1 # TLS server: SNI used to select certificate
3 # The interesting output is the DN of server logged by the client
4 exim -DSERVER=server -bd -oX PORT_D
6 # certificate choice is unchanged by a received SNI
7 exim -odf normal@test.ex
12 # server uses SNI to choose certificate
13 exim -odf alternate@test.ex
16 # server picks a key file with bad content
17 exim -odf badkey@test.ex
19 sudo rm DIR/spool/db/retry
21 # server picks a non-existing filenam for key
22 exim -odf noneistkeyfile@test.ex
24 sudo rm DIR/spool/db/retry
27 # server gets an expansion-fail for the keyfile
28 exim -odf expansionfailkey@test.ex
30 sudo rm DIR/spool/db/retry
35 # server picks a cert file with bad content
36 exim -odf badcert@test.ex
38 sudo rm DIR/spool/db/retry
40 # server picks a non-existing filenam for cert
41 exim -odf nonexistcertfile@test.ex
43 sudo rm DIR/spool/db/retry
45 # server gets an expansion-fail for the certfile
46 exim -odf expansionfailedcert@test.ex
48 sudo rm DIR/spool/db/retry