mirror of
https://github.com/openssl/openssl.git
synced 2024-12-13 20:13:53 +08:00
Use PSS for simple test so TLS 1.3 handhake is successful.
Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/2301)
This commit is contained in:
parent
a92e710b7a
commit
d8979bdda8
@ -40,12 +40,12 @@ client = 1-Server signature algorithms bug-client
|
||||
[1-Server signature algorithms bug-server]
|
||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||
CipherString = DEFAULT
|
||||
ClientSignatureAlgorithms = ECDSA+SHA256
|
||||
ClientSignatureAlgorithms = PSS+SHA512:RSA+SHA512
|
||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||
|
||||
[1-Server signature algorithms bug-client]
|
||||
CipherString = DEFAULT
|
||||
SignatureAlgorithms = RSA+SHA256
|
||||
SignatureAlgorithms = PSS+SHA256:RSA+SHA256
|
||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||
VerifyMode = Peer
|
||||
|
||||
|
@ -22,8 +22,8 @@ our @tests = (
|
||||
{
|
||||
name => "Server signature algorithms bug",
|
||||
# Should have no effect as we aren't doing client auth
|
||||
server => { "ClientSignatureAlgorithms" => "ECDSA+SHA256" },
|
||||
client => { "SignatureAlgorithms" => "RSA+SHA256" },
|
||||
server => { "ClientSignatureAlgorithms" => "PSS+SHA512:RSA+SHA512" },
|
||||
client => { "SignatureAlgorithms" => "PSS+SHA256:RSA+SHA256" },
|
||||
test => { "ExpectedResult" => "Success" },
|
||||
},
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user