@@ -316,11 +316,12 @@ int server_async_test(int argc, char** argv)
316316 }
317317
318318 if (mutual ) {
319- ret = wolfSSL_CTX_load_verify_buffer (ctx , ca_ed25519_cert ,
320- sizeof_ca_ed25519_cert , WOLFSSL_FILETYPE_ASN1 );
319+ /* client-ed25519 is self-signed, so load it as its own CA */
320+ ret = wolfSSL_CTX_load_verify_buffer (ctx , client_ed25519_cert ,
321+ sizeof_client_ed25519_cert , WOLFSSL_FILETYPE_ASN1 );
321322 if (ret != WOLFSSL_SUCCESS ) {
322323 fprintf (stderr ,
323- "ERROR: failed to load ED25519 CA cert.\n" );
324+ "ERROR: failed to load ED25519 client CA cert.\n" );
324325 goto exit ;
325326 }
326327 }
@@ -345,10 +346,12 @@ int server_async_test(int argc, char** argv)
345346 }
346347
347348 if (mutual ) {
348- ret = wolfSSL_CTX_load_verify_buffer (ctx , ca_ecc_cert_der_256 ,
349- sizeof_ca_ecc_cert_der_256 , WOLFSSL_FILETYPE_ASN1 );
349+ /* client-ecc-cert is self-signed, so load it as its own CA */
350+ ret = wolfSSL_CTX_load_verify_buffer (ctx , cliecc_cert_der_256 ,
351+ sizeof_cliecc_cert_der_256 , WOLFSSL_FILETYPE_ASN1 );
350352 if (ret != WOLFSSL_SUCCESS ) {
351- fprintf (stderr , "ERROR: failed to load ECC CA cert.\n" );
353+ fprintf (stderr ,
354+ "ERROR: failed to load ECC client CA cert.\n" );
352355 goto exit ;
353356 }
354357 }
0 commit comments