aboutsummaryrefslogtreecommitdiffstats
path: root/lib/ssl
diff options
context:
space:
mode:
authorIngela Anderton Andin <[email protected]>2010-05-28 08:01:01 +0000
committerErlang/OTP <[email protected]>2010-05-28 11:02:06 +0200
commit7f676f3e983d3d9c5fd645a6a6707d7a35dad524 (patch)
treea14593fcfe46a3069506a9ac324550604a7bf1c3 /lib/ssl
parent780d667b792aad9e57a8c62ea2a555a0cd57f7b7 (diff)
downloadotp-7f676f3e983d3d9c5fd645a6a6707d7a35dad524.tar.gz
otp-7f676f3e983d3d9c5fd645a6a6707d7a35dad524.tar.bz2
otp-7f676f3e983d3d9c5fd645a6a6707d7a35dad524.zip
Cleaned code
Diffstat (limited to 'lib/ssl')
-rw-r--r--lib/ssl/src/ssl_connection.erl1
-rw-r--r--lib/ssl/test/ssl_basic_SUITE.erl20
2 files changed, 4 insertions, 17 deletions
diff --git a/lib/ssl/src/ssl_connection.erl b/lib/ssl/src/ssl_connection.erl
index 2285f3b461..644c2772b2 100644
--- a/lib/ssl/src/ssl_connection.erl
+++ b/lib/ssl/src/ssl_connection.erl
@@ -1286,7 +1286,6 @@ server_hello(ServerHello, #state{transport_cb = Transport,
tls_handshake_hashes = Hashes0} = State) ->
CipherSuite = ServerHello#server_hello.cipher_suite,
{KeyAlgorithm, _, _} = ssl_cipher:suite_definition(CipherSuite),
- %% Version = ServerHello#server_hello.server_version, TODO ska kontrolleras
{BinMsg, ConnectionStates1, Hashes1} =
encode_handshake(ServerHello, Version, ConnectionStates0, Hashes0),
Transport:send(Socket, BinMsg),
diff --git a/lib/ssl/test/ssl_basic_SUITE.erl b/lib/ssl/test/ssl_basic_SUITE.erl
index dc110e2940..522eda54d6 100644
--- a/lib/ssl/test/ssl_basic_SUITE.erl
+++ b/lib/ssl/test/ssl_basic_SUITE.erl
@@ -2129,9 +2129,7 @@ server_require_peer_cert_fail(Config) when is_list(Config) ->
{options, [{active, false} | BadClientOpts]}]),
ssl_test_lib:check_result(Server, {error, esslaccept},
- Client, {error, esslconnect}),
- ssl_test_lib:close(Server),
- ssl_test_lib:close(Client).
+ Client, {error, esslconnect}).
%%--------------------------------------------------------------------
@@ -2648,11 +2646,8 @@ invalid_signature_server(Config) when is_list(Config) ->
{options, [{verify, verify_peer} | ClientOpts]}]),
ssl_test_lib:check_result(Server, {error, "bad certificate"},
- Client, {error,"bad certificate"}),
+ Client, {error,"bad certificate"}).
- ssl_test_lib:close(Server),
- ssl_test_lib:close(Client).
-
%%--------------------------------------------------------------------
invalid_signature_client(doc) ->
@@ -2691,10 +2686,7 @@ invalid_signature_client(Config) when is_list(Config) ->
{options, NewClientOpts}]),
ssl_test_lib:check_result(Server, {error, "bad certificate"},
- Client, {error,"bad certificate"}),
-
- ssl_test_lib:close(Server),
- ssl_test_lib:close(Client).
+ Client, {error,"bad certificate"}).
%%--------------------------------------------------------------------
cert_expired(doc) ->
@@ -2754,11 +2746,7 @@ cert_expired(Config) when is_list(Config) ->
{options, [{verify, verify_peer} | ClientOpts]}]),
ssl_test_lib:check_result(Server, {error, "certificate expired"},
- Client, {error, "certificate expired"}),
-
- ssl_test_lib:close(Server),
- ssl_test_lib:close(Client).
-
+ Client, {error, "certificate expired"}).
two_digits_str(N) when N < 10 ->
lists:flatten(io_lib:format("0~p", [N]));