server goodcert, client none, no trusted CA
|
||||
|
||||
# The purpose of the next two tests is to test the client's behaviour when receiving a server
|
||||
# certificate with an unsupported elliptic curve. This should usually not happen because
|
||||
|
Loading…
x
Reference in New Issue
Block a user