summaryrefslogtreecommitdiff
path: root/src/regress/lib/libssl/tlsext/tlsexttest.c
diff options
context:
space:
mode:
authorbeck <>2019-01-24 00:07:58 +0000
committerbeck <>2019-01-24 00:07:58 +0000
commit9e01a2b9fc249398f995e0d00bee55d7e3c31be0 (patch)
tree473d2df51bf1efb41163303f552794cfc223bad1 /src/regress/lib/libssl/tlsext/tlsexttest.c
parentaf24f013c3cac19000cba61750502bcbca1ee7ba (diff)
downloadopenbsd-9e01a2b9fc249398f995e0d00bee55d7e3c31be0.tar.gz
openbsd-9e01a2b9fc249398f995e0d00bee55d7e3c31be0.tar.bz2
openbsd-9e01a2b9fc249398f995e0d00bee55d7e3c31be0.zip
Remove SHA224 based sigalgs from use in TLS 1.2 as SHA224 is deprecated.
Remove GOST based sigalgs from TLS 1.2 since they don't work with TLS 1.2. ok jsing@
Diffstat (limited to 'src/regress/lib/libssl/tlsext/tlsexttest.c')
-rw-r--r--src/regress/lib/libssl/tlsext/tlsexttest.c28
1 files changed, 10 insertions, 18 deletions
diff --git a/src/regress/lib/libssl/tlsext/tlsexttest.c b/src/regress/lib/libssl/tlsext/tlsexttest.c
index 32895a49ad..05b18b5b05 100644
--- a/src/regress/lib/libssl/tlsext/tlsexttest.c
+++ b/src/regress/lib/libssl/tlsext/tlsexttest.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: tlsexttest.c,v 1.25 2019/01/23 18:39:28 beck Exp $ */ 1/* $OpenBSD: tlsexttest.c,v 1.26 2019/01/24 00:07:58 beck Exp $ */
2/* 2/*
3 * Copyright (c) 2017 Joel Sing <jsing@openbsd.org> 3 * Copyright (c) 2017 Joel Sing <jsing@openbsd.org>
4 * Copyright (c) 2017 Doug Hogan <doug@openbsd.org> 4 * Copyright (c) 2017 Doug Hogan <doug@openbsd.org>
@@ -1505,11 +1505,9 @@ test_tlsext_ri_server(void)
1505 */ 1505 */
1506 1506
1507static unsigned char tlsext_sigalgs_client[] = { 1507static unsigned char tlsext_sigalgs_client[] = {
1508 0x00, 0x20, 0x08, 0x06, 0x06, 0x01, 0x06, 0x03, 1508 0x00, 0x16, 0x08, 0x06, 0x06, 0x01, 0x06, 0x03,
1509 0xef, 0xef, 0x08, 0x05, 0x05, 0x01, 0x05, 0x03, 1509 0x08, 0x05, 0x05, 0x01, 0x05, 0x03, 0x08, 0x04,
1510 0x08, 0x04, 0x04, 0x01, 0x04, 0x03, 0xee, 0xee, 1510 0x04, 0x01, 0x04, 0x03, 0x02, 0x01, 0x02, 0x03,
1511 0xed, 0xed, 0x03, 0x01, 0x03, 0x03, 0x02, 0x01,
1512 0x02, 0x03,
1513}; 1511};
1514 1512
1515static int 1513static int
@@ -1599,11 +1597,6 @@ test_tlsext_sigalgs_client(void)
1599 failure = 1; 1597 failure = 1;
1600 goto done; 1598 goto done;
1601 } 1599 }
1602 if (ssl->cert->pkeys[SSL_PKEY_GOST01].sigalg->md() != EVP_streebog512()) {
1603 fprintf(stderr, "FAIL: GOST01 digest mismatch\n");
1604 failure = 1;
1605 goto done;
1606 }
1607 1600
1608 done: 1601 done:
1609 CBB_cleanup(&cbb); 1602 CBB_cleanup(&cbb);
@@ -2733,14 +2726,13 @@ test_tlsext_srtp_server(void)
2733#endif /* OPENSSL_NO_SRTP */ 2726#endif /* OPENSSL_NO_SRTP */
2734 2727
2735unsigned char tlsext_clienthello_default[] = { 2728unsigned char tlsext_clienthello_default[] = {
2736 0x00, 0x3c, 0x00, 0x0b, 0x00, 0x02, 0x01, 0x00, 2729 0x00, 0x32, 0x00, 0x0b, 0x00, 0x02, 0x01, 0x00,
2737 0x00, 0x0a, 0x00, 0x08, 0x00, 0x06, 0x00, 0x1d, 2730 0x00, 0x0a, 0x00, 0x08, 0x00, 0x06, 0x00, 0x1d,
2738 0x00, 0x17, 0x00, 0x18, 0x00, 0x23, 0x00, 0x00, 2731 0x00, 0x17, 0x00, 0x18, 0x00, 0x23, 0x00, 0x00,
2739 0x00, 0x0d, 0x00, 0x22, 0x00, 0x20, 0x08, 0x06, 2732 0x00, 0x0d, 0x00, 0x18, 0x00, 0x16, 0x08, 0x06,
2740 0x06, 0x01, 0x06, 0x03, 0xef, 0xef, 0x08, 0x05, 2733 0x06, 0x01, 0x06, 0x03, 0x08, 0x05, 0x05, 0x01,
2741 0x05, 0x01, 0x05, 0x03, 0x08, 0x04, 0x04, 0x01, 2734 0x05, 0x03, 0x08, 0x04, 0x04, 0x01, 0x04, 0x03,
2742 0x04, 0x03, 0xee, 0xee, 0xed, 0xed, 0x03, 0x01, 2735 0x02, 0x01, 0x02, 0x03,
2743 0x03, 0x03, 0x02, 0x01, 0x02, 0x03,
2744}; 2736};
2745 2737
2746unsigned char tlsext_clienthello_disabled[] = {}; 2738unsigned char tlsext_clienthello_disabled[] = {};
@@ -3097,7 +3089,7 @@ test_tlsext_keyshare_client(void)
3097 } 3089 }
3098 3090
3099 if (dlen != sizeof(tlsext_keyshare_client)) { 3091 if (dlen != sizeof(tlsext_keyshare_client)) {
3100 FAIL("got client sigalgs with length %zu, " 3092 FAIL("got client keyshare with length %zu, "
3101 "want length %zu\n", dlen, (size_t) sizeof(tlsext_keyshare_client)); 3093 "want length %zu\n", dlen, (size_t) sizeof(tlsext_keyshare_client));
3102 failure = 1; 3094 failure = 1;
3103 goto done; 3095 goto done;