]> git.ipfire.org Git - thirdparty/openssl.git/commitdiff
Fix no-dsa build
authorBenjamin Kaduk <bkaduk@akamai.com>
Thu, 27 Apr 2017 15:32:30 +0000 (10:32 -0500)
committerBenjamin Kaduk <kaduk@mit.edu>
Sun, 25 Jun 2017 00:25:43 +0000 (19:25 -0500)
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/3326)

test/dsatest.c
test/ssl-tests/20-cert-select.conf.in

index e4ed8ebd632f20df712f28ceb44eae4c412a6a2d..579e57c382af1eae8b17d462c9b6d12c7eaacf8c 100644 (file)
@@ -21,6 +21,7 @@
 #include "testutil.h"
 #include "e_os.h"
 
+#ifndef OPENSSL_NO_DSA
 static int dsa_cb(int p, int n, BN_GENCB *arg);
 
 /*
@@ -134,6 +135,7 @@ static int dsa_cb(int p, int n, BN_GENCB *arg)
     }
     return 1;
 }
+#endif /* OPENSSL_NO_DSA */
 
 void register_tests(void)
 {
index 90bc5a23c8e3219803380ea31f6fd13a7a7457d7..96801e2cd1f0c071db049aa171045977ae42a63b 100644 (file)
@@ -430,18 +430,6 @@ my @tests_tls_1_3 = (
             "ExpectedResult" => "Success"
         },
     },
-    {
-        name => "TLS 1.3 Client Auth No TLS 1.3 Signature Algorithms",
-        server => {
-            "ClientSignatureAlgorithms" => "ECDSA+SHA1:DSA+SHA256:RSA+SHA256",
-            "VerifyCAFile" => test_pem("root-cert.pem"),
-            "VerifyMode" => "Request"
-        },
-        client => {},
-        test   => {
-            "ExpectedResult" => "ServerFail"
-        },
-    },
 );
 
 push @tests, @tests_tls_1_3 unless disabled("tls1_3");
@@ -468,6 +456,18 @@ my @tests_dsa_tls_1_2 = (
 );
 
 my @tests_dsa_tls_1_3 = (
+    {
+        name => "TLS 1.3 Client Auth No TLS 1.3 Signature Algorithms",
+        server => {
+            "ClientSignatureAlgorithms" => "ECDSA+SHA1:DSA+SHA256:RSA+SHA256",
+            "VerifyCAFile" => test_pem("root-cert.pem"),
+            "VerifyMode" => "Request"
+        },
+        client => {},
+        test   => {
+            "ExpectedResult" => "ServerFail"
+        },
+    },
     {
         name => "TLS 1.3 DSA Certificate Test",
         server => {