summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorjsing <>2022-02-01 17:19:16 +0000
committerjsing <>2022-02-01 17:19:16 +0000
commit6fd933a66bac23ba01bf8727afa5da899721ffe0 (patch)
tree896a7af33911d97d91c96d655353d8543086905a
parent38b0a58078d54a33f27c269dc2cf28bfb11b7f92 (diff)
downloadopenbsd-6fd933a66bac23ba01bf8727afa5da899721ffe0.tar.gz
openbsd-6fd933a66bac23ba01bf8727afa5da899721ffe0.tar.bz2
openbsd-6fd933a66bac23ba01bf8727afa5da899721ffe0.zip
Use TLS_PADDING_* defines.
-rw-r--r--src/regress/lib/libtls/signer/signertest.c10
1 files changed, 6 insertions, 4 deletions
diff --git a/src/regress/lib/libtls/signer/signertest.c b/src/regress/lib/libtls/signer/signertest.c
index 2614c659e1..50ee5f0c44 100644
--- a/src/regress/lib/libtls/signer/signertest.c
+++ b/src/regress/lib/libtls/signer/signertest.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: signertest.c,v 1.3 2022/02/01 17:13:52 jsing Exp $ */ 1/* $OpenBSD: signertest.c,v 1.4 2022/02/01 17:19:16 jsing Exp $ */
2/* 2/*
3 * Copyright (c) 2017, 2018, 2022 Joel Sing <jsing@openbsd.org> 3 * Copyright (c) 2017, 2018, 2022 Joel Sing <jsing@openbsd.org>
4 * 4 *
@@ -212,7 +212,7 @@ do_signer_tests(void)
212 212
213 /* Sign with RSA. */ 213 /* Sign with RSA. */
214 if (tls_signer_sign(signer, server_rsa_pubkey_hash, test_digest, 214 if (tls_signer_sign(signer, server_rsa_pubkey_hash, test_digest,
215 sizeof(test_digest), RSA_PKCS1_PADDING, &signature, 215 sizeof(test_digest), TLS_PADDING_RSA_PKCS1, &signature,
216 &signature_len) == -1) { 216 &signature_len) == -1) {
217 fprintf(stderr, "FAIL: failed to sign with RSA key: %s\n", 217 fprintf(stderr, "FAIL: failed to sign with RSA key: %s\n",
218 tls_signer_error(signer)); 218 tls_signer_error(signer));
@@ -230,7 +230,8 @@ do_signer_tests(void)
230 * check against a known value, rather we can only verify the signature. 230 * check against a known value, rather we can only verify the signature.
231 */ 231 */
232 if (tls_signer_sign(signer, server_ecdsa_pubkey_hash, test_digest, 232 if (tls_signer_sign(signer, server_ecdsa_pubkey_hash, test_digest,
233 sizeof(test_digest), 0, &signature, &signature_len) == -1) { 233 sizeof(test_digest), TLS_PADDING_NONE, &signature,
234 &signature_len) == -1) {
234 fprintf(stderr, "FAIL: failed to sign with ECDSA key: %s\n", 235 fprintf(stderr, "FAIL: failed to sign with ECDSA key: %s\n",
235 tls_signer_error(signer)); 236 tls_signer_error(signer));
236 goto failure; 237 goto failure;
@@ -246,7 +247,8 @@ do_signer_tests(void)
246 247
247 /* Attempt to sign with an unknown cert pubkey hash. */ 248 /* Attempt to sign with an unknown cert pubkey hash. */
248 if (tls_signer_sign(signer, server_unknown_pubkey_hash, test_digest, 249 if (tls_signer_sign(signer, server_unknown_pubkey_hash, test_digest,
249 sizeof(test_digest), 0, &signature, &signature_len) != -1) { 250 sizeof(test_digest), TLS_PADDING_NONE, &signature,
251 &signature_len) != -1) {
250 fprintf(stderr, "FAIL: signing succeeded with unknown key\n"); 252 fprintf(stderr, "FAIL: signing succeeded with unknown key\n");
251 goto failure; 253 goto failure;
252 } 254 }