diff options
| author | jsing <> | 2022-02-01 17:19:16 +0000 |
|---|---|---|
| committer | jsing <> | 2022-02-01 17:19:16 +0000 |
| commit | e0ca43dbb96b7050114088357efcbfa6b503c87f (patch) | |
| tree | 896a7af33911d97d91c96d655353d8543086905a /src/regress/lib | |
| parent | 1b0a76785c6e9fe8eb4f8f36bad366fe9a4d399c (diff) | |
| download | openbsd-e0ca43dbb96b7050114088357efcbfa6b503c87f.tar.gz openbsd-e0ca43dbb96b7050114088357efcbfa6b503c87f.tar.bz2 openbsd-e0ca43dbb96b7050114088357efcbfa6b503c87f.zip | |
Use TLS_PADDING_* defines.
Diffstat (limited to 'src/regress/lib')
| -rw-r--r-- | src/regress/lib/libtls/signer/signertest.c | 10 |
1 files changed, 6 insertions, 4 deletions
diff --git a/src/regress/lib/libtls/signer/signertest.c b/src/regress/lib/libtls/signer/signertest.c index 2614c659e1..50ee5f0c44 100644 --- a/src/regress/lib/libtls/signer/signertest.c +++ b/src/regress/lib/libtls/signer/signertest.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: signertest.c,v 1.3 2022/02/01 17:13:52 jsing Exp $ */ | 1 | /* $OpenBSD: signertest.c,v 1.4 2022/02/01 17:19:16 jsing Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2017, 2018, 2022 Joel Sing <jsing@openbsd.org> | 3 | * Copyright (c) 2017, 2018, 2022 Joel Sing <jsing@openbsd.org> |
| 4 | * | 4 | * |
| @@ -212,7 +212,7 @@ do_signer_tests(void) | |||
| 212 | 212 | ||
| 213 | /* Sign with RSA. */ | 213 | /* Sign with RSA. */ |
| 214 | if (tls_signer_sign(signer, server_rsa_pubkey_hash, test_digest, | 214 | if (tls_signer_sign(signer, server_rsa_pubkey_hash, test_digest, |
| 215 | sizeof(test_digest), RSA_PKCS1_PADDING, &signature, | 215 | sizeof(test_digest), TLS_PADDING_RSA_PKCS1, &signature, |
| 216 | &signature_len) == -1) { | 216 | &signature_len) == -1) { |
| 217 | fprintf(stderr, "FAIL: failed to sign with RSA key: %s\n", | 217 | fprintf(stderr, "FAIL: failed to sign with RSA key: %s\n", |
| 218 | tls_signer_error(signer)); | 218 | tls_signer_error(signer)); |
| @@ -230,7 +230,8 @@ do_signer_tests(void) | |||
| 230 | * check against a known value, rather we can only verify the signature. | 230 | * check against a known value, rather we can only verify the signature. |
| 231 | */ | 231 | */ |
| 232 | if (tls_signer_sign(signer, server_ecdsa_pubkey_hash, test_digest, | 232 | if (tls_signer_sign(signer, server_ecdsa_pubkey_hash, test_digest, |
| 233 | sizeof(test_digest), 0, &signature, &signature_len) == -1) { | 233 | sizeof(test_digest), TLS_PADDING_NONE, &signature, |
| 234 | &signature_len) == -1) { | ||
| 234 | fprintf(stderr, "FAIL: failed to sign with ECDSA key: %s\n", | 235 | fprintf(stderr, "FAIL: failed to sign with ECDSA key: %s\n", |
| 235 | tls_signer_error(signer)); | 236 | tls_signer_error(signer)); |
| 236 | goto failure; | 237 | goto failure; |
| @@ -246,7 +247,8 @@ do_signer_tests(void) | |||
| 246 | 247 | ||
| 247 | /* Attempt to sign with an unknown cert pubkey hash. */ | 248 | /* Attempt to sign with an unknown cert pubkey hash. */ |
| 248 | if (tls_signer_sign(signer, server_unknown_pubkey_hash, test_digest, | 249 | if (tls_signer_sign(signer, server_unknown_pubkey_hash, test_digest, |
| 249 | sizeof(test_digest), 0, &signature, &signature_len) != -1) { | 250 | sizeof(test_digest), TLS_PADDING_NONE, &signature, |
| 251 | &signature_len) != -1) { | ||
| 250 | fprintf(stderr, "FAIL: signing succeeded with unknown key\n"); | 252 | fprintf(stderr, "FAIL: signing succeeded with unknown key\n"); |
| 251 | goto failure; | 253 | goto failure; |
| 252 | } | 254 | } |
