summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authortb <>2022-02-05 18:21:09 +0000
committertb <>2022-02-05 18:21:09 +0000
commitdd2cc4aae10ad27fe8a36547c4658bf841bef6bb (patch)
tree7926f01a4f8517b51c375f716e6dfa3bca8293a5
parentcb6e5bc9d33ddd51f710c57da10369611ccd518f (diff)
downloadopenbsd-dd2cc4aae10ad27fe8a36547c4658bf841bef6bb.tar.gz
openbsd-dd2cc4aae10ad27fe8a36547c4658bf841bef6bb.tar.bz2
openbsd-dd2cc4aae10ad27fe8a36547c4658bf841bef6bb.zip
Mechanically adjust from AEAD- to TLS_ to adjust to the new cipher names.
-rw-r--r--src/regress/lib/libssl/interop/cipher/Makefile15
1 files changed, 5 insertions, 10 deletions
diff --git a/src/regress/lib/libssl/interop/cipher/Makefile b/src/regress/lib/libssl/interop/cipher/Makefile
index c88309962d..77ed0f7ebe 100644
--- a/src/regress/lib/libssl/interop/cipher/Makefile
+++ b/src/regress/lib/libssl/interop/cipher/Makefile
@@ -1,4 +1,4 @@
1# $OpenBSD: Makefile,v 1.7 2020/12/17 00:51:11 bluhm Exp $ 1# $OpenBSD: Makefile,v 1.8 2022/02/05 18:21:09 tb Exp $
2 2
3# Connect a client to a server. Both can be current libressl, or 3# Connect a client to a server. Both can be current libressl, or
4# openssl 1.0.2, or openssl 1.1. Create lists of supported ciphers 4# openssl 1.0.2, or openssl 1.1. Create lists of supported ciphers
@@ -133,11 +133,11 @@ check-cipher-${cipher}-client-${clib}-server-${slib}: \
133 client-cipher-${cipher}-client-${clib}-server-${slib}.out \ 133 client-cipher-${cipher}-client-${clib}-server-${slib}.out \
134 server-cipher-${cipher}-client-${clib}-server-${slib}.out 134 server-cipher-${cipher}-client-${clib}-server-${slib}.out
135.if "${clib}" != "openssl" && "${slib}" != "openssl" && \ 135.if "${clib}" != "openssl" && "${slib}" != "openssl" && \
136 "${cipher:C/AEAD-(AES.*-GCM|CHACHA.*-POLY.*)-SHA.*/TLS1_3/}" != TLS1_3 136 "${cipher:C/TLS_(AES.*_GCM|CHACHA.*_POLY.*)_SHA.*/TLS1_3/}" != TLS1_3
137 # client and server 1.3 capable, not TLS 1.3 cipher 137 # client and server 1.3 capable, not TLS 1.3 cipher
138. if "${clib}" == "libressl" 138. if "${clib}" == "libressl"
139 # libressl client may prefer chacha-poly if aes-ni is not supported 139 # libressl client may prefer chacha-poly if aes-ni is not supported
140 egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$$' ${@:S/^check/client/}.out 140 egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$$' ${@:S/^check/client/}.out
141. else 141. else
142 # openssl 1.1 generic client cipher 142 # openssl 1.1 generic client cipher
143 grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$$' ${@:S/^check/client/}.out 143 grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$$' ${@:S/^check/client/}.out
@@ -147,16 +147,11 @@ check-cipher-${cipher}-client-${clib}-server-${slib}: \
147. if "${slib}" == "openssl11" 147. if "${slib}" == "openssl11"
148 egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$$' ${@:S/^check/server/}.out 148 egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$$' ${@:S/^check/server/}.out
149. else 149. else
150 egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$$' ${@:S/^check/server/}.out 150 egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$$' ${@:S/^check/server/}.out
151. endif 151. endif
152. else 152. else
153. if "${slib}" == "openssl11" 153 # generic server cipher
154 # openssl 1.1 generic server cipher
155 grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$$' ${@:S/^check/server/}.out 154 grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$$' ${@:S/^check/server/}.out
156. else
157 # libressl generic server cipher
158 grep -q ' Cipher *: AEAD-AES256-GCM-SHA384$$' ${@:S/^check/server/}.out
159. endif
160. endif 155. endif
161.else 156.else
162 grep -q ' Cipher *: ${cipher}$$' ${@:S/^check/client/}.out 157 grep -q ' Cipher *: ${cipher}$$' ${@:S/^check/client/}.out