mirror of
https://github.com/wolfSSL/wolfssl.git
synced 2025-07-31 11:17:29 +02:00
Fix for "testsuite" with TLSv1.3 and --enable-sniffer
.
This commit is contained in:
@ -150,8 +150,11 @@ void echoclient_test(void* args)
|
|||||||
#endif
|
#endif
|
||||||
|
|
||||||
#if defined(CYASSL_SNIFFER)
|
#if defined(CYASSL_SNIFFER)
|
||||||
/* don't use EDH, can't sniff tmp keys */
|
/* Only set if not running testsuite */
|
||||||
SSL_CTX_set_cipher_list(ctx, "AES256-SHA");
|
if (XSTRNCMP(argv[0], "testsuite", XSTRLEN("testsuite")) != 0) {
|
||||||
|
/* don't use EDH, can't sniff tmp keys */
|
||||||
|
SSL_CTX_set_cipher_list(ctx, "AES256-SHA");
|
||||||
|
}
|
||||||
#endif
|
#endif
|
||||||
#ifndef NO_PSK
|
#ifndef NO_PSK
|
||||||
if (doPSK) {
|
if (doPSK) {
|
||||||
|
@ -227,8 +227,11 @@ THREAD_RETURN CYASSL_THREAD echoserver_test(void* args)
|
|||||||
#endif
|
#endif
|
||||||
|
|
||||||
#if defined(CYASSL_SNIFFER)
|
#if defined(CYASSL_SNIFFER)
|
||||||
/* don't use EDH, can't sniff tmp keys */
|
/* Only set if not running testsuite */
|
||||||
CyaSSL_CTX_set_cipher_list(ctx, "AES256-SHA");
|
if (XSTRNCMP(argv[0], "testsuite", XSTRLEN("testsuite")) != 0) {
|
||||||
|
/* don't use EDH, can't sniff tmp keys */
|
||||||
|
CyaSSL_CTX_set_cipher_list(ctx, "AES256-SHA");
|
||||||
|
}
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
if (doPSK) {
|
if (doPSK) {
|
||||||
|
@ -152,7 +152,7 @@ int testsuite_test(int argc, char** argv)
|
|||||||
return EXIT_FAILURE;
|
return EXIT_FAILURE;
|
||||||
}
|
}
|
||||||
|
|
||||||
strcpy(arg[0], "echoclient");
|
strcpy(arg[0], "testsuite");
|
||||||
strcpy(arg[1], "input");
|
strcpy(arg[1], "input");
|
||||||
strcpy(arg[2], outputName);
|
strcpy(arg[2], outputName);
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user