summaryrefslogtreecommitdiff
path: root/src/regress/lib
diff options
context:
space:
mode:
authorjsing <>2021-03-21 18:37:26 +0000
committerjsing <>2021-03-21 18:37:26 +0000
commit8e8e017672bc63d9aced0d649c8f3ec9424192e5 (patch)
tree58a6e8bd3484b7cb3f598746ee3ec586dde98f45 /src/regress/lib
parentb4267956efe26acca04e81248b224852ab3b48df (diff)
downloadopenbsd-8e8e017672bc63d9aced0d649c8f3ec9424192e5.tar.gz
openbsd-8e8e017672bc63d9aced0d649c8f3ec9424192e5.tar.bz2
openbsd-8e8e017672bc63d9aced0d649c8f3ec9424192e5.zip
Revise regress to match handshake struct changes.
Diffstat (limited to 'src/regress/lib')
-rw-r--r--src/regress/lib/libssl/tlsext/tlsexttest.c36
1 files changed, 18 insertions, 18 deletions
diff --git a/src/regress/lib/libssl/tlsext/tlsexttest.c b/src/regress/lib/libssl/tlsext/tlsexttest.c
index e0cba55d8f..562e3edca5 100644
--- a/src/regress/lib/libssl/tlsext/tlsexttest.c
+++ b/src/regress/lib/libssl/tlsext/tlsexttest.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: tlsexttest.c,v 1.46 2021/03/10 18:28:01 jsing Exp $ */ 1/* $OpenBSD: tlsexttest.c,v 1.47 2021/03/21 18:37:26 jsing Exp $ */
2/* 2/*
3 * Copyright (c) 2017 Joel Sing <jsing@openbsd.org> 3 * Copyright (c) 2017 Joel Sing <jsing@openbsd.org>
4 * Copyright (c) 2017 Doug Hogan <doug@openbsd.org> 4 * Copyright (c) 2017 Doug Hogan <doug@openbsd.org>
@@ -3128,10 +3128,10 @@ test_tlsext_keyshare_client(void)
3128 if ((ssl = SSL_new(ssl_ctx)) == NULL) 3128 if ((ssl = SSL_new(ssl_ctx)) == NULL)
3129 errx(1, "failed to create SSL"); 3129 errx(1, "failed to create SSL");
3130 3130
3131 if ((S3I(ssl)->hs_tls13.key_share = 3131 if ((S3I(ssl)->hs.tls13.key_share =
3132 tls13_key_share_new_nid(NID_X25519)) == NULL) 3132 tls13_key_share_new_nid(NID_X25519)) == NULL)
3133 errx(1, "failed to create key share"); 3133 errx(1, "failed to create key share");
3134 if (!tls13_key_share_generate(S3I(ssl)->hs_tls13.key_share)) 3134 if (!tls13_key_share_generate(S3I(ssl)->hs.tls13.key_share))
3135 errx(1, "failed to generate key share"); 3135 errx(1, "failed to generate key share");
3136 3136
3137 S3I(ssl)->hs.our_max_tls_version = TLS1_2_VERSION; 3137 S3I(ssl)->hs.our_max_tls_version = TLS1_2_VERSION;
@@ -3251,14 +3251,14 @@ test_tlsext_keyshare_server(void)
3251 goto done; 3251 goto done;
3252 } 3252 }
3253 3253
3254 if ((S3I(ssl)->hs_tls13.key_share = 3254 if ((S3I(ssl)->hs.tls13.key_share =
3255 tls13_key_share_new_nid(NID_X25519)) == NULL) 3255 tls13_key_share_new_nid(NID_X25519)) == NULL)
3256 errx(1, "failed to create key share"); 3256 errx(1, "failed to create key share");
3257 if (!tls13_key_share_generate(S3I(ssl)->hs_tls13.key_share)) 3257 if (!tls13_key_share_generate(S3I(ssl)->hs.tls13.key_share))
3258 errx(1, "failed to generate key share"); 3258 errx(1, "failed to generate key share");
3259 3259
3260 CBS_init(&cbs, bogokey, sizeof(bogokey)); 3260 CBS_init(&cbs, bogokey, sizeof(bogokey));
3261 if (!tls13_key_share_peer_public(S3I(ssl)->hs_tls13.key_share, 3261 if (!tls13_key_share_peer_public(S3I(ssl)->hs.tls13.key_share,
3262 0x001d, &cbs)) { 3262 0x001d, &cbs)) {
3263 FAIL("failed to load peer public key\n"); 3263 FAIL("failed to load peer public key\n");
3264 failure = 1; 3264 failure = 1;
@@ -3284,10 +3284,10 @@ test_tlsext_keyshare_server(void)
3284 goto done; 3284 goto done;
3285 } 3285 }
3286 3286
3287 if ((S3I(ssl)->hs_tls13.key_share = 3287 if ((S3I(ssl)->hs.tls13.key_share =
3288 tls13_key_share_new_nid(NID_X25519)) == NULL) 3288 tls13_key_share_new_nid(NID_X25519)) == NULL)
3289 errx(1, "failed to create key share"); 3289 errx(1, "failed to create key share");
3290 if (!tls13_key_share_generate(S3I(ssl)->hs_tls13.key_share)) 3290 if (!tls13_key_share_generate(S3I(ssl)->hs.tls13.key_share))
3291 errx(1, "failed to generate key share"); 3291 errx(1, "failed to generate key share");
3292 3292
3293 CBS_init(&cbs, data, dlen); 3293 CBS_init(&cbs, data, dlen);
@@ -3357,8 +3357,8 @@ test_tlsext_cookie_client(void)
3357 } 3357 }
3358 3358
3359 /* Normally would be set by receiving a server cookie in an HRR */ 3359 /* Normally would be set by receiving a server cookie in an HRR */
3360 S3I(ssl)->hs_tls13.cookie = strdup(cookie); 3360 S3I(ssl)->hs.tls13.cookie = strdup(cookie);
3361 S3I(ssl)->hs_tls13.cookie_len = strlen(cookie); 3361 S3I(ssl)->hs.tls13.cookie_len = strlen(cookie);
3362 3362
3363 if (!tlsext_cookie_client_needs(ssl, SSL_TLSEXT_MSG_CH)) { 3363 if (!tlsext_cookie_client_needs(ssl, SSL_TLSEXT_MSG_CH)) {
3364 FAIL("client should need cookie\n"); 3364 FAIL("client should need cookie\n");
@@ -3388,7 +3388,7 @@ test_tlsext_cookie_client(void)
3388 3388
3389 CBS_init(&cbs, data, dlen); 3389 CBS_init(&cbs, data, dlen);
3390 3390
3391 /* Checks cookie against what's in the hs_tls13 */ 3391 /* Checks cookie against what's in the hs.tls13 */
3392 if (!tlsext_cookie_server_parse(ssl, SSL_TLSEXT_MSG_CH, &cbs, &alert)) { 3392 if (!tlsext_cookie_server_parse(ssl, SSL_TLSEXT_MSG_CH, &cbs, &alert)) {
3393 FAIL("failed to parse client cookie\n"); 3393 FAIL("failed to parse client cookie\n");
3394 failure = 1; 3394 failure = 1;
@@ -3444,8 +3444,8 @@ test_tlsext_cookie_server(void)
3444 } 3444 }
3445 3445
3446 /* Normally would be set by server before sending HRR */ 3446 /* Normally would be set by server before sending HRR */
3447 S3I(ssl)->hs_tls13.cookie = strdup(cookie); 3447 S3I(ssl)->hs.tls13.cookie = strdup(cookie);
3448 S3I(ssl)->hs_tls13.cookie_len = strlen(cookie); 3448 S3I(ssl)->hs.tls13.cookie_len = strlen(cookie);
3449 3449
3450 if (!tlsext_cookie_server_needs(ssl, SSL_TLSEXT_MSG_SH)) { 3450 if (!tlsext_cookie_server_needs(ssl, SSL_TLSEXT_MSG_SH)) {
3451 FAIL("server should need cookie\n"); 3451 FAIL("server should need cookie\n");
@@ -3481,9 +3481,9 @@ test_tlsext_cookie_server(void)
3481 goto done; 3481 goto done;
3482 } 3482 }
3483 3483
3484 freezero(S3I(ssl)->hs_tls13.cookie, S3I(ssl)->hs_tls13.cookie_len); 3484 freezero(S3I(ssl)->hs.tls13.cookie, S3I(ssl)->hs.tls13.cookie_len);
3485 S3I(ssl)->hs_tls13.cookie = NULL; 3485 S3I(ssl)->hs.tls13.cookie = NULL;
3486 S3I(ssl)->hs_tls13.cookie_len = 0; 3486 S3I(ssl)->hs.tls13.cookie_len = 0;
3487 3487
3488 if (!tlsext_cookie_client_parse(ssl, SSL_TLSEXT_MSG_SH, &cbs, &alert)) { 3488 if (!tlsext_cookie_client_parse(ssl, SSL_TLSEXT_MSG_SH, &cbs, &alert)) {
3489 FAIL("failed to parse server cookie\n"); 3489 FAIL("failed to parse server cookie\n");
@@ -3491,8 +3491,8 @@ test_tlsext_cookie_server(void)
3491 goto done; 3491 goto done;
3492 } 3492 }
3493 3493
3494 if (memcmp(cookie, S3I(ssl)->hs_tls13.cookie, 3494 if (memcmp(cookie, S3I(ssl)->hs.tls13.cookie,
3495 S3I(ssl)->hs_tls13.cookie_len) != 0) { 3495 S3I(ssl)->hs.tls13.cookie_len) != 0) {
3496 FAIL("parsed server cookie does not match sent cookie\n"); 3496 FAIL("parsed server cookie does not match sent cookie\n");
3497 failure = 1; 3497 failure = 1;
3498 goto done; 3498 goto done;