putting new tests back, since the ciphers have been fixed again
This commit is contained in:
Родитель
d654b8d0d8
Коммит
382e7dd3c4
|
@ -127,7 +127,7 @@ wait_for_selfserv()
|
|||
html_failed "<TR><TD> Wait for Server "
|
||||
echo "RETRY: tstclnt -p ${PORT} -h ${HOST} -q -d . < ${REQUEST_FILE}"
|
||||
tstclnt -p ${PORT} -h ${HOST} -q -d . < ${REQUEST_FILE}
|
||||
elif [ sparam = "-c ABCDEFabcdefghijklm" ] ; then # "$1" = "cov" ] ; then
|
||||
elif [ sparam = "-c ABCDEFabcdefghijklmnvy" ] ; then # "$1" = "cov" ] ; then
|
||||
html_passed "<TR><TD> Wait for Server"
|
||||
fi
|
||||
is_selfserv_alive
|
||||
|
@ -180,7 +180,7 @@ ssl_cov()
|
|||
html_head "SSL Cipher Coverage"
|
||||
|
||||
testname=""
|
||||
sparam="-c ABCDEFabcdefghijklm"
|
||||
sparam="-c ABCDEFabcdefghijklmnvy"
|
||||
start_selfserv # Launch the server
|
||||
|
||||
cat ${SSLCOV} | while read tls param testname
|
||||
|
|
|
@ -35,3 +35,10 @@
|
|||
# (NULL is not enabled by default)
|
||||
TLS i TLS RSA WITH NULL MD5
|
||||
noTLS i SSL3 RSA WITH NULL MD5
|
||||
# added on nelson's request
|
||||
TLS n TLS RSA WITH RC4 128 SHA
|
||||
noTLS n SSL3 RSA WITH RC4 128 SHA
|
||||
TLS v TLS RSA WITH AES 128 CBC SHA
|
||||
noTLS v SSL3 RSA WITH AES 128 CBC SHA
|
||||
TLS y TLS RSA WITH AES 256 CBC SHA
|
||||
noTLS y SSL3 RSA WITH AES 256 CBC SHA
|
||||
|
|
Загрузка…
Ссылка в новой задаче