Fix for "testsuite" with TLSv1.3 and --enable-sniffer
.
This commit is contained in:
parent
ba8227bcf7
commit
8300754ecd
@ -150,8 +150,11 @@ void echoclient_test(void* args)
|
||||
#endif
|
||||
|
||||
#if defined(CYASSL_SNIFFER)
|
||||
/* don't use EDH, can't sniff tmp keys */
|
||||
SSL_CTX_set_cipher_list(ctx, "AES256-SHA");
|
||||
/* Only set if not running testsuite */
|
||||
if (XSTRNCMP(argv[0], "testsuite", XSTRLEN("testsuite")) != 0) {
|
||||
/* don't use EDH, can't sniff tmp keys */
|
||||
SSL_CTX_set_cipher_list(ctx, "AES256-SHA");
|
||||
}
|
||||
#endif
|
||||
#ifndef NO_PSK
|
||||
if (doPSK) {
|
||||
|
@ -227,8 +227,11 @@ THREAD_RETURN CYASSL_THREAD echoserver_test(void* args)
|
||||
#endif
|
||||
|
||||
#if defined(CYASSL_SNIFFER)
|
||||
/* don't use EDH, can't sniff tmp keys */
|
||||
CyaSSL_CTX_set_cipher_list(ctx, "AES256-SHA");
|
||||
/* Only set if not running testsuite */
|
||||
if (XSTRNCMP(argv[0], "testsuite", XSTRLEN("testsuite")) != 0) {
|
||||
/* don't use EDH, can't sniff tmp keys */
|
||||
CyaSSL_CTX_set_cipher_list(ctx, "AES256-SHA");
|
||||
}
|
||||
#endif
|
||||
|
||||
if (doPSK) {
|
||||
|
@ -152,7 +152,7 @@ int testsuite_test(int argc, char** argv)
|
||||
return EXIT_FAILURE;
|
||||
}
|
||||
|
||||
strcpy(arg[0], "echoclient");
|
||||
strcpy(arg[0], "testsuite");
|
||||
strcpy(arg[1], "input");
|
||||
strcpy(arg[2], outputName);
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user