From 526f1f1acab4fe96f618ab785a5f2ecabf0035d5 Mon Sep 17 00:00:00 2001 From: Kurt Roeckx Date: Sun, 23 Feb 2020 11:06:32 +0100 Subject: [PATCH] Fix syntax of cipher string Reviewed-by: Tim Hudson GH: #10787 --- test/recipes/70-test_sslsigalgs.t | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/test/recipes/70-test_sslsigalgs.t b/test/recipes/70-test_sslsigalgs.t index f3b8ffb6b8..c9dbc9cc68 100644 --- a/test/recipes/70-test_sslsigalgs.t +++ b/test/recipes/70-test_sslsigalgs.t @@ -142,8 +142,8 @@ SKIP: { # security level 1 $proxy->clear(); $testtype = NO_SIG_ALGS_EXT; - $proxy->clientflags("-no_tls1_3 -cipher DEFAULT\@SECLEVEL=1"); - $proxy->ciphers("ECDHE-RSA-AES128-SHA\@SECLEVEL=1"); + $proxy->clientflags("-no_tls1_3 -cipher DEFAULT:\@SECLEVEL=1"); + $proxy->ciphers("ECDHE-RSA-AES128-SHA:\@SECLEVEL=1"); $proxy->start(); ok(TLSProxy::Message->success, "No TLSv1.2 sigalgs seclevel 1"); @@ -152,8 +152,8 @@ SKIP: { # server level 2. $proxy->clear(); $testtype = NO_SIG_ALGS_EXT; - $proxy->clientflags("-tls1_2 -cipher DEFAULT\@SECLEVEL=1"); - $proxy->ciphers("DEFAULT\@SECLEVEL=2"); + $proxy->clientflags("-tls1_2 -cipher DEFAULT:\@SECLEVEL=1"); + $proxy->ciphers("DEFAULT:\@SECLEVEL=2"); $proxy->start(); ok(TLSProxy::Message->fail, "No TLSv1.2 sigalgs server seclevel 2"); @@ -162,8 +162,8 @@ SKIP: { # server level 1. $proxy->clear(); $testtype = NO_SIG_ALGS_EXT; - $proxy->clientflags("-tls1_2 -cipher DEFAULT\@SECLEVEL=2"); - $proxy->ciphers("DEFAULT\@SECLEVEL=1"); + $proxy->clientflags("-tls1_2 -cipher DEFAULT:\@SECLEVEL=2"); + $proxy->ciphers("DEFAULT:\@SECLEVEL=1"); $proxy->start(); ok(TLSProxy::Message->fail, "No TLSv1.2 sigalgs client seclevel 2"); -- 2.25.1