aboutsummaryrefslogtreecommitdiff
path: root/src/supplemental
diff options
context:
space:
mode:
authorGarrett D'Amore <garrett@damore.org>2024-07-22 17:12:38 -0700
committerGarrett D'Amore <garrett@damore.org>2024-07-22 17:12:38 -0700
commitd89d679d69df7d04f5c9816487c16bc6bcf8fdb3 (patch)
tree64e4999b9fccbee958301a7b825c9a261126ab90 /src/supplemental
parent8eae4bf15956958f6f3d7a1891ba9b65f362a3d4 (diff)
downloadnng-d89d679d69df7d04f5c9816487c16bc6bcf8fdb3.tar.gz
nng-d89d679d69df7d04f5c9816487c16bc6bcf8fdb3.tar.bz2
nng-d89d679d69df7d04f5c9816487c16bc6bcf8fdb3.zip
TLS: make some tests conditional.
This is in preparation for the wolfSSL integration.
Diffstat (limited to 'src/supplemental')
-rw-r--r--src/supplemental/tls/tls_test.c7
1 files changed, 5 insertions, 2 deletions
diff --git a/src/supplemental/tls/tls_test.c b/src/supplemental/tls/tls_test.c
index d4ad2cc4..0aa18708 100644
--- a/src/supplemental/tls/tls_test.c
+++ b/src/supplemental/tls/tls_test.c
@@ -8,6 +8,7 @@
//
#include "nng/nng.h"
+#include "nng/supplemental/tls/tls.h"
#include <nuts.h>
void
@@ -221,7 +222,6 @@ test_tls_psk(void)
NUTS_PASS(nng_stream_dialer_alloc(&d, addr));
NUTS_PASS(nng_tls_config_alloc(&c2, NNG_TLS_MODE_CLIENT));
NUTS_PASS(nng_tls_config_psk(c2, "identity", key, sizeof(key)));
- NUTS_PASS(nng_tls_config_server_name(c2, "localhost"));
NUTS_PASS(nng_stream_dialer_set_ptr(d, NNG_OPT_TLS_CONFIG, c2));
@@ -312,7 +312,6 @@ test_tls_psk_server_identities(void)
NUTS_PASS(nng_stream_dialer_alloc(&d, addr));
NUTS_PASS(nng_tls_config_alloc(&c2, NNG_TLS_MODE_CLIENT));
NUTS_PASS(nng_tls_config_psk(c2, identity, key, sizeof(key)));
- NUTS_PASS(nng_tls_config_server_name(c2, "localhost"));
NUTS_PASS(nng_stream_dialer_set_ptr(d, NNG_OPT_TLS_CONFIG, c2));
@@ -478,11 +477,15 @@ TEST_LIST = {
{ "tls config version", test_tls_config_version },
{ "tls conn refused", test_tls_conn_refused },
{ "tls large message", test_tls_large_message },
+#ifndef NNG_TLS_ENGINE_WOLFSSL // wolfSSL doesn't validate certas until use
{ "tls garbled cert", test_tls_garbled_cert },
+#endif
+#ifdef NNG_SUPP_TLS_PSK
{ "tls psk", test_tls_psk },
{ "tls psk server identities", test_tls_psk_server_identities },
{ "tls psk bad identity", test_tls_psk_bad_identity },
{ "tls psk key too big", test_tls_psk_key_too_big },
{ "tls psk key config busy", test_tls_psk_config_busy },
+#endif
{ NULL, NULL },
};