Rm obsolete hack in ssl-opt.sh
diff --git a/tests/compat.sh b/tests/compat.sh
index 5eff44f..04641c0 100755
--- a/tests/compat.sh
+++ b/tests/compat.sh
@@ -690,7 +690,7 @@
             ;;
 
         "PSK")
-            # *PKS-NULL-SHA suites supported by GnuTLS 3.3.5 but not 3.2.15
+            # *PSK-NULL-SHA suites supported by GnuTLS 3.3.5 but not 3.2.15
             P_CIPHERS="$P_CIPHERS                        \
                 TLS-PSK-WITH-NULL-SHA                    \
                 TLS-DHE-PSK-WITH-NULL-SHA                \
diff --git a/tests/ssl-opt.sh b/tests/ssl-opt.sh
index fa8e6f1..d3b7b3f 100755
--- a/tests/ssl-opt.sh
+++ b/tests/ssl-opt.sh
@@ -2256,11 +2256,10 @@
             "$P_CLI" \
             0
 
-# add psk to leave an option for client to send SERVERQUIT
 run_test    "extKeyUsage srv: codeSign -> fail" \
-            "$P_SRV psk=abc123 key_file=data_files/server5.key \
+            "$P_SRV key_file=data_files/server5.key \
              crt_file=data_files/server5.eku-cli.crt" \
-            "$P_CLI psk=badbad" \
+            "$P_CLI" \
             1
 
 # Tests for extendedKeyUsage, part 2: client-side checking of server cert