summaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
authorjsing <>2024-07-22 14:50:45 +0000
committerjsing <>2024-07-22 14:50:45 +0000
commit9d00569d89dbe870d2bc630ceb14e42ee1807ec5 (patch)
tree5cff81d1024cb3a06f953c3066b0a90d96f5a5e9 /src
parent4fbee6b90386fa14be274db8ba947f951bc6de4c (diff)
downloadopenbsd-9d00569d89dbe870d2bc630ceb14e42ee1807ec5.tar.gz
openbsd-9d00569d89dbe870d2bc630ceb14e42ee1807ec5.tar.bz2
openbsd-9d00569d89dbe870d2bc630ceb14e42ee1807ec5.zip
Revise regress to match cipher suite values change.
Diffstat (limited to 'src')
-rw-r--r--src/regress/lib/libssl/asn1/asn1test.c18
-rw-r--r--src/regress/lib/libssl/tlsext/tlsexttest.c12
2 files changed, 13 insertions, 17 deletions
diff --git a/src/regress/lib/libssl/asn1/asn1test.c b/src/regress/lib/libssl/asn1/asn1test.c
index 6e9362b3e5..a81c502655 100644
--- a/src/regress/lib/libssl/asn1/asn1test.c
+++ b/src/regress/lib/libssl/asn1/asn1test.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: asn1test.c,v 1.12 2022/11/26 16:08:56 tb Exp $ */ 1/* $OpenBSD: asn1test.c,v 1.13 2024/07/22 14:50:45 jsing Exp $ */
2/* 2/*
3 * Copyright (c) 2014, 2016 Joel Sing <jsing@openbsd.org> 3 * Copyright (c) 2014, 2016 Joel Sing <jsing@openbsd.org>
4 * 4 *
@@ -82,7 +82,7 @@ unsigned char tlsext_tick[] = {
82struct ssl_asn1_test ssl_asn1_tests[] = { 82struct ssl_asn1_test ssl_asn1_tests[] = {
83 { 83 {
84 .session = { 84 .session = {
85 .cipher_id = 0x03000000L | 1, 85 .cipher_value = 1,
86 .ssl_version = TLS1_2_VERSION, 86 .ssl_version = TLS1_2_VERSION,
87 }, 87 },
88 .asn1 = { 88 .asn1 = {
@@ -94,7 +94,7 @@ struct ssl_asn1_test ssl_asn1_tests[] = {
94 }, 94 },
95 { 95 {
96 .session = { 96 .session = {
97 .cipher_id = 0x03000000L | 1, 97 .cipher_value = 1,
98 .ssl_version = TLS1_2_VERSION, 98 .ssl_version = TLS1_2_VERSION,
99 .master_key_length = 26, 99 .master_key_length = 26,
100 .session_id = "0123456789", 100 .session_id = "0123456789",
@@ -119,7 +119,7 @@ struct ssl_asn1_test ssl_asn1_tests[] = {
119 }, 119 },
120 { 120 {
121 .session = { 121 .session = {
122 .cipher_id = 0x03000000L | 1, 122 .cipher_value = 1,
123 .ssl_version = TLS1_2_VERSION, 123 .ssl_version = TLS1_2_VERSION,
124 .master_key_length = 26, 124 .master_key_length = 26,
125 .session_id = "0123456789", 125 .session_id = "0123456789",
@@ -232,7 +232,7 @@ struct ssl_asn1_test ssl_asn1_tests[] = {
232 }, 232 },
233 { 233 {
234 .session = { 234 .session = {
235 .cipher_id = 0x03000000L | 1, 235 .cipher_value = 1,
236 .ssl_version = TLS1_2_VERSION, 236 .ssl_version = TLS1_2_VERSION,
237 .timeout = -1, 237 .timeout = -1,
238 }, 238 },
@@ -243,7 +243,7 @@ struct ssl_asn1_test ssl_asn1_tests[] = {
243 }, 243 },
244 { 244 {
245 .session = { 245 .session = {
246 .cipher_id = 0x03000000L | 1, 246 .cipher_value = 1,
247 .ssl_version = TLS1_2_VERSION, 247 .ssl_version = TLS1_2_VERSION,
248 .time = -1, 248 .time = -1,
249 }, 249 },
@@ -276,9 +276,9 @@ session_cmp(SSL_SESSION *s1, SSL_SESSION *s2)
276 s1->ssl_version, s2->ssl_version); 276 s1->ssl_version, s2->ssl_version);
277 return (1); 277 return (1);
278 } 278 }
279 if (s1->cipher_id != s2->cipher_id) { 279 if (s1->cipher_value != s2->cipher_value) {
280 fprintf(stderr, "cipher_id differs: %ld != %ld\n", 280 fprintf(stderr, "cipher_value differs: %d != %d\n",
281 s1->cipher_id, s2->cipher_id); 281 s1->cipher_value, s2->cipher_value);
282 return (1); 282 return (1);
283 } 283 }
284 284
diff --git a/src/regress/lib/libssl/tlsext/tlsexttest.c b/src/regress/lib/libssl/tlsext/tlsexttest.c
index 18e800031a..d5c8840e24 100644
--- a/src/regress/lib/libssl/tlsext/tlsexttest.c
+++ b/src/regress/lib/libssl/tlsext/tlsexttest.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: tlsexttest.c,v 1.90 2024/03/30 09:53:41 tb Exp $ */ 1/* $OpenBSD: tlsexttest.c,v 1.91 2024/07/22 14:50:45 jsing Exp $ */
2/* 2/*
3 * Copyright (c) 2017 Joel Sing <jsing@openbsd.org> 3 * Copyright (c) 2017 Joel Sing <jsing@openbsd.org>
4 * Copyright (c) 2017 Doug Hogan <doug@openbsd.org> 4 * Copyright (c) 2017 Doug Hogan <doug@openbsd.org>
@@ -1151,9 +1151,7 @@ test_tlsext_ecpf_server(void)
1151 errx(1, "failed to create session"); 1151 errx(1, "failed to create session");
1152 1152
1153 /* Setup the state so we can call needs. */ 1153 /* Setup the state so we can call needs. */
1154 if ((ssl->s3->hs.cipher = 1154 if ((ssl->s3->hs.cipher = ssl3_get_cipher_by_value(0xcca9)) == NULL) {
1155 ssl3_get_cipher_by_id(TLS1_CK_ECDHE_ECDSA_CHACHA20_POLY1305))
1156 == NULL) {
1157 FAIL("server cannot find cipher\n"); 1155 FAIL("server cannot find cipher\n");
1158 goto err; 1156 goto err;
1159 } 1157 }
@@ -3362,8 +3360,7 @@ test_tlsext_serverhello_build(void)
3362 3360
3363 ssl->s3->hs.our_max_tls_version = TLS1_3_VERSION; 3361 ssl->s3->hs.our_max_tls_version = TLS1_3_VERSION;
3364 ssl->s3->hs.negotiated_tls_version = TLS1_3_VERSION; 3362 ssl->s3->hs.negotiated_tls_version = TLS1_3_VERSION;
3365 ssl->s3->hs.cipher = 3363 ssl->s3->hs.cipher = ssl3_get_cipher_by_value(0x003c);
3366 ssl3_get_cipher_by_id(TLS1_CK_RSA_WITH_AES_128_SHA256);
3367 3364
3368 if (!tlsext_server_build(ssl, SSL_TLSEXT_MSG_SH, &cbb)) { 3365 if (!tlsext_server_build(ssl, SSL_TLSEXT_MSG_SH, &cbb)) {
3369 FAIL("failed to build serverhello extensions\n"); 3366 FAIL("failed to build serverhello extensions\n");
@@ -3397,8 +3394,7 @@ test_tlsext_serverhello_build(void)
3397 3394
3398 /* Turn a few things on so we get extensions... */ 3395 /* Turn a few things on so we get extensions... */
3399 ssl->s3->send_connection_binding = 1; 3396 ssl->s3->send_connection_binding = 1;
3400 ssl->s3->hs.cipher = 3397 ssl->s3->hs.cipher = ssl3_get_cipher_by_value(0xc027);
3401 ssl3_get_cipher_by_id(TLS1_CK_ECDHE_RSA_WITH_AES_128_SHA256);
3402 ssl->tlsext_status_expected = 1; 3398 ssl->tlsext_status_expected = 1;
3403 ssl->tlsext_ticket_expected = 1; 3399 ssl->tlsext_ticket_expected = 1;
3404 if ((ssl->session->tlsext_ecpointformatlist = malloc(1)) == NULL) { 3400 if ((ssl->session->tlsext_ecpointformatlist = malloc(1)) == NULL) {