diff options
| author | beck <> | 2019-01-24 00:07:58 +0000 |
|---|---|---|
| committer | beck <> | 2019-01-24 00:07:58 +0000 |
| commit | 0c4d3f4e4b1febe6578a3147f00c5604cbbba167 (patch) | |
| tree | 473d2df51bf1efb41163303f552794cfc223bad1 /src/regress/lib/libssl/tlsext | |
| parent | 0a4b909395f2a5effee0b6326c75021b6d4a9968 (diff) | |
| download | openbsd-0c4d3f4e4b1febe6578a3147f00c5604cbbba167.tar.gz openbsd-0c4d3f4e4b1febe6578a3147f00c5604cbbba167.tar.bz2 openbsd-0c4d3f4e4b1febe6578a3147f00c5604cbbba167.zip | |
Remove SHA224 based sigalgs from use in TLS 1.2 as SHA224 is deprecated.
Remove GOST based sigalgs from TLS 1.2 since they don't work with TLS 1.2.
ok jsing@
Diffstat (limited to 'src/regress/lib/libssl/tlsext')
| -rw-r--r-- | src/regress/lib/libssl/tlsext/tlsexttest.c | 28 |
1 files changed, 10 insertions, 18 deletions
diff --git a/src/regress/lib/libssl/tlsext/tlsexttest.c b/src/regress/lib/libssl/tlsext/tlsexttest.c index 32895a49ad..05b18b5b05 100644 --- a/src/regress/lib/libssl/tlsext/tlsexttest.c +++ b/src/regress/lib/libssl/tlsext/tlsexttest.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: tlsexttest.c,v 1.25 2019/01/23 18:39:28 beck Exp $ */ | 1 | /* $OpenBSD: tlsexttest.c,v 1.26 2019/01/24 00:07:58 beck Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2017 Joel Sing <jsing@openbsd.org> | 3 | * Copyright (c) 2017 Joel Sing <jsing@openbsd.org> |
| 4 | * Copyright (c) 2017 Doug Hogan <doug@openbsd.org> | 4 | * Copyright (c) 2017 Doug Hogan <doug@openbsd.org> |
| @@ -1505,11 +1505,9 @@ test_tlsext_ri_server(void) | |||
| 1505 | */ | 1505 | */ |
| 1506 | 1506 | ||
| 1507 | static unsigned char tlsext_sigalgs_client[] = { | 1507 | static unsigned char tlsext_sigalgs_client[] = { |
| 1508 | 0x00, 0x20, 0x08, 0x06, 0x06, 0x01, 0x06, 0x03, | 1508 | 0x00, 0x16, 0x08, 0x06, 0x06, 0x01, 0x06, 0x03, |
| 1509 | 0xef, 0xef, 0x08, 0x05, 0x05, 0x01, 0x05, 0x03, | 1509 | 0x08, 0x05, 0x05, 0x01, 0x05, 0x03, 0x08, 0x04, |
| 1510 | 0x08, 0x04, 0x04, 0x01, 0x04, 0x03, 0xee, 0xee, | 1510 | 0x04, 0x01, 0x04, 0x03, 0x02, 0x01, 0x02, 0x03, |
| 1511 | 0xed, 0xed, 0x03, 0x01, 0x03, 0x03, 0x02, 0x01, | ||
| 1512 | 0x02, 0x03, | ||
| 1513 | }; | 1511 | }; |
| 1514 | 1512 | ||
| 1515 | static int | 1513 | static int |
| @@ -1599,11 +1597,6 @@ test_tlsext_sigalgs_client(void) | |||
| 1599 | failure = 1; | 1597 | failure = 1; |
| 1600 | goto done; | 1598 | goto done; |
| 1601 | } | 1599 | } |
| 1602 | if (ssl->cert->pkeys[SSL_PKEY_GOST01].sigalg->md() != EVP_streebog512()) { | ||
| 1603 | fprintf(stderr, "FAIL: GOST01 digest mismatch\n"); | ||
| 1604 | failure = 1; | ||
| 1605 | goto done; | ||
| 1606 | } | ||
| 1607 | 1600 | ||
| 1608 | done: | 1601 | done: |
| 1609 | CBB_cleanup(&cbb); | 1602 | CBB_cleanup(&cbb); |
| @@ -2733,14 +2726,13 @@ test_tlsext_srtp_server(void) | |||
| 2733 | #endif /* OPENSSL_NO_SRTP */ | 2726 | #endif /* OPENSSL_NO_SRTP */ |
| 2734 | 2727 | ||
| 2735 | unsigned char tlsext_clienthello_default[] = { | 2728 | unsigned char tlsext_clienthello_default[] = { |
| 2736 | 0x00, 0x3c, 0x00, 0x0b, 0x00, 0x02, 0x01, 0x00, | 2729 | 0x00, 0x32, 0x00, 0x0b, 0x00, 0x02, 0x01, 0x00, |
| 2737 | 0x00, 0x0a, 0x00, 0x08, 0x00, 0x06, 0x00, 0x1d, | 2730 | 0x00, 0x0a, 0x00, 0x08, 0x00, 0x06, 0x00, 0x1d, |
| 2738 | 0x00, 0x17, 0x00, 0x18, 0x00, 0x23, 0x00, 0x00, | 2731 | 0x00, 0x17, 0x00, 0x18, 0x00, 0x23, 0x00, 0x00, |
| 2739 | 0x00, 0x0d, 0x00, 0x22, 0x00, 0x20, 0x08, 0x06, | 2732 | 0x00, 0x0d, 0x00, 0x18, 0x00, 0x16, 0x08, 0x06, |
| 2740 | 0x06, 0x01, 0x06, 0x03, 0xef, 0xef, 0x08, 0x05, | 2733 | 0x06, 0x01, 0x06, 0x03, 0x08, 0x05, 0x05, 0x01, |
| 2741 | 0x05, 0x01, 0x05, 0x03, 0x08, 0x04, 0x04, 0x01, | 2734 | 0x05, 0x03, 0x08, 0x04, 0x04, 0x01, 0x04, 0x03, |
| 2742 | 0x04, 0x03, 0xee, 0xee, 0xed, 0xed, 0x03, 0x01, | 2735 | 0x02, 0x01, 0x02, 0x03, |
| 2743 | 0x03, 0x03, 0x02, 0x01, 0x02, 0x03, | ||
| 2744 | }; | 2736 | }; |
| 2745 | 2737 | ||
| 2746 | unsigned char tlsext_clienthello_disabled[] = {}; | 2738 | unsigned char tlsext_clienthello_disabled[] = {}; |
| @@ -3097,7 +3089,7 @@ test_tlsext_keyshare_client(void) | |||
| 3097 | } | 3089 | } |
| 3098 | 3090 | ||
| 3099 | if (dlen != sizeof(tlsext_keyshare_client)) { | 3091 | if (dlen != sizeof(tlsext_keyshare_client)) { |
| 3100 | FAIL("got client sigalgs with length %zu, " | 3092 | FAIL("got client keyshare with length %zu, " |
| 3101 | "want length %zu\n", dlen, (size_t) sizeof(tlsext_keyshare_client)); | 3093 | "want length %zu\n", dlen, (size_t) sizeof(tlsext_keyshare_client)); |
| 3102 | failure = 1; | 3094 | failure = 1; |
| 3103 | goto done; | 3095 | goto done; |
