Commit d8979bdd authored by Dr. Stephen Henson's avatar Dr. Stephen Henson
Browse files

Use PSS for simple test so TLS 1.3 handhake is successful.

parent a92e710b
Loading
Loading
Loading
Loading
+2 −2
Original line number Diff line number Diff line
@@ -40,12 +40,12 @@ client = 1-Server signature algorithms bug-client
[1-Server signature algorithms bug-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
ClientSignatureAlgorithms = ECDSA+SHA256
ClientSignatureAlgorithms = PSS+SHA512:RSA+SHA512
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[1-Server signature algorithms bug-client]
CipherString = DEFAULT
SignatureAlgorithms = RSA+SHA256
SignatureAlgorithms = PSS+SHA256:RSA+SHA256
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

+2 −2
Original line number Diff line number Diff line
@@ -22,8 +22,8 @@ our @tests = (
    {
        name => "Server signature algorithms bug",
        # Should have no effect as we aren't doing client auth
        server => { "ClientSignatureAlgorithms" => "ECDSA+SHA256" },
        client => { "SignatureAlgorithms" => "RSA+SHA256" },
        server => { "ClientSignatureAlgorithms" => "PSS+SHA512:RSA+SHA512" },
        client => { "SignatureAlgorithms" => "PSS+SHA256:RSA+SHA256" },
        test   => { "ExpectedResult" => "Success" },
    },