# HG changeset patch # User Sergey Kandaurov # Date 1591011404 -10800 # Node ID f5a3b70c0f2f553956999f845d3b9e26abbb12d5 # Parent 1b4ceab9cb1cd676b62fe99ec9beb87dd7b24887 Tests: fixed ssl_verify_client.t with LibreSSL. LibreSSL started validating SNI hostnames since 3.2.0: https://github.com/openbsd/src/commit/19d7242. diff --git a/ssl_verify_client.t b/ssl_verify_client.t --- a/ssl_verify_client.t +++ b/ssl_verify_client.t @@ -95,7 +95,7 @@ http { server { listen 127.0.0.1:8081 ssl; - server_name optional_no_ca; + server_name optional.no.ca; ssl_certificate_key 1.example.com.key; ssl_certificate 1.example.com.crt; @@ -106,7 +106,7 @@ http { server { listen 127.0.0.1:8081; - server_name no_context; + server_name no.context; ssl_verify_client on; } @@ -142,10 +142,10 @@ sleep 1 if $^O eq 'MSWin32'; like(http_get('/t'), qr/x:x/, 'plain connection'); like(get('on'), qr/400 Bad Request/, 'no cert'); -like(get('no_context'), qr/400 Bad Request/, 'no server cert'); +like(get('no.context'), qr/400 Bad Request/, 'no server cert'); like(get('optional'), qr/NONE:x/, 'no optional cert'); like(get('optional', '1.example.com'), qr/400 Bad/, 'bad optional cert'); -like(get('optional_no_ca', '1.example.com'), qr/FAILED.*BEGIN/, +like(get('optional.no.ca', '1.example.com'), qr/FAILED.*BEGIN/, 'bad optional_no_ca cert'); like(get('localhost', '2.example.com'), qr/SUCCESS.*BEGIN/, 'good cert');