diff options
author | jsing <> | 2024-07-22 14:50:45 +0000 |
---|---|---|
committer | jsing <> | 2024-07-22 14:50:45 +0000 |
commit | 9d00569d89dbe870d2bc630ceb14e42ee1807ec5 (patch) | |
tree | 5cff81d1024cb3a06f953c3066b0a90d96f5a5e9 /src | |
parent | 4fbee6b90386fa14be274db8ba947f951bc6de4c (diff) | |
download | openbsd-9d00569d89dbe870d2bc630ceb14e42ee1807ec5.tar.gz openbsd-9d00569d89dbe870d2bc630ceb14e42ee1807ec5.tar.bz2 openbsd-9d00569d89dbe870d2bc630ceb14e42ee1807ec5.zip |
Revise regress to match cipher suite values change.
Diffstat (limited to 'src')
-rw-r--r-- | src/regress/lib/libssl/asn1/asn1test.c | 18 | ||||
-rw-r--r-- | src/regress/lib/libssl/tlsext/tlsexttest.c | 12 |
2 files changed, 13 insertions, 17 deletions
diff --git a/src/regress/lib/libssl/asn1/asn1test.c b/src/regress/lib/libssl/asn1/asn1test.c index 6e9362b3e5..a81c502655 100644 --- a/src/regress/lib/libssl/asn1/asn1test.c +++ b/src/regress/lib/libssl/asn1/asn1test.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: asn1test.c,v 1.12 2022/11/26 16:08:56 tb Exp $ */ | 1 | /* $OpenBSD: asn1test.c,v 1.13 2024/07/22 14:50:45 jsing Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2014, 2016 Joel Sing <jsing@openbsd.org> | 3 | * Copyright (c) 2014, 2016 Joel Sing <jsing@openbsd.org> |
4 | * | 4 | * |
@@ -82,7 +82,7 @@ unsigned char tlsext_tick[] = { | |||
82 | struct ssl_asn1_test ssl_asn1_tests[] = { | 82 | struct ssl_asn1_test ssl_asn1_tests[] = { |
83 | { | 83 | { |
84 | .session = { | 84 | .session = { |
85 | .cipher_id = 0x03000000L | 1, | 85 | .cipher_value = 1, |
86 | .ssl_version = TLS1_2_VERSION, | 86 | .ssl_version = TLS1_2_VERSION, |
87 | }, | 87 | }, |
88 | .asn1 = { | 88 | .asn1 = { |
@@ -94,7 +94,7 @@ struct ssl_asn1_test ssl_asn1_tests[] = { | |||
94 | }, | 94 | }, |
95 | { | 95 | { |
96 | .session = { | 96 | .session = { |
97 | .cipher_id = 0x03000000L | 1, | 97 | .cipher_value = 1, |
98 | .ssl_version = TLS1_2_VERSION, | 98 | .ssl_version = TLS1_2_VERSION, |
99 | .master_key_length = 26, | 99 | .master_key_length = 26, |
100 | .session_id = "0123456789", | 100 | .session_id = "0123456789", |
@@ -119,7 +119,7 @@ struct ssl_asn1_test ssl_asn1_tests[] = { | |||
119 | }, | 119 | }, |
120 | { | 120 | { |
121 | .session = { | 121 | .session = { |
122 | .cipher_id = 0x03000000L | 1, | 122 | .cipher_value = 1, |
123 | .ssl_version = TLS1_2_VERSION, | 123 | .ssl_version = TLS1_2_VERSION, |
124 | .master_key_length = 26, | 124 | .master_key_length = 26, |
125 | .session_id = "0123456789", | 125 | .session_id = "0123456789", |
@@ -232,7 +232,7 @@ struct ssl_asn1_test ssl_asn1_tests[] = { | |||
232 | }, | 232 | }, |
233 | { | 233 | { |
234 | .session = { | 234 | .session = { |
235 | .cipher_id = 0x03000000L | 1, | 235 | .cipher_value = 1, |
236 | .ssl_version = TLS1_2_VERSION, | 236 | .ssl_version = TLS1_2_VERSION, |
237 | .timeout = -1, | 237 | .timeout = -1, |
238 | }, | 238 | }, |
@@ -243,7 +243,7 @@ struct ssl_asn1_test ssl_asn1_tests[] = { | |||
243 | }, | 243 | }, |
244 | { | 244 | { |
245 | .session = { | 245 | .session = { |
246 | .cipher_id = 0x03000000L | 1, | 246 | .cipher_value = 1, |
247 | .ssl_version = TLS1_2_VERSION, | 247 | .ssl_version = TLS1_2_VERSION, |
248 | .time = -1, | 248 | .time = -1, |
249 | }, | 249 | }, |
@@ -276,9 +276,9 @@ session_cmp(SSL_SESSION *s1, SSL_SESSION *s2) | |||
276 | s1->ssl_version, s2->ssl_version); | 276 | s1->ssl_version, s2->ssl_version); |
277 | return (1); | 277 | return (1); |
278 | } | 278 | } |
279 | if (s1->cipher_id != s2->cipher_id) { | 279 | if (s1->cipher_value != s2->cipher_value) { |
280 | fprintf(stderr, "cipher_id differs: %ld != %ld\n", | 280 | fprintf(stderr, "cipher_value differs: %d != %d\n", |
281 | s1->cipher_id, s2->cipher_id); | 281 | s1->cipher_value, s2->cipher_value); |
282 | return (1); | 282 | return (1); |
283 | } | 283 | } |
284 | 284 | ||
diff --git a/src/regress/lib/libssl/tlsext/tlsexttest.c b/src/regress/lib/libssl/tlsext/tlsexttest.c index 18e800031a..d5c8840e24 100644 --- a/src/regress/lib/libssl/tlsext/tlsexttest.c +++ b/src/regress/lib/libssl/tlsext/tlsexttest.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: tlsexttest.c,v 1.90 2024/03/30 09:53:41 tb Exp $ */ | 1 | /* $OpenBSD: tlsexttest.c,v 1.91 2024/07/22 14:50:45 jsing Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2017 Joel Sing <jsing@openbsd.org> | 3 | * Copyright (c) 2017 Joel Sing <jsing@openbsd.org> |
4 | * Copyright (c) 2017 Doug Hogan <doug@openbsd.org> | 4 | * Copyright (c) 2017 Doug Hogan <doug@openbsd.org> |
@@ -1151,9 +1151,7 @@ test_tlsext_ecpf_server(void) | |||
1151 | errx(1, "failed to create session"); | 1151 | errx(1, "failed to create session"); |
1152 | 1152 | ||
1153 | /* Setup the state so we can call needs. */ | 1153 | /* Setup the state so we can call needs. */ |
1154 | if ((ssl->s3->hs.cipher = | 1154 | if ((ssl->s3->hs.cipher = ssl3_get_cipher_by_value(0xcca9)) == NULL) { |
1155 | ssl3_get_cipher_by_id(TLS1_CK_ECDHE_ECDSA_CHACHA20_POLY1305)) | ||
1156 | == NULL) { | ||
1157 | FAIL("server cannot find cipher\n"); | 1155 | FAIL("server cannot find cipher\n"); |
1158 | goto err; | 1156 | goto err; |
1159 | } | 1157 | } |
@@ -3362,8 +3360,7 @@ test_tlsext_serverhello_build(void) | |||
3362 | 3360 | ||
3363 | ssl->s3->hs.our_max_tls_version = TLS1_3_VERSION; | 3361 | ssl->s3->hs.our_max_tls_version = TLS1_3_VERSION; |
3364 | ssl->s3->hs.negotiated_tls_version = TLS1_3_VERSION; | 3362 | ssl->s3->hs.negotiated_tls_version = TLS1_3_VERSION; |
3365 | ssl->s3->hs.cipher = | 3363 | ssl->s3->hs.cipher = ssl3_get_cipher_by_value(0x003c); |
3366 | ssl3_get_cipher_by_id(TLS1_CK_RSA_WITH_AES_128_SHA256); | ||
3367 | 3364 | ||
3368 | if (!tlsext_server_build(ssl, SSL_TLSEXT_MSG_SH, &cbb)) { | 3365 | if (!tlsext_server_build(ssl, SSL_TLSEXT_MSG_SH, &cbb)) { |
3369 | FAIL("failed to build serverhello extensions\n"); | 3366 | FAIL("failed to build serverhello extensions\n"); |
@@ -3397,8 +3394,7 @@ test_tlsext_serverhello_build(void) | |||
3397 | 3394 | ||
3398 | /* Turn a few things on so we get extensions... */ | 3395 | /* Turn a few things on so we get extensions... */ |
3399 | ssl->s3->send_connection_binding = 1; | 3396 | ssl->s3->send_connection_binding = 1; |
3400 | ssl->s3->hs.cipher = | 3397 | ssl->s3->hs.cipher = ssl3_get_cipher_by_value(0xc027); |
3401 | ssl3_get_cipher_by_id(TLS1_CK_ECDHE_RSA_WITH_AES_128_SHA256); | ||
3402 | ssl->tlsext_status_expected = 1; | 3398 | ssl->tlsext_status_expected = 1; |
3403 | ssl->tlsext_ticket_expected = 1; | 3399 | ssl->tlsext_ticket_expected = 1; |
3404 | if ((ssl->session->tlsext_ecpointformatlist = malloc(1)) == NULL) { | 3400 | if ((ssl->session->tlsext_ecpointformatlist = malloc(1)) == NULL) { |