diff options
| author | jsing <> | 2024-07-22 14:50:45 +0000 |
|---|---|---|
| committer | jsing <> | 2024-07-22 14:50:45 +0000 |
| commit | 9d00569d89dbe870d2bc630ceb14e42ee1807ec5 (patch) | |
| tree | 5cff81d1024cb3a06f953c3066b0a90d96f5a5e9 /src | |
| parent | 4fbee6b90386fa14be274db8ba947f951bc6de4c (diff) | |
| download | openbsd-9d00569d89dbe870d2bc630ceb14e42ee1807ec5.tar.gz openbsd-9d00569d89dbe870d2bc630ceb14e42ee1807ec5.tar.bz2 openbsd-9d00569d89dbe870d2bc630ceb14e42ee1807ec5.zip | |
Revise regress to match cipher suite values change.
Diffstat (limited to 'src')
| -rw-r--r-- | src/regress/lib/libssl/asn1/asn1test.c | 18 | ||||
| -rw-r--r-- | src/regress/lib/libssl/tlsext/tlsexttest.c | 12 |
2 files changed, 13 insertions, 17 deletions
diff --git a/src/regress/lib/libssl/asn1/asn1test.c b/src/regress/lib/libssl/asn1/asn1test.c index 6e9362b3e5..a81c502655 100644 --- a/src/regress/lib/libssl/asn1/asn1test.c +++ b/src/regress/lib/libssl/asn1/asn1test.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: asn1test.c,v 1.12 2022/11/26 16:08:56 tb Exp $ */ | 1 | /* $OpenBSD: asn1test.c,v 1.13 2024/07/22 14:50:45 jsing Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2014, 2016 Joel Sing <jsing@openbsd.org> | 3 | * Copyright (c) 2014, 2016 Joel Sing <jsing@openbsd.org> |
| 4 | * | 4 | * |
| @@ -82,7 +82,7 @@ unsigned char tlsext_tick[] = { | |||
| 82 | struct ssl_asn1_test ssl_asn1_tests[] = { | 82 | struct ssl_asn1_test ssl_asn1_tests[] = { |
| 83 | { | 83 | { |
| 84 | .session = { | 84 | .session = { |
| 85 | .cipher_id = 0x03000000L | 1, | 85 | .cipher_value = 1, |
| 86 | .ssl_version = TLS1_2_VERSION, | 86 | .ssl_version = TLS1_2_VERSION, |
| 87 | }, | 87 | }, |
| 88 | .asn1 = { | 88 | .asn1 = { |
| @@ -94,7 +94,7 @@ struct ssl_asn1_test ssl_asn1_tests[] = { | |||
| 94 | }, | 94 | }, |
| 95 | { | 95 | { |
| 96 | .session = { | 96 | .session = { |
| 97 | .cipher_id = 0x03000000L | 1, | 97 | .cipher_value = 1, |
| 98 | .ssl_version = TLS1_2_VERSION, | 98 | .ssl_version = TLS1_2_VERSION, |
| 99 | .master_key_length = 26, | 99 | .master_key_length = 26, |
| 100 | .session_id = "0123456789", | 100 | .session_id = "0123456789", |
| @@ -119,7 +119,7 @@ struct ssl_asn1_test ssl_asn1_tests[] = { | |||
| 119 | }, | 119 | }, |
| 120 | { | 120 | { |
| 121 | .session = { | 121 | .session = { |
| 122 | .cipher_id = 0x03000000L | 1, | 122 | .cipher_value = 1, |
| 123 | .ssl_version = TLS1_2_VERSION, | 123 | .ssl_version = TLS1_2_VERSION, |
| 124 | .master_key_length = 26, | 124 | .master_key_length = 26, |
| 125 | .session_id = "0123456789", | 125 | .session_id = "0123456789", |
| @@ -232,7 +232,7 @@ struct ssl_asn1_test ssl_asn1_tests[] = { | |||
| 232 | }, | 232 | }, |
| 233 | { | 233 | { |
| 234 | .session = { | 234 | .session = { |
| 235 | .cipher_id = 0x03000000L | 1, | 235 | .cipher_value = 1, |
| 236 | .ssl_version = TLS1_2_VERSION, | 236 | .ssl_version = TLS1_2_VERSION, |
| 237 | .timeout = -1, | 237 | .timeout = -1, |
| 238 | }, | 238 | }, |
| @@ -243,7 +243,7 @@ struct ssl_asn1_test ssl_asn1_tests[] = { | |||
| 243 | }, | 243 | }, |
| 244 | { | 244 | { |
| 245 | .session = { | 245 | .session = { |
| 246 | .cipher_id = 0x03000000L | 1, | 246 | .cipher_value = 1, |
| 247 | .ssl_version = TLS1_2_VERSION, | 247 | .ssl_version = TLS1_2_VERSION, |
| 248 | .time = -1, | 248 | .time = -1, |
| 249 | }, | 249 | }, |
| @@ -276,9 +276,9 @@ session_cmp(SSL_SESSION *s1, SSL_SESSION *s2) | |||
| 276 | s1->ssl_version, s2->ssl_version); | 276 | s1->ssl_version, s2->ssl_version); |
| 277 | return (1); | 277 | return (1); |
| 278 | } | 278 | } |
| 279 | if (s1->cipher_id != s2->cipher_id) { | 279 | if (s1->cipher_value != s2->cipher_value) { |
| 280 | fprintf(stderr, "cipher_id differs: %ld != %ld\n", | 280 | fprintf(stderr, "cipher_value differs: %d != %d\n", |
| 281 | s1->cipher_id, s2->cipher_id); | 281 | s1->cipher_value, s2->cipher_value); |
| 282 | return (1); | 282 | return (1); |
| 283 | } | 283 | } |
| 284 | 284 | ||
diff --git a/src/regress/lib/libssl/tlsext/tlsexttest.c b/src/regress/lib/libssl/tlsext/tlsexttest.c index 18e800031a..d5c8840e24 100644 --- a/src/regress/lib/libssl/tlsext/tlsexttest.c +++ b/src/regress/lib/libssl/tlsext/tlsexttest.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: tlsexttest.c,v 1.90 2024/03/30 09:53:41 tb Exp $ */ | 1 | /* $OpenBSD: tlsexttest.c,v 1.91 2024/07/22 14:50:45 jsing Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2017 Joel Sing <jsing@openbsd.org> | 3 | * Copyright (c) 2017 Joel Sing <jsing@openbsd.org> |
| 4 | * Copyright (c) 2017 Doug Hogan <doug@openbsd.org> | 4 | * Copyright (c) 2017 Doug Hogan <doug@openbsd.org> |
| @@ -1151,9 +1151,7 @@ test_tlsext_ecpf_server(void) | |||
| 1151 | errx(1, "failed to create session"); | 1151 | errx(1, "failed to create session"); |
| 1152 | 1152 | ||
| 1153 | /* Setup the state so we can call needs. */ | 1153 | /* Setup the state so we can call needs. */ |
| 1154 | if ((ssl->s3->hs.cipher = | 1154 | if ((ssl->s3->hs.cipher = ssl3_get_cipher_by_value(0xcca9)) == NULL) { |
| 1155 | ssl3_get_cipher_by_id(TLS1_CK_ECDHE_ECDSA_CHACHA20_POLY1305)) | ||
| 1156 | == NULL) { | ||
| 1157 | FAIL("server cannot find cipher\n"); | 1155 | FAIL("server cannot find cipher\n"); |
| 1158 | goto err; | 1156 | goto err; |
| 1159 | } | 1157 | } |
| @@ -3362,8 +3360,7 @@ test_tlsext_serverhello_build(void) | |||
| 3362 | 3360 | ||
| 3363 | ssl->s3->hs.our_max_tls_version = TLS1_3_VERSION; | 3361 | ssl->s3->hs.our_max_tls_version = TLS1_3_VERSION; |
| 3364 | ssl->s3->hs.negotiated_tls_version = TLS1_3_VERSION; | 3362 | ssl->s3->hs.negotiated_tls_version = TLS1_3_VERSION; |
| 3365 | ssl->s3->hs.cipher = | 3363 | ssl->s3->hs.cipher = ssl3_get_cipher_by_value(0x003c); |
| 3366 | ssl3_get_cipher_by_id(TLS1_CK_RSA_WITH_AES_128_SHA256); | ||
| 3367 | 3364 | ||
| 3368 | if (!tlsext_server_build(ssl, SSL_TLSEXT_MSG_SH, &cbb)) { | 3365 | if (!tlsext_server_build(ssl, SSL_TLSEXT_MSG_SH, &cbb)) { |
| 3369 | FAIL("failed to build serverhello extensions\n"); | 3366 | FAIL("failed to build serverhello extensions\n"); |
| @@ -3397,8 +3394,7 @@ test_tlsext_serverhello_build(void) | |||
| 3397 | 3394 | ||
| 3398 | /* Turn a few things on so we get extensions... */ | 3395 | /* Turn a few things on so we get extensions... */ |
| 3399 | ssl->s3->send_connection_binding = 1; | 3396 | ssl->s3->send_connection_binding = 1; |
| 3400 | ssl->s3->hs.cipher = | 3397 | ssl->s3->hs.cipher = ssl3_get_cipher_by_value(0xc027); |
| 3401 | ssl3_get_cipher_by_id(TLS1_CK_ECDHE_RSA_WITH_AES_128_SHA256); | ||
| 3402 | ssl->tlsext_status_expected = 1; | 3398 | ssl->tlsext_status_expected = 1; |
| 3403 | ssl->tlsext_ticket_expected = 1; | 3399 | ssl->tlsext_ticket_expected = 1; |
| 3404 | if ((ssl->session->tlsext_ecpointformatlist = malloc(1)) == NULL) { | 3400 | if ((ssl->session->tlsext_ecpointformatlist = malloc(1)) == NULL) { |
