diff options
author | jsing <> | 2022-02-01 17:19:16 +0000 |
---|---|---|
committer | jsing <> | 2022-02-01 17:19:16 +0000 |
commit | 6fd933a66bac23ba01bf8727afa5da899721ffe0 (patch) | |
tree | 896a7af33911d97d91c96d655353d8543086905a | |
parent | 38b0a58078d54a33f27c269dc2cf28bfb11b7f92 (diff) | |
download | openbsd-6fd933a66bac23ba01bf8727afa5da899721ffe0.tar.gz openbsd-6fd933a66bac23ba01bf8727afa5da899721ffe0.tar.bz2 openbsd-6fd933a66bac23ba01bf8727afa5da899721ffe0.zip |
Use TLS_PADDING_* defines.
-rw-r--r-- | src/regress/lib/libtls/signer/signertest.c | 10 |
1 files changed, 6 insertions, 4 deletions
diff --git a/src/regress/lib/libtls/signer/signertest.c b/src/regress/lib/libtls/signer/signertest.c index 2614c659e1..50ee5f0c44 100644 --- a/src/regress/lib/libtls/signer/signertest.c +++ b/src/regress/lib/libtls/signer/signertest.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: signertest.c,v 1.3 2022/02/01 17:13:52 jsing Exp $ */ | 1 | /* $OpenBSD: signertest.c,v 1.4 2022/02/01 17:19:16 jsing Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2017, 2018, 2022 Joel Sing <jsing@openbsd.org> | 3 | * Copyright (c) 2017, 2018, 2022 Joel Sing <jsing@openbsd.org> |
4 | * | 4 | * |
@@ -212,7 +212,7 @@ do_signer_tests(void) | |||
212 | 212 | ||
213 | /* Sign with RSA. */ | 213 | /* Sign with RSA. */ |
214 | if (tls_signer_sign(signer, server_rsa_pubkey_hash, test_digest, | 214 | if (tls_signer_sign(signer, server_rsa_pubkey_hash, test_digest, |
215 | sizeof(test_digest), RSA_PKCS1_PADDING, &signature, | 215 | sizeof(test_digest), TLS_PADDING_RSA_PKCS1, &signature, |
216 | &signature_len) == -1) { | 216 | &signature_len) == -1) { |
217 | fprintf(stderr, "FAIL: failed to sign with RSA key: %s\n", | 217 | fprintf(stderr, "FAIL: failed to sign with RSA key: %s\n", |
218 | tls_signer_error(signer)); | 218 | tls_signer_error(signer)); |
@@ -230,7 +230,8 @@ do_signer_tests(void) | |||
230 | * check against a known value, rather we can only verify the signature. | 230 | * check against a known value, rather we can only verify the signature. |
231 | */ | 231 | */ |
232 | if (tls_signer_sign(signer, server_ecdsa_pubkey_hash, test_digest, | 232 | if (tls_signer_sign(signer, server_ecdsa_pubkey_hash, test_digest, |
233 | sizeof(test_digest), 0, &signature, &signature_len) == -1) { | 233 | sizeof(test_digest), TLS_PADDING_NONE, &signature, |
234 | &signature_len) == -1) { | ||
234 | fprintf(stderr, "FAIL: failed to sign with ECDSA key: %s\n", | 235 | fprintf(stderr, "FAIL: failed to sign with ECDSA key: %s\n", |
235 | tls_signer_error(signer)); | 236 | tls_signer_error(signer)); |
236 | goto failure; | 237 | goto failure; |
@@ -246,7 +247,8 @@ do_signer_tests(void) | |||
246 | 247 | ||
247 | /* Attempt to sign with an unknown cert pubkey hash. */ | 248 | /* Attempt to sign with an unknown cert pubkey hash. */ |
248 | if (tls_signer_sign(signer, server_unknown_pubkey_hash, test_digest, | 249 | if (tls_signer_sign(signer, server_unknown_pubkey_hash, test_digest, |
249 | sizeof(test_digest), 0, &signature, &signature_len) != -1) { | 250 | sizeof(test_digest), TLS_PADDING_NONE, &signature, |
251 | &signature_len) != -1) { | ||
250 | fprintf(stderr, "FAIL: signing succeeded with unknown key\n"); | 252 | fprintf(stderr, "FAIL: signing succeeded with unknown key\n"); |
251 | goto failure; | 253 | goto failure; |
252 | } | 254 | } |