summaryrefslogtreecommitdiffstats
path: root/test/ssl-tests/20-cert-select.conf.in
diff options
context:
space:
mode:
authorDr. Stephen Henson <steve@openssl.org>2017-03-03 22:02:42 +0100
committerDr. Stephen Henson <steve@openssl.org>2017-03-03 23:02:39 +0100
commit8336ca13b1be5358621da075eac7a0ab5dc2bd10 (patch)
treed9055f50ca70a7b5c65c35a7dd5c66479ff790f1 /test/ssl-tests/20-cert-select.conf.in
parentSet specific error is we have no valid signature algorithms set (diff)
downloadopenssl-8336ca13b1be5358621da075eac7a0ab5dc2bd10.tar.xz
openssl-8336ca13b1be5358621da075eac7a0ab5dc2bd10.zip
Update and add test
Reviewed-by: Rich Salz <rsalz@openssl.org> (Merged from https://github.com/openssl/openssl/pull/2840)
Diffstat (limited to 'test/ssl-tests/20-cert-select.conf.in')
-rw-r--r--test/ssl-tests/20-cert-select.conf.in14
1 files changed, 13 insertions, 1 deletions
diff --git a/test/ssl-tests/20-cert-select.conf.in b/test/ssl-tests/20-cert-select.conf.in
index 1dd7860d88..3d50f0220d 100644
--- a/test/ssl-tests/20-cert-select.conf.in
+++ b/test/ssl-tests/20-cert-select.conf.in
@@ -334,6 +334,18 @@ my @tests_tls_1_3 = (
"ExpectedResult" => "Success"
},
},
+ {
+ name => "TLS 1.3 Client Auth No TLS 1.3 Signature Algorithms",
+ server => {
+ "ClientSignatureAlgorithms" => "ECDSA+SHA1:DSA+SHA256:RSA+SHA256",
+ "VerifyCAFile" => test_pem("root-cert.pem"),
+ "VerifyMode" => "Request"
+ },
+ client => {},
+ test => {
+ "ExpectedResult" => "ServerFail"
+ },
+ },
);
push @tests, @tests_tls_1_3 unless disabled("tls1_3");
@@ -370,7 +382,7 @@ my @tests_dsa_tls_1_3 = (
"CipherString" => "ALL",
},
client => {
- "SignatureAlgorithms" => "DSA+SHA1:DSA+SHA256",
+ "SignatureAlgorithms" => "DSA+SHA1:DSA+SHA256:ECDSA+SHA256",
"CipherString" => "ALL",
},
test => {