+++ /dev/null
-# The client writes a message to Sys::Syslog native method.
-# The syslogd writes it into a file and through a pipe.
-# The syslogd passes it via TLS to localhost loghost without verification.
-# The server receives the message on its TLS version 1.0 socket.
-# Find the message in client, file, pipe, syslogd, server log.
-# Check that server log contains ssl version 1.
-
-use strict;
-use warnings;
-use Socket;
-
-our %args = (
- syslogd => {
- loghost => '@tls://localhost:$connectport',
- loggrep => {
- qr/Logging to FORWTLS \@tls:\/\/localhost:\d+/ => '>=4',
- get_testgrep() => 1,
- qr/syslogd: loghost .* connection error: connect failed:/ => 0,
- },
- },
- server => {
- listen => { domain => AF_UNSPEC, proto => "tls", addr => "localhost" },
- loggrep => {
- qr/listen sock: (127.0.0.1|::1) \d+/ => 1,
- get_testgrep() => 1,
- qr/ssl version: TLSv1$/ => 1,
- },
- sslversion => "TLSv1",
- },
-);
-
-1;
+++ /dev/null
-# The client writes a message to Sys::Syslog native method.
-# The syslogd writes it into a file and through a pipe.
-# The syslogd passes it via TLS to localhost loghost.
-# The server receives the message on its TLS version 1.0 socket.
-# Find the message in client, file, pipe, syslogd, server log.
-# Check that server log contains ssl version 1.
-
-use strict;
-use warnings;
-use Socket;
-
-our %args = (
- syslogd => {
- loghost => '@tls://localhost:$connectport',
- loggrep => {
- qr/Logging to FORWTLS \@tls:\/\/localhost:\d+/ => '>=4',
- get_testgrep() => 1,
- qr/syslogd: loghost .* connection error: connect failed:/ => 0,
- },
- cacrt => "ca.crt",
- },
- server => {
- listen => { domain => AF_UNSPEC, proto => "tls", addr => "localhost" },
- loggrep => {
- qr/listen sock: (127.0.0.1|::1) \d+/ => 1,
- get_testgrep() => 1,
- qr/ssl version: TLSv1$/ => 1,
- },
- sslversion => "TLSv1",
- },
-);
-
-1;