Index: tests/standalone/io/security_context_argument_test.dart |
diff --git a/tests/standalone/io/security_context_argument_test.dart b/tests/standalone/io/security_context_argument_test.dart |
index e5332ac0e70c6c14ef9785aa21d899aefa248f6f..6e9ddcfa3075d2fca853641be962fe21c878b7e7 100644 |
--- a/tests/standalone/io/security_context_argument_test.dart |
+++ b/tests/standalone/io/security_context_argument_test.dart |
@@ -44,10 +44,10 @@ void testUsePrivateKeyArguments() { |
tlsException); |
Expect.throws(() => c.setClientAuthorities( |
localFile('certificates/server_key.p12')), |
- argumentError); |
+ tlsException); |
Expect.throws(() => c.setClientAuthorities( |
localFile('certificates/server_key.p12'), password: "iHackSites"), |
- argumentError); |
+ tlsException); |
// File does not exist |
Expect.throws(() => c.usePrivateKey( |
@@ -97,7 +97,7 @@ void testUsePrivateKeyArguments() { |
tlsException); |
Expect.throws(() => c.setTrustedCertificatesBytes([]), tlsException); |
Expect.throws(() => c.useCertificateChainBytes([]), tlsException); |
- Expect.throws(() => c.setClientAuthoritiesBytes([]), argumentError); |
+ Expect.throws(() => c.setClientAuthoritiesBytes([]), tlsException); |
// Malformed PEM certs. |
Expect.throws(() => c.usePrivateKey( |
@@ -115,7 +115,7 @@ void testUsePrivateKeyArguments() { |
tlsException); |
Expect.throws(() => c.setClientAuthorities( |
localFile('certificates/client_authority_malformed.pem')), |
- argumentError); |
+ tlsException); |
c.usePrivateKey( |
localFile('certificates/server_key.pem'), password: "dartdart"); |