diff options
author | jsing <> | 2021-03-21 18:37:26 +0000 |
---|---|---|
committer | jsing <> | 2021-03-21 18:37:26 +0000 |
commit | 8e8e017672bc63d9aced0d649c8f3ec9424192e5 (patch) | |
tree | 58a6e8bd3484b7cb3f598746ee3ec586dde98f45 /src/regress/lib | |
parent | b4267956efe26acca04e81248b224852ab3b48df (diff) | |
download | openbsd-8e8e017672bc63d9aced0d649c8f3ec9424192e5.tar.gz openbsd-8e8e017672bc63d9aced0d649c8f3ec9424192e5.tar.bz2 openbsd-8e8e017672bc63d9aced0d649c8f3ec9424192e5.zip |
Revise regress to match handshake struct changes.
Diffstat (limited to 'src/regress/lib')
-rw-r--r-- | src/regress/lib/libssl/tlsext/tlsexttest.c | 36 |
1 files changed, 18 insertions, 18 deletions
diff --git a/src/regress/lib/libssl/tlsext/tlsexttest.c b/src/regress/lib/libssl/tlsext/tlsexttest.c index e0cba55d8f..562e3edca5 100644 --- a/src/regress/lib/libssl/tlsext/tlsexttest.c +++ b/src/regress/lib/libssl/tlsext/tlsexttest.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: tlsexttest.c,v 1.46 2021/03/10 18:28:01 jsing Exp $ */ | 1 | /* $OpenBSD: tlsexttest.c,v 1.47 2021/03/21 18:37:26 jsing Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2017 Joel Sing <jsing@openbsd.org> | 3 | * Copyright (c) 2017 Joel Sing <jsing@openbsd.org> |
4 | * Copyright (c) 2017 Doug Hogan <doug@openbsd.org> | 4 | * Copyright (c) 2017 Doug Hogan <doug@openbsd.org> |
@@ -3128,10 +3128,10 @@ test_tlsext_keyshare_client(void) | |||
3128 | if ((ssl = SSL_new(ssl_ctx)) == NULL) | 3128 | if ((ssl = SSL_new(ssl_ctx)) == NULL) |
3129 | errx(1, "failed to create SSL"); | 3129 | errx(1, "failed to create SSL"); |
3130 | 3130 | ||
3131 | if ((S3I(ssl)->hs_tls13.key_share = | 3131 | if ((S3I(ssl)->hs.tls13.key_share = |
3132 | tls13_key_share_new_nid(NID_X25519)) == NULL) | 3132 | tls13_key_share_new_nid(NID_X25519)) == NULL) |
3133 | errx(1, "failed to create key share"); | 3133 | errx(1, "failed to create key share"); |
3134 | if (!tls13_key_share_generate(S3I(ssl)->hs_tls13.key_share)) | 3134 | if (!tls13_key_share_generate(S3I(ssl)->hs.tls13.key_share)) |
3135 | errx(1, "failed to generate key share"); | 3135 | errx(1, "failed to generate key share"); |
3136 | 3136 | ||
3137 | S3I(ssl)->hs.our_max_tls_version = TLS1_2_VERSION; | 3137 | S3I(ssl)->hs.our_max_tls_version = TLS1_2_VERSION; |
@@ -3251,14 +3251,14 @@ test_tlsext_keyshare_server(void) | |||
3251 | goto done; | 3251 | goto done; |
3252 | } | 3252 | } |
3253 | 3253 | ||
3254 | if ((S3I(ssl)->hs_tls13.key_share = | 3254 | if ((S3I(ssl)->hs.tls13.key_share = |
3255 | tls13_key_share_new_nid(NID_X25519)) == NULL) | 3255 | tls13_key_share_new_nid(NID_X25519)) == NULL) |
3256 | errx(1, "failed to create key share"); | 3256 | errx(1, "failed to create key share"); |
3257 | if (!tls13_key_share_generate(S3I(ssl)->hs_tls13.key_share)) | 3257 | if (!tls13_key_share_generate(S3I(ssl)->hs.tls13.key_share)) |
3258 | errx(1, "failed to generate key share"); | 3258 | errx(1, "failed to generate key share"); |
3259 | 3259 | ||
3260 | CBS_init(&cbs, bogokey, sizeof(bogokey)); | 3260 | CBS_init(&cbs, bogokey, sizeof(bogokey)); |
3261 | if (!tls13_key_share_peer_public(S3I(ssl)->hs_tls13.key_share, | 3261 | if (!tls13_key_share_peer_public(S3I(ssl)->hs.tls13.key_share, |
3262 | 0x001d, &cbs)) { | 3262 | 0x001d, &cbs)) { |
3263 | FAIL("failed to load peer public key\n"); | 3263 | FAIL("failed to load peer public key\n"); |
3264 | failure = 1; | 3264 | failure = 1; |
@@ -3284,10 +3284,10 @@ test_tlsext_keyshare_server(void) | |||
3284 | goto done; | 3284 | goto done; |
3285 | } | 3285 | } |
3286 | 3286 | ||
3287 | if ((S3I(ssl)->hs_tls13.key_share = | 3287 | if ((S3I(ssl)->hs.tls13.key_share = |
3288 | tls13_key_share_new_nid(NID_X25519)) == NULL) | 3288 | tls13_key_share_new_nid(NID_X25519)) == NULL) |
3289 | errx(1, "failed to create key share"); | 3289 | errx(1, "failed to create key share"); |
3290 | if (!tls13_key_share_generate(S3I(ssl)->hs_tls13.key_share)) | 3290 | if (!tls13_key_share_generate(S3I(ssl)->hs.tls13.key_share)) |
3291 | errx(1, "failed to generate key share"); | 3291 | errx(1, "failed to generate key share"); |
3292 | 3292 | ||
3293 | CBS_init(&cbs, data, dlen); | 3293 | CBS_init(&cbs, data, dlen); |
@@ -3357,8 +3357,8 @@ test_tlsext_cookie_client(void) | |||
3357 | } | 3357 | } |
3358 | 3358 | ||
3359 | /* Normally would be set by receiving a server cookie in an HRR */ | 3359 | /* Normally would be set by receiving a server cookie in an HRR */ |
3360 | S3I(ssl)->hs_tls13.cookie = strdup(cookie); | 3360 | S3I(ssl)->hs.tls13.cookie = strdup(cookie); |
3361 | S3I(ssl)->hs_tls13.cookie_len = strlen(cookie); | 3361 | S3I(ssl)->hs.tls13.cookie_len = strlen(cookie); |
3362 | 3362 | ||
3363 | if (!tlsext_cookie_client_needs(ssl, SSL_TLSEXT_MSG_CH)) { | 3363 | if (!tlsext_cookie_client_needs(ssl, SSL_TLSEXT_MSG_CH)) { |
3364 | FAIL("client should need cookie\n"); | 3364 | FAIL("client should need cookie\n"); |
@@ -3388,7 +3388,7 @@ test_tlsext_cookie_client(void) | |||
3388 | 3388 | ||
3389 | CBS_init(&cbs, data, dlen); | 3389 | CBS_init(&cbs, data, dlen); |
3390 | 3390 | ||
3391 | /* Checks cookie against what's in the hs_tls13 */ | 3391 | /* Checks cookie against what's in the hs.tls13 */ |
3392 | if (!tlsext_cookie_server_parse(ssl, SSL_TLSEXT_MSG_CH, &cbs, &alert)) { | 3392 | if (!tlsext_cookie_server_parse(ssl, SSL_TLSEXT_MSG_CH, &cbs, &alert)) { |
3393 | FAIL("failed to parse client cookie\n"); | 3393 | FAIL("failed to parse client cookie\n"); |
3394 | failure = 1; | 3394 | failure = 1; |
@@ -3444,8 +3444,8 @@ test_tlsext_cookie_server(void) | |||
3444 | } | 3444 | } |
3445 | 3445 | ||
3446 | /* Normally would be set by server before sending HRR */ | 3446 | /* Normally would be set by server before sending HRR */ |
3447 | S3I(ssl)->hs_tls13.cookie = strdup(cookie); | 3447 | S3I(ssl)->hs.tls13.cookie = strdup(cookie); |
3448 | S3I(ssl)->hs_tls13.cookie_len = strlen(cookie); | 3448 | S3I(ssl)->hs.tls13.cookie_len = strlen(cookie); |
3449 | 3449 | ||
3450 | if (!tlsext_cookie_server_needs(ssl, SSL_TLSEXT_MSG_SH)) { | 3450 | if (!tlsext_cookie_server_needs(ssl, SSL_TLSEXT_MSG_SH)) { |
3451 | FAIL("server should need cookie\n"); | 3451 | FAIL("server should need cookie\n"); |
@@ -3481,9 +3481,9 @@ test_tlsext_cookie_server(void) | |||
3481 | goto done; | 3481 | goto done; |
3482 | } | 3482 | } |
3483 | 3483 | ||
3484 | freezero(S3I(ssl)->hs_tls13.cookie, S3I(ssl)->hs_tls13.cookie_len); | 3484 | freezero(S3I(ssl)->hs.tls13.cookie, S3I(ssl)->hs.tls13.cookie_len); |
3485 | S3I(ssl)->hs_tls13.cookie = NULL; | 3485 | S3I(ssl)->hs.tls13.cookie = NULL; |
3486 | S3I(ssl)->hs_tls13.cookie_len = 0; | 3486 | S3I(ssl)->hs.tls13.cookie_len = 0; |
3487 | 3487 | ||
3488 | if (!tlsext_cookie_client_parse(ssl, SSL_TLSEXT_MSG_SH, &cbs, &alert)) { | 3488 | if (!tlsext_cookie_client_parse(ssl, SSL_TLSEXT_MSG_SH, &cbs, &alert)) { |
3489 | FAIL("failed to parse server cookie\n"); | 3489 | FAIL("failed to parse server cookie\n"); |
@@ -3491,8 +3491,8 @@ test_tlsext_cookie_server(void) | |||
3491 | goto done; | 3491 | goto done; |
3492 | } | 3492 | } |
3493 | 3493 | ||
3494 | if (memcmp(cookie, S3I(ssl)->hs_tls13.cookie, | 3494 | if (memcmp(cookie, S3I(ssl)->hs.tls13.cookie, |
3495 | S3I(ssl)->hs_tls13.cookie_len) != 0) { | 3495 | S3I(ssl)->hs.tls13.cookie_len) != 0) { |
3496 | FAIL("parsed server cookie does not match sent cookie\n"); | 3496 | FAIL("parsed server cookie does not match sent cookie\n"); |
3497 | failure = 1; | 3497 | failure = 1; |
3498 | goto done; | 3498 | goto done; |