Rm obsolete hack in ssl-opt.sh

This commit is contained in:
Manuel Pégourié-Gonnard 2015-07-07 11:54:14 +02:00
parent b4b19f395f
commit 7eb58cbae8
2 changed files with 3 additions and 4 deletions

View file

@ -690,7 +690,7 @@ add_mbedtls_ciphersuites()
;; ;;
"PSK") "PSK")
# *PKS-NULL-SHA suites supported by GnuTLS 3.3.5 but not 3.2.15 # *PSK-NULL-SHA suites supported by GnuTLS 3.3.5 but not 3.2.15
P_CIPHERS="$P_CIPHERS \ P_CIPHERS="$P_CIPHERS \
TLS-PSK-WITH-NULL-SHA \ TLS-PSK-WITH-NULL-SHA \
TLS-DHE-PSK-WITH-NULL-SHA \ TLS-DHE-PSK-WITH-NULL-SHA \

View file

@ -2256,11 +2256,10 @@ run_test "extKeyUsage srv: codeSign,anyEKU -> OK" \
"$P_CLI" \ "$P_CLI" \
0 0
# add psk to leave an option for client to send SERVERQUIT
run_test "extKeyUsage srv: codeSign -> fail" \ run_test "extKeyUsage srv: codeSign -> fail" \
"$P_SRV psk=abc123 key_file=data_files/server5.key \ "$P_SRV key_file=data_files/server5.key \
crt_file=data_files/server5.eku-cli.crt" \ crt_file=data_files/server5.eku-cli.crt" \
"$P_CLI psk=badbad" \ "$P_CLI" \
1 1
# Tests for extendedKeyUsage, part 2: client-side checking of server cert # Tests for extendedKeyUsage, part 2: client-side checking of server cert