1 # TLS server: SNI used to select certificate
3 # The interesting output is the DN of server logged by the client
5 exim -DSERVER=server -bd -oX PORT_D
7 # certificate choice is unchanged by a received SNI
8 exim -odf normal@test.ex
13 # server uses SNI to choose certificate
14 exim -odf alternate@test.ex
17 # server picks a key file with bad content
18 exim -odf badkey@test.ex
20 sudo rm DIR/spool/db/retry
22 # server picks a non-existing filenam for key
23 exim -odf noneistkeyfile@test.ex
25 sudo rm DIR/spool/db/retry
28 # server gets an expansion-fail for the keyfile
29 exim -odf expansionfailkey@test.ex
31 sudo rm DIR/spool/db/retry
36 # server picks a cert file with bad content
37 exim -odf badcert@test.ex
39 sudo rm DIR/spool/db/retry
41 # server picks a non-existing filenam for cert
42 exim -odf nonexistcertfile@test.ex
44 sudo rm DIR/spool/db/retry
47 # server picks a non-existing filenam for cert
48 exim -odf expansionfailedcert@test.ex
50 sudo rm DIR/spool/db/retry