ck_abort_msg("[TEST_FAIL]:: %s[%d] : Test has failed ..", __FILE__, __LINE__);
}
- if (!ecore_con_ssl_server_cafile_add(client, "ecore_con/new_cert/capub.pem"))
+ if (!ecore_con_ssl_server_cert_add(client, "ecore_con/new_cert/client01.pem"))
{
- ck_abort_msg("[TEST_FAIL]:: %s[%d] : Test has failed ..", __FILE__, __LINE__);
+ ck_abort_msg("[TEST_FAIL]:: %s[%d] : Test has failed..", __FILE__, __LINE__);
}
- if (!ecore_con_ssl_server_crl_add(client, "ecore_con/new_cert/ca.crl"))
+ if (!ecore_con_ssl_server_privkey_add(client, "ecore_con/new_cert/client01.key"))
{
- ck_abort_msg("[TEST_FAIL]:: %s[%d] : Test has failed ..", __FILE__, __LINE__);
+ ck_abort_msg("[TEST_FAIL]:: %s[%d] : Test has failed..", __FILE__, __LINE__);
}
- if (!ecore_con_ssl_server_cert_add(client, "ecore_con/new_cert/client01.pem"))
+ if (!ecore_con_ssl_server_cafile_add(client, "ecore_con/new_cert/capub.pem"))
{
- ck_abort_msg("[TEST_FAIL]:: %s[%d] : Test has failed..", __FILE__, __LINE__);
+ ck_abort_msg("[TEST_FAIL]:: %s[%d] : Test has failed ..", __FILE__, __LINE__);
}
- if (!ecore_con_ssl_server_privkey_add(client, "ecore_con/new_cert/client01.key"))
+ if (!ecore_con_ssl_server_crl_add(client, "ecore_con/new_cert/ca.crl"))
{
- ck_abort_msg("[TEST_FAIL]:: %s[%d] : Test has failed..", __FILE__, __LINE__);
+ ck_abort_msg("[TEST_FAIL]:: %s[%d] : Test has failed ..", __FILE__, __LINE__);
}
//ecore_con_ssl_server_verify(client);