Rm obsolete hack in ssl-opt.sh
diff --git a/tests/compat.sh b/tests/compat.sh
index 5eff44f..04641c0 100755
--- a/tests/compat.sh
+++ b/tests/compat.sh
@@ -690,7 +690,7 @@
;;
"PSK")
- # *PKS-NULL-SHA suites supported by GnuTLS 3.3.5 but not 3.2.15
+ # *PSK-NULL-SHA suites supported by GnuTLS 3.3.5 but not 3.2.15
P_CIPHERS="$P_CIPHERS \
TLS-PSK-WITH-NULL-SHA \
TLS-DHE-PSK-WITH-NULL-SHA \
diff --git a/tests/ssl-opt.sh b/tests/ssl-opt.sh
index fa8e6f1..d3b7b3f 100755
--- a/tests/ssl-opt.sh
+++ b/tests/ssl-opt.sh
@@ -2256,11 +2256,10 @@
"$P_CLI" \
0
-# add psk to leave an option for client to send SERVERQUIT
run_test "extKeyUsage srv: codeSign -> fail" \
- "$P_SRV psk=abc123 key_file=data_files/server5.key \
+ "$P_SRV key_file=data_files/server5.key \
crt_file=data_files/server5.eku-cli.crt" \
- "$P_CLI psk=badbad" \
+ "$P_CLI" \
1
# Tests for extendedKeyUsage, part 2: client-side checking of server cert