aboutsummaryrefslogtreecommitdiffstats
path: root/lib/ssl
diff options
context:
space:
mode:
authorIngela Anderton Andin <[email protected]>2014-09-10 10:59:23 +0200
committerIngela Anderton Andin <[email protected]>2014-09-10 10:59:23 +0200
commit597e0525d223769991bde1a5b254e2170b2b1dc9 (patch)
tree7bcc49ca78407d2c10efda47629a080e8dc57c78 /lib/ssl
parent44ebd865e753f4a42905f97595e6736428bfac9d (diff)
downloadotp-597e0525d223769991bde1a5b254e2170b2b1dc9.tar.gz
otp-597e0525d223769991bde1a5b254e2170b2b1dc9.tar.bz2
otp-597e0525d223769991bde1a5b254e2170b2b1dc9.zip
ssl: One more workaround as tcp has no delivery gurantee on application level
Diffstat (limited to 'lib/ssl')
-rw-r--r--lib/ssl/test/ssl_certificate_verify_SUITE.erl14
1 files changed, 10 insertions, 4 deletions
diff --git a/lib/ssl/test/ssl_certificate_verify_SUITE.erl b/lib/ssl/test/ssl_certificate_verify_SUITE.erl
index 3779b4d9f1..b7864ba6e7 100644
--- a/lib/ssl/test/ssl_certificate_verify_SUITE.erl
+++ b/lib/ssl/test/ssl_certificate_verify_SUITE.erl
@@ -595,10 +595,16 @@ cert_expired(Config) when is_list(Config) ->
Client = ssl_test_lib:start_client_error([{node, ClientNode}, {port, Port},
{host, Hostname},
{from, self()},
- {options, [{verify, verify_peer} | ClientOpts]}]),
-
- ssl_test_lib:check_result(Server, {error, {tls_alert, "certificate expired"}},
- Client, {error, {tls_alert, "certificate expired"}}).
+ {options, [{verify, verify_peer} | ClientOpts]}]),
+ receive
+ {Client, {error, {tls_alert, "certificate expired"}}} ->
+ receive
+ {Server, {error, {tls_alert, "certificate expired"}}} ->
+ ok;
+ {Server, {error, closed}} ->
+ ok
+ end
+ end.
two_digits_str(N) when N < 10 ->
lists:flatten(io_lib:format("0~p", [N]));