diff options
author | jsing <> | 2018-04-07 16:42:17 +0000 |
---|---|---|
committer | jsing <> | 2018-04-07 16:42:17 +0000 |
commit | abb1c0eeef1b9e24cbf255fafa8bbb730e86f46d (patch) | |
tree | d21eb858104818dad2768ef2ff29233c0b7044d4 | |
parent | fa406a4e78813492e56384a03893357a094f6793 (diff) | |
download | openbsd-abb1c0eeef1b9e24cbf255fafa8bbb730e86f46d.tar.gz openbsd-abb1c0eeef1b9e24cbf255fafa8bbb730e86f46d.tar.bz2 openbsd-abb1c0eeef1b9e24cbf255fafa8bbb730e86f46d.zip |
Revise regress to match tls_keypair_clear() removal.
-rw-r--r-- | src/regress/lib/libtls/keypair/keypairtest.c | 21 |
1 files changed, 3 insertions, 18 deletions
diff --git a/src/regress/lib/libtls/keypair/keypairtest.c b/src/regress/lib/libtls/keypair/keypairtest.c index 718dcac8d9..732464af00 100644 --- a/src/regress/lib/libtls/keypair/keypairtest.c +++ b/src/regress/lib/libtls/keypair/keypairtest.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: keypairtest.c,v 1.3 2018/02/14 15:59:50 jsing Exp $ */ | 1 | /* $OpenBSD: keypairtest.c,v 1.4 2018/04/07 16:42:17 jsing Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2018 Joel Sing <jsing@openbsd.org> | 3 | * Copyright (c) 2018 Joel Sing <jsing@openbsd.org> |
4 | * | 4 | * |
@@ -130,28 +130,13 @@ do_keypair_tests(void) | |||
130 | goto done; | 130 | goto done; |
131 | } | 131 | } |
132 | 132 | ||
133 | tls_keypair_clear(kp); | 133 | tls_keypair_clear_key(kp); |
134 | 134 | ||
135 | if (kp->cert_mem != NULL || kp->cert_len != 0) { | ||
136 | fprintf(stderr, "FAIL: cert not cleared (mem %p, len %zu)", | ||
137 | kp->cert_mem, kp->cert_len); | ||
138 | goto done; | ||
139 | } | ||
140 | if (kp->key_mem != NULL || kp->key_len != 0) { | 135 | if (kp->key_mem != NULL || kp->key_len != 0) { |
141 | fprintf(stderr, "FAIL: key not cleared (mem %p, len %zu)", | 136 | fprintf(stderr, "FAIL: key not cleared (mem %p, len %zu)", |
142 | kp->key_mem, kp->key_len); | 137 | kp->key_mem, kp->key_len); |
143 | goto done; | 138 | goto done; |
144 | } | 139 | } |
145 | if (kp->ocsp_staple != NULL || kp->ocsp_staple_len != 0) { | ||
146 | fprintf(stderr, "FAIL: ocsp staple not cleared (mem %p, " | ||
147 | "len %zu)", kp->ocsp_staple, kp->ocsp_staple_len); | ||
148 | goto done; | ||
149 | } | ||
150 | if (kp->pubkey_hash != NULL) { | ||
151 | fprintf(stderr, "FAIL: pubkey hash not cleared (mem %p)\n", | ||
152 | kp->pubkey_hash); | ||
153 | goto done; | ||
154 | } | ||
155 | 140 | ||
156 | if (tls_keypair_set_cert_mem(kp, &err, cert, cert_len) == -1) { | 141 | if (tls_keypair_set_cert_mem(kp, &err, cert, cert_len) == -1) { |
157 | fprintf(stderr, "FAIL: failed to load cert: %s\n", err.msg); | 142 | fprintf(stderr, "FAIL: failed to load cert: %s\n", err.msg); |
@@ -186,7 +171,7 @@ do_keypair_tests(void) | |||
186 | goto done; | 171 | goto done; |
187 | } | 172 | } |
188 | 173 | ||
189 | tls_keypair_clear(kp); | 174 | tls_keypair_clear_key(kp); |
190 | 175 | ||
191 | if (kp->key_mem != NULL || kp->key_len != 0) { | 176 | if (kp->key_mem != NULL || kp->key_len != 0) { |
192 | fprintf(stderr, "FAIL: key not cleared (mem %p, len %zu)", | 177 | fprintf(stderr, "FAIL: key not cleared (mem %p, len %zu)", |