diff options
author | Matt Caswell <matt@openssl.org> | 2016-06-22 19:41:03 +0100 |
---|---|---|
committer | Matt Caswell <matt@openssl.org> | 2016-07-18 14:30:14 +0100 |
commit | 10e6d235494f69365914f959f83b448b0b21dca2 (patch) | |
tree | 059be3bc428a215275ab224d73c60fa7df3ae475 /test/ssl_test_ctx.c | |
parent | 78cbe94f89417150d5d334f6c02ed697f62029fe (diff) |
Fix SSLv3 ClientAuth alert checking
In TLS during ClientAuth if the CA is not recognised you should get an
UnknownCA alert. In SSLv3 this does not exist and you should get a
BadCertificate alert.
Reviewed-by: Emilia Käsper <emilia@openssl.org>
Diffstat (limited to 'test/ssl_test_ctx.c')
-rw-r--r-- | test/ssl_test_ctx.c | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/test/ssl_test_ctx.c b/test/ssl_test_ctx.c index b06ab4828c..4d038d2c23 100644 --- a/test/ssl_test_ctx.c +++ b/test/ssl_test_ctx.c @@ -83,6 +83,7 @@ static const test_enum ssl_alerts[] = { {"UnknownCA", SSL_AD_UNKNOWN_CA}, {"HandshakeFailure", SSL_AD_HANDSHAKE_FAILURE}, {"UnrecognizedName", SSL_AD_UNRECOGNIZED_NAME}, + {"BadCertificate", SSL_AD_BAD_CERTIFICATE} }; __owur static int parse_alert(int *alert, const char *value) |