aboutsummaryrefslogtreecommitdiff
path: root/src/ssl/tests.rs
diff options
context:
space:
mode:
authorSteven Fackler <[email protected]>2014-09-05 21:52:44 -0700
committerSteven Fackler <[email protected]>2014-09-05 21:52:44 -0700
commite7e6ef5da2f96f231fabe746eafdf681224f5bc9 (patch)
tree660b9ff49966a024cb07690df7b8771b1878d26a /src/ssl/tests.rs
parentMerge pull request #39 from andrew-d/andrew-support-tls-sni (diff)
downloadrust-openssl-e7e6ef5da2f96f231fabe746eafdf681224f5bc9.tar.xz
rust-openssl-e7e6ef5da2f96f231fabe746eafdf681224f5bc9.zip
Remove failing constructor wrappers
Diffstat (limited to 'src/ssl/tests.rs')
-rw-r--r--src/ssl/tests.rs44
1 files changed, 22 insertions, 22 deletions
diff --git a/src/ssl/tests.rs b/src/ssl/tests.rs
index 3b10e878..99241719 100644
--- a/src/ssl/tests.rs
+++ b/src/ssl/tests.rs
@@ -6,21 +6,21 @@ use ssl::{Sslv23, SslContext, SslStream, SslVerifyPeer, X509StoreContext};
#[test]
fn test_new_ctx() {
- SslContext::new(Sslv23);
+ SslContext::new(Sslv23).unwrap();
}
#[test]
fn test_new_sslstream() {
let stream = TcpStream::connect("127.0.0.1", 15418).unwrap();
- SslStream::new(&SslContext::new(Sslv23), stream);
+ SslStream::new(&SslContext::new(Sslv23).unwrap(), stream).unwrap();
}
#[test]
fn test_verify_untrusted() {
let stream = TcpStream::connect("127.0.0.1", 15418).unwrap();
- let mut ctx = SslContext::new(Sslv23);
+ let mut ctx = SslContext::new(Sslv23).unwrap();
ctx.set_verify(SslVerifyPeer, None);
- match SslStream::try_new(&ctx, stream) {
+ match SslStream::new(&ctx, stream) {
Ok(_) => fail!("expected failure"),
Err(err) => println!("error {}", err)
}
@@ -29,13 +29,13 @@ fn test_verify_untrusted() {
#[test]
fn test_verify_trusted() {
let stream = TcpStream::connect("127.0.0.1", 15418).unwrap();
- let mut ctx = SslContext::new(Sslv23);
+ let mut ctx = SslContext::new(Sslv23).unwrap();
ctx.set_verify(SslVerifyPeer, None);
match ctx.set_CA_file("test/cert.pem") {
None => {}
Some(err) => fail!("Unexpected error {}", err)
}
- match SslStream::try_new(&ctx, stream) {
+ match SslStream::new(&ctx, stream) {
Ok(_) => (),
Err(err) => fail!("Expected success, got {}", err)
}
@@ -47,9 +47,9 @@ fn test_verify_untrusted_callback_override_ok() {
true
}
let stream = TcpStream::connect("127.0.0.1", 15418).unwrap();
- let mut ctx = SslContext::new(Sslv23);
+ let mut ctx = SslContext::new(Sslv23).unwrap();
ctx.set_verify(SslVerifyPeer, Some(callback));
- match SslStream::try_new(&ctx, stream) {
+ match SslStream::new(&ctx, stream) {
Ok(_) => (),
Err(err) => fail!("Expected success, got {}", err)
}
@@ -61,9 +61,9 @@ fn test_verify_untrusted_callback_override_bad() {
false
}
let stream = TcpStream::connect("127.0.0.1", 15418).unwrap();
- let mut ctx = SslContext::new(Sslv23);
+ let mut ctx = SslContext::new(Sslv23).unwrap();
ctx.set_verify(SslVerifyPeer, Some(callback));
- assert!(SslStream::try_new(&ctx, stream).is_err());
+ assert!(SslStream::new(&ctx, stream).is_err());
}
#[test]
@@ -72,13 +72,13 @@ fn test_verify_trusted_callback_override_ok() {
true
}
let stream = TcpStream::connect("127.0.0.1", 15418).unwrap();
- let mut ctx = SslContext::new(Sslv23);
+ let mut ctx = SslContext::new(Sslv23).unwrap();
ctx.set_verify(SslVerifyPeer, Some(callback));
match ctx.set_CA_file("test/cert.pem") {
None => {}
Some(err) => fail!("Unexpected error {}", err)
}
- match SslStream::try_new(&ctx, stream) {
+ match SslStream::new(&ctx, stream) {
Ok(_) => (),
Err(err) => fail!("Expected success, got {}", err)
}
@@ -90,13 +90,13 @@ fn test_verify_trusted_callback_override_bad() {
false
}
let stream = TcpStream::connect("127.0.0.1", 15418).unwrap();
- let mut ctx = SslContext::new(Sslv23);
+ let mut ctx = SslContext::new(Sslv23).unwrap();
ctx.set_verify(SslVerifyPeer, Some(callback));
match ctx.set_CA_file("test/cert.pem") {
None => {}
Some(err) => fail!("Unexpected error {}", err)
}
- assert!(SslStream::try_new(&ctx, stream).is_err());
+ assert!(SslStream::new(&ctx, stream).is_err());
}
#[test]
@@ -106,9 +106,9 @@ fn test_verify_callback_load_certs() {
true
}
let stream = TcpStream::connect("127.0.0.1", 15418).unwrap();
- let mut ctx = SslContext::new(Sslv23);
+ let mut ctx = SslContext::new(Sslv23).unwrap();
ctx.set_verify(SslVerifyPeer, Some(callback));
- assert!(SslStream::try_new(&ctx, stream).is_ok());
+ assert!(SslStream::new(&ctx, stream).is_ok());
}
#[test]
@@ -118,13 +118,13 @@ fn test_verify_trusted_get_error_ok() {
true
}
let stream = TcpStream::connect("127.0.0.1", 15418).unwrap();
- let mut ctx = SslContext::new(Sslv23);
+ let mut ctx = SslContext::new(Sslv23).unwrap();
ctx.set_verify(SslVerifyPeer, Some(callback));
match ctx.set_CA_file("test/cert.pem") {
None => {}
Some(err) => fail!("Unexpected error {}", err)
}
- assert!(SslStream::try_new(&ctx, stream).is_ok());
+ assert!(SslStream::new(&ctx, stream).is_ok());
}
#[test]
@@ -134,15 +134,15 @@ fn test_verify_trusted_get_error_err() {
false
}
let stream = TcpStream::connect("127.0.0.1", 15418).unwrap();
- let mut ctx = SslContext::new(Sslv23);
+ let mut ctx = SslContext::new(Sslv23).unwrap();
ctx.set_verify(SslVerifyPeer, Some(callback));
- assert!(SslStream::try_new(&ctx, stream).is_err());
+ assert!(SslStream::new(&ctx, stream).is_err());
}
#[test]
fn test_write() {
let stream = TcpStream::connect("127.0.0.1", 15418).unwrap();
- let mut stream = SslStream::new(&SslContext::new(Sslv23), stream);
+ let mut stream = SslStream::new(&SslContext::new(Sslv23).unwrap(), stream).unwrap();
stream.write("hello".as_bytes()).unwrap();
stream.flush().unwrap();
stream.write(" there".as_bytes()).unwrap();
@@ -152,7 +152,7 @@ fn test_write() {
#[test]
fn test_read() {
let stream = TcpStream::connect("127.0.0.1", 15418).unwrap();
- let mut stream = SslStream::new(&SslContext::new(Sslv23), stream);
+ let mut stream = SslStream::new(&SslContext::new(Sslv23).unwrap(), stream).unwrap();
stream.write("GET /\r\n\r\n".as_bytes()).unwrap();
stream.flush().unwrap();
let buf = stream.read_to_end().ok().expect("read error");