diff options
author | Ingela Anderton Andin <[email protected]> | 2014-04-23 09:35:55 +0200 |
---|---|---|
committer | Ingela Anderton Andin <[email protected]> | 2014-04-23 15:56:39 +0200 |
commit | 081ee510f1fb1d821a524bd6b8efd20e520add3c (patch) | |
tree | 35e619de7f70117e58c399949594ec1656255647 /lib/ssl/test/ssl_handshake_SUITE.erl | |
parent | b4fc84117b6bd1105ca8ccb91f699564ac400dff (diff) | |
download | otp-081ee510f1fb1d821a524bd6b8efd20e520add3c.tar.gz otp-081ee510f1fb1d821a524bd6b8efd20e520add3c.tar.bz2 otp-081ee510f1fb1d821a524bd6b8efd20e520add3c.zip |
ssl: Refactor so that there is only one source for the default hashsign values
Also fix DTLS call to supply its corresponding TLS version
Diffstat (limited to 'lib/ssl/test/ssl_handshake_SUITE.erl')
-rw-r--r-- | lib/ssl/test/ssl_handshake_SUITE.erl | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/lib/ssl/test/ssl_handshake_SUITE.erl b/lib/ssl/test/ssl_handshake_SUITE.erl index b4be768b58..5f36842f9e 100644 --- a/lib/ssl/test/ssl_handshake_SUITE.erl +++ b/lib/ssl/test/ssl_handshake_SUITE.erl @@ -1,7 +1,7 @@ %% %% %CopyrightBegin% %% -%% Copyright Ericsson AB 2008-2013. All Rights Reserved. +%% Copyright Ericsson AB 2008-2014. All Rights Reserved. %% %% The contents of this file are subject to the Erlang Public License, %% Version 1.1, (the "License"); you may not use this file except in @@ -100,8 +100,8 @@ encode_single_hello_sni_extension_correctly(_Config) -> select_proper_tls_1_2_rsa_default_hashsign(_Config) -> % RFC 5246 section 7.4.1.4.1 tells to use {sha1,rsa} as default signature_algorithm for RSA key exchanges - {sha, rsa} = ssl_handshake:select_cert_hashsign(undefined, ?rsaEncryption, {3,3}), + {sha, rsa} = ssl_handshake:select_hashsign_algs(undefined, ?rsaEncryption, {3,3}), % Older versions use MD5/SHA1 combination - {md5sha, rsa} = ssl_handshake:select_cert_hashsign(undefined, ?rsaEncryption, {3,2}), - {md5sha, rsa} = ssl_handshake:select_cert_hashsign(undefined, ?rsaEncryption, {3,0}). + {md5sha, rsa} = ssl_handshake:select_hashsign_algs(undefined, ?rsaEncryption, {3,2}), + {md5sha, rsa} = ssl_handshake:select_hashsign_algs(undefined, ?rsaEncryption, {3,0}). |