diff options
author | jsing <> | 2017-05-07 03:25:26 +0000 |
---|---|---|
committer | jsing <> | 2017-05-07 03:25:26 +0000 |
commit | 538e71e8b49f03c5fed6f68647e294af0ccbf7f9 (patch) | |
tree | 4829572a69e4f9517832aa52387fdf275870e471 /src/regress/lib/libtls | |
parent | 7672f6c5c31131a6d06252328c3bbfd151f7cce3 (diff) | |
download | openbsd-538e71e8b49f03c5fed6f68647e294af0ccbf7f9.tar.gz openbsd-538e71e8b49f03c5fed6f68647e294af0ccbf7f9.tar.bz2 openbsd-538e71e8b49f03c5fed6f68647e294af0ccbf7f9.zip |
Add a (currently failing) call to tls_handshake() on a client context that
has not yet been connected. We expect this to fail, but it should fail
gracefully.
Diffstat (limited to 'src/regress/lib/libtls')
-rw-r--r-- | src/regress/lib/libtls/tls/tlstest.c | 9 |
1 files changed, 8 insertions, 1 deletions
diff --git a/src/regress/lib/libtls/tls/tlstest.c b/src/regress/lib/libtls/tls/tlstest.c index 020b098a88..fcc40262c3 100644 --- a/src/regress/lib/libtls/tls/tlstest.c +++ b/src/regress/lib/libtls/tls/tlstest.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: tlstest.c,v 1.8 2017/05/07 03:22:15 jsing Exp $ */ | 1 | /* $OpenBSD: tlstest.c,v 1.9 2017/05/07 03:25:26 jsing Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2017 Joel Sing <jsing@openbsd.org> | 3 | * Copyright (c) 2017 Joel Sing <jsing@openbsd.org> |
4 | * | 4 | * |
@@ -383,6 +383,13 @@ do_tls_ordering_tests(void) | |||
383 | tls_config_free(client_cfg); | 383 | tls_config_free(client_cfg); |
384 | tls_config_free(server_cfg); | 384 | tls_config_free(server_cfg); |
385 | 385 | ||
386 | if (tls_handshake(client) != -1) { | ||
387 | printf("FAIL: TLS handshake succeeded on unconnnected " | ||
388 | "client context\n"); | ||
389 | failure = 1; | ||
390 | goto done; | ||
391 | } | ||
392 | |||
386 | if (tls_accept_cbs(server, &server_cctx, server_read, server_write, | 393 | if (tls_accept_cbs(server, &server_cctx, server_read, server_write, |
387 | NULL) == -1) | 394 | NULL) == -1) |
388 | errx(1, "failed to accept: %s", tls_error(server)); | 395 | errx(1, "failed to accept: %s", tls_error(server)); |