@@ -3192,7 +3192,7 @@ int test_tls13_cert_req_sigalgs(void)
31923192 * uppercase names like "SECP384R1" do not match the lowercase "secp384r1"
31933193 * entry; they fall through to the wolfCrypt ECC look-up which uses
31943194 * XSTRCASECMP. */
3195- int test_set_curves_list_ecc_fallback (void )
3195+ int test_tls13_set_curves_list_ecc_fallback (void )
31963196{
31973197 EXPECT_DECLS ;
31983198#if defined(WOLFSSL_TLS13 ) && defined(HAVE_ECC ) && \
@@ -3213,15 +3213,20 @@ int test_set_curves_list_ecc_fallback(void)
32133213 ExpectIntEQ (wolfSSL_CTX_set1_curves_list (ctx , "SECP384R1" ),
32143214 WOLFSSL_SUCCESS );
32153215
3216- /* Verify the correct curve was stored, not ecc_sets[0] */
3217- ExpectIntEQ (ctx -> numGroups , 1 );
3218- ExpectIntEQ (ctx -> group [0 ], WOLFSSL_ECC_SECP384R1 );
3216+ /* Verify the correct named-group ID was stored (not ecc_sets[0]).
3217+ * Currently no public getter exists for the configured group list. */
3218+ if (!EXPECT_FAIL ()) {
3219+ ExpectIntEQ (ctx -> numGroups , 1 );
3220+ ExpectIntEQ (ctx -> group [0 ], WOLFSSL_ECC_SECP384R1 );
3221+ }
32193222
32203223 /* SSL-level: same check via wolfSSL_set1_curves_list */
32213224 ExpectNotNull (ssl = wolfSSL_new (ctx ));
32223225 ExpectIntEQ (wolfSSL_set1_curves_list (ssl , "SECP384R1" ), WOLFSSL_SUCCESS );
3223- ExpectIntEQ (ssl -> numGroups , 1 );
3224- ExpectIntEQ (ssl -> group [0 ], WOLFSSL_ECC_SECP384R1 );
3226+ if (!EXPECT_FAIL ()) {
3227+ ExpectIntEQ (ssl -> numGroups , 1 );
3228+ ExpectIntEQ (ssl -> group [0 ], WOLFSSL_ECC_SECP384R1 );
3229+ }
32253230
32263231 wolfSSL_free (ssl );
32273232 wolfSSL_CTX_free (ctx );
0 commit comments