summaryrefslogtreecommitdiff
path: root/tests/x509-cert-callback-legacy.c
diff options
context:
space:
mode:
authorStefan Sørensen <stefan.sorensen@spectralink.com>2016-08-08 13:31:18 +0200
committerNikos Mavrogiannopoulos <nmav@redhat.com>2016-08-09 10:14:11 +0200
commit11833bfd026392d952504abb02ed8ca229d788c7 (patch)
tree9c2362eb2fbeaf01b22051d3a4253c0e600226e5 /tests/x509-cert-callback-legacy.c
parentc269b007eed114a215ace1c92c1ae368f4400810 (diff)
downloadgnutls-11833bfd026392d952504abb02ed8ca229d788c7.tar.gz
Change ca3 and related certificate to include an intermediate CA in the chain.
Also update a bunch of test-cases to support chains with an intermediate CA. Signed-off-by: Stefan Sørensen <stefan.sorensen@spectralink.com>
Diffstat (limited to 'tests/x509-cert-callback-legacy.c')
-rw-r--r--tests/x509-cert-callback-legacy.c12
1 files changed, 6 insertions, 6 deletions
diff --git a/tests/x509-cert-callback-legacy.c b/tests/x509-cert-callback-legacy.c
index 257dbaa998..caf515f711 100644
--- a/tests/x509-cert-callback-legacy.c
+++ b/tests/x509-cert-callback-legacy.c
@@ -63,7 +63,7 @@ cert_callback(gnutls_session_t session,
st->cert_type = GNUTLS_CRT_X509;
- ret = gnutls_x509_crt_list_import2(&crts, &crts_size, &cli_ca3_cert, GNUTLS_X509_FMT_PEM,
+ ret = gnutls_x509_crt_list_import2(&crts, &crts_size, &cli_ca3_cert_chain, GNUTLS_X509_FMT_PEM,
GNUTLS_X509_CRT_LIST_FAIL_IF_UNSORTED);
if (ret < 0) {
fail("error: %s\n", gnutls_strerror(ret));
@@ -105,7 +105,7 @@ server_cert_callback(gnutls_session_t session,
st->cert_type = GNUTLS_CRT_X509;
- ret = gnutls_x509_crt_list_import2(&crts, &crts_size, &server_ca3_cert, GNUTLS_X509_FMT_PEM,
+ ret = gnutls_x509_crt_list_import2(&crts, &crts_size, &server_ca3_cert_chain, GNUTLS_X509_FMT_PEM,
GNUTLS_X509_CRT_LIST_FAIL_IF_UNSORTED);
if (ret < 0) {
fail("error: %s\n", gnutls_strerror(ret));
@@ -217,7 +217,7 @@ void doit(void)
gnutls_x509_crt_init(&crt);
ret =
- gnutls_x509_crt_import(crt, &server_ca3_localhost_cert,
+ gnutls_x509_crt_import(crt, &server_ca3_localhost_cert_chain,
GNUTLS_X509_FMT_PEM);
if (ret < 0) {
fail("gnutls_x509_crt_import: %s\n",
@@ -255,7 +255,7 @@ void doit(void)
gnutls_x509_crt_init(&crt);
ret =
- gnutls_x509_crt_import(crt, &cli_ca3_cert,
+ gnutls_x509_crt_import(crt, &cli_ca3_cert_chain,
GNUTLS_X509_FMT_PEM);
if (ret < 0) {
fail("gnutls_x509_crt_import: %s\n",
@@ -295,7 +295,7 @@ void doit(void)
data[1].data = (void *)GNUTLS_KP_TLS_WWW_SERVER;
gnutls_certificate_get_peers(client, &cert_list_size);
- if (cert_list_size != 1) {
+ if (cert_list_size != 2) {
fprintf(stderr, "received a certificate list of %d!\n",
cert_list_size);
exit(1);
@@ -321,7 +321,7 @@ void doit(void)
data[1].data = (void *)GNUTLS_KP_TLS_WWW_CLIENT;
gnutls_certificate_get_peers(client, &cert_list_size);
- if (cert_list_size != 1) {
+ if (cert_list_size != 2) {
fprintf(stderr, "received a certificate list of %d!\n",
cert_list_size);
exit(1);