diff options
| author | Garrett D'Amore <garrett@damore.org> | 2024-07-22 17:12:38 -0700 |
|---|---|---|
| committer | Garrett D'Amore <garrett@damore.org> | 2024-07-22 17:12:38 -0700 |
| commit | d89d679d69df7d04f5c9816487c16bc6bcf8fdb3 (patch) | |
| tree | 64e4999b9fccbee958301a7b825c9a261126ab90 /src/supplemental/tls | |
| parent | 8eae4bf15956958f6f3d7a1891ba9b65f362a3d4 (diff) | |
| download | nng-d89d679d69df7d04f5c9816487c16bc6bcf8fdb3.tar.gz nng-d89d679d69df7d04f5c9816487c16bc6bcf8fdb3.tar.bz2 nng-d89d679d69df7d04f5c9816487c16bc6bcf8fdb3.zip | |
TLS: make some tests conditional.
This is in preparation for the wolfSSL integration.
Diffstat (limited to 'src/supplemental/tls')
| -rw-r--r-- | src/supplemental/tls/tls_test.c | 7 |
1 files changed, 5 insertions, 2 deletions
diff --git a/src/supplemental/tls/tls_test.c b/src/supplemental/tls/tls_test.c index d4ad2cc4..0aa18708 100644 --- a/src/supplemental/tls/tls_test.c +++ b/src/supplemental/tls/tls_test.c @@ -8,6 +8,7 @@ // #include "nng/nng.h" +#include "nng/supplemental/tls/tls.h" #include <nuts.h> void @@ -221,7 +222,6 @@ test_tls_psk(void) NUTS_PASS(nng_stream_dialer_alloc(&d, addr)); NUTS_PASS(nng_tls_config_alloc(&c2, NNG_TLS_MODE_CLIENT)); NUTS_PASS(nng_tls_config_psk(c2, "identity", key, sizeof(key))); - NUTS_PASS(nng_tls_config_server_name(c2, "localhost")); NUTS_PASS(nng_stream_dialer_set_ptr(d, NNG_OPT_TLS_CONFIG, c2)); @@ -312,7 +312,6 @@ test_tls_psk_server_identities(void) NUTS_PASS(nng_stream_dialer_alloc(&d, addr)); NUTS_PASS(nng_tls_config_alloc(&c2, NNG_TLS_MODE_CLIENT)); NUTS_PASS(nng_tls_config_psk(c2, identity, key, sizeof(key))); - NUTS_PASS(nng_tls_config_server_name(c2, "localhost")); NUTS_PASS(nng_stream_dialer_set_ptr(d, NNG_OPT_TLS_CONFIG, c2)); @@ -478,11 +477,15 @@ TEST_LIST = { { "tls config version", test_tls_config_version }, { "tls conn refused", test_tls_conn_refused }, { "tls large message", test_tls_large_message }, +#ifndef NNG_TLS_ENGINE_WOLFSSL // wolfSSL doesn't validate certas until use { "tls garbled cert", test_tls_garbled_cert }, +#endif +#ifdef NNG_SUPP_TLS_PSK { "tls psk", test_tls_psk }, { "tls psk server identities", test_tls_psk_server_identities }, { "tls psk bad identity", test_tls_psk_bad_identity }, { "tls psk key too big", test_tls_psk_key_too_big }, { "tls psk key config busy", test_tls_psk_config_busy }, +#endif { NULL, NULL }, }; |
