Fix syntax of cipher string
authorKurt Roeckx <kurt@roeckx.be>
Sun, 23 Feb 2020 10:06:32 +0000 (11:06 +0100)
committerKurt Roeckx <kurt@roeckx.be>
Sat, 27 Jun 2020 06:41:18 +0000 (08:41 +0200)
Reviewed-by: Tim Hudson <tjh@openssl.org>
GH: #10787

test/recipes/70-test_sslsigalgs.t

index f3b8ffb6b8883b5a9a5fe46cd473f99330f2319e..c9dbc9cc68a04aebaa26cbdb0f8f520831d6905d 100644 (file)
@@ -142,8 +142,8 @@ SKIP: {
     #         security level 1
     $proxy->clear();
     $testtype = NO_SIG_ALGS_EXT;
-    $proxy->clientflags("-no_tls1_3 -cipher DEFAULT\@SECLEVEL=1");
-    $proxy->ciphers("ECDHE-RSA-AES128-SHA\@SECLEVEL=1");
+    $proxy->clientflags("-no_tls1_3 -cipher DEFAULT:\@SECLEVEL=1");
+    $proxy->ciphers("ECDHE-RSA-AES128-SHA:\@SECLEVEL=1");
     $proxy->start();
     ok(TLSProxy::Message->success, "No TLSv1.2 sigalgs seclevel 1");
 
@@ -152,8 +152,8 @@ SKIP: {
     #         server level 2.
     $proxy->clear();
     $testtype = NO_SIG_ALGS_EXT;
-    $proxy->clientflags("-tls1_2 -cipher DEFAULT\@SECLEVEL=1");
-    $proxy->ciphers("DEFAULT\@SECLEVEL=2");
+    $proxy->clientflags("-tls1_2 -cipher DEFAULT:\@SECLEVEL=1");
+    $proxy->ciphers("DEFAULT:\@SECLEVEL=2");
     $proxy->start();
     ok(TLSProxy::Message->fail, "No TLSv1.2 sigalgs server seclevel 2");
 
@@ -162,8 +162,8 @@ SKIP: {
     #         server level 1.
     $proxy->clear();
     $testtype = NO_SIG_ALGS_EXT;
-    $proxy->clientflags("-tls1_2 -cipher DEFAULT\@SECLEVEL=2");
-    $proxy->ciphers("DEFAULT\@SECLEVEL=1");
+    $proxy->clientflags("-tls1_2 -cipher DEFAULT:\@SECLEVEL=2");
+    $proxy->ciphers("DEFAULT:\@SECLEVEL=1");
     $proxy->start();
     ok(TLSProxy::Message->fail, "No TLSv1.2 sigalgs client seclevel 2");