diff options
| author | jsing <> | 2021-03-21 18:37:26 +0000 |
|---|---|---|
| committer | jsing <> | 2021-03-21 18:37:26 +0000 |
| commit | d97146e1be09db01b2006518e8109dfa13762e8d (patch) | |
| tree | 58a6e8bd3484b7cb3f598746ee3ec586dde98f45 /src | |
| parent | 087b119e33251560358cb9d7b82b5f8a17f03031 (diff) | |
| download | openbsd-d97146e1be09db01b2006518e8109dfa13762e8d.tar.gz openbsd-d97146e1be09db01b2006518e8109dfa13762e8d.tar.bz2 openbsd-d97146e1be09db01b2006518e8109dfa13762e8d.zip | |
Revise regress to match handshake struct changes.
Diffstat (limited to 'src')
| -rw-r--r-- | src/regress/lib/libssl/tlsext/tlsexttest.c | 36 |
1 files changed, 18 insertions, 18 deletions
diff --git a/src/regress/lib/libssl/tlsext/tlsexttest.c b/src/regress/lib/libssl/tlsext/tlsexttest.c index e0cba55d8f..562e3edca5 100644 --- a/src/regress/lib/libssl/tlsext/tlsexttest.c +++ b/src/regress/lib/libssl/tlsext/tlsexttest.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: tlsexttest.c,v 1.46 2021/03/10 18:28:01 jsing Exp $ */ | 1 | /* $OpenBSD: tlsexttest.c,v 1.47 2021/03/21 18:37:26 jsing Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2017 Joel Sing <jsing@openbsd.org> | 3 | * Copyright (c) 2017 Joel Sing <jsing@openbsd.org> |
| 4 | * Copyright (c) 2017 Doug Hogan <doug@openbsd.org> | 4 | * Copyright (c) 2017 Doug Hogan <doug@openbsd.org> |
| @@ -3128,10 +3128,10 @@ test_tlsext_keyshare_client(void) | |||
| 3128 | if ((ssl = SSL_new(ssl_ctx)) == NULL) | 3128 | if ((ssl = SSL_new(ssl_ctx)) == NULL) |
| 3129 | errx(1, "failed to create SSL"); | 3129 | errx(1, "failed to create SSL"); |
| 3130 | 3130 | ||
| 3131 | if ((S3I(ssl)->hs_tls13.key_share = | 3131 | if ((S3I(ssl)->hs.tls13.key_share = |
| 3132 | tls13_key_share_new_nid(NID_X25519)) == NULL) | 3132 | tls13_key_share_new_nid(NID_X25519)) == NULL) |
| 3133 | errx(1, "failed to create key share"); | 3133 | errx(1, "failed to create key share"); |
| 3134 | if (!tls13_key_share_generate(S3I(ssl)->hs_tls13.key_share)) | 3134 | if (!tls13_key_share_generate(S3I(ssl)->hs.tls13.key_share)) |
| 3135 | errx(1, "failed to generate key share"); | 3135 | errx(1, "failed to generate key share"); |
| 3136 | 3136 | ||
| 3137 | S3I(ssl)->hs.our_max_tls_version = TLS1_2_VERSION; | 3137 | S3I(ssl)->hs.our_max_tls_version = TLS1_2_VERSION; |
| @@ -3251,14 +3251,14 @@ test_tlsext_keyshare_server(void) | |||
| 3251 | goto done; | 3251 | goto done; |
| 3252 | } | 3252 | } |
| 3253 | 3253 | ||
| 3254 | if ((S3I(ssl)->hs_tls13.key_share = | 3254 | if ((S3I(ssl)->hs.tls13.key_share = |
| 3255 | tls13_key_share_new_nid(NID_X25519)) == NULL) | 3255 | tls13_key_share_new_nid(NID_X25519)) == NULL) |
| 3256 | errx(1, "failed to create key share"); | 3256 | errx(1, "failed to create key share"); |
| 3257 | if (!tls13_key_share_generate(S3I(ssl)->hs_tls13.key_share)) | 3257 | if (!tls13_key_share_generate(S3I(ssl)->hs.tls13.key_share)) |
| 3258 | errx(1, "failed to generate key share"); | 3258 | errx(1, "failed to generate key share"); |
| 3259 | 3259 | ||
| 3260 | CBS_init(&cbs, bogokey, sizeof(bogokey)); | 3260 | CBS_init(&cbs, bogokey, sizeof(bogokey)); |
| 3261 | if (!tls13_key_share_peer_public(S3I(ssl)->hs_tls13.key_share, | 3261 | if (!tls13_key_share_peer_public(S3I(ssl)->hs.tls13.key_share, |
| 3262 | 0x001d, &cbs)) { | 3262 | 0x001d, &cbs)) { |
| 3263 | FAIL("failed to load peer public key\n"); | 3263 | FAIL("failed to load peer public key\n"); |
| 3264 | failure = 1; | 3264 | failure = 1; |
| @@ -3284,10 +3284,10 @@ test_tlsext_keyshare_server(void) | |||
| 3284 | goto done; | 3284 | goto done; |
| 3285 | } | 3285 | } |
| 3286 | 3286 | ||
| 3287 | if ((S3I(ssl)->hs_tls13.key_share = | 3287 | if ((S3I(ssl)->hs.tls13.key_share = |
| 3288 | tls13_key_share_new_nid(NID_X25519)) == NULL) | 3288 | tls13_key_share_new_nid(NID_X25519)) == NULL) |
| 3289 | errx(1, "failed to create key share"); | 3289 | errx(1, "failed to create key share"); |
| 3290 | if (!tls13_key_share_generate(S3I(ssl)->hs_tls13.key_share)) | 3290 | if (!tls13_key_share_generate(S3I(ssl)->hs.tls13.key_share)) |
| 3291 | errx(1, "failed to generate key share"); | 3291 | errx(1, "failed to generate key share"); |
| 3292 | 3292 | ||
| 3293 | CBS_init(&cbs, data, dlen); | 3293 | CBS_init(&cbs, data, dlen); |
| @@ -3357,8 +3357,8 @@ test_tlsext_cookie_client(void) | |||
| 3357 | } | 3357 | } |
| 3358 | 3358 | ||
| 3359 | /* Normally would be set by receiving a server cookie in an HRR */ | 3359 | /* Normally would be set by receiving a server cookie in an HRR */ |
| 3360 | S3I(ssl)->hs_tls13.cookie = strdup(cookie); | 3360 | S3I(ssl)->hs.tls13.cookie = strdup(cookie); |
| 3361 | S3I(ssl)->hs_tls13.cookie_len = strlen(cookie); | 3361 | S3I(ssl)->hs.tls13.cookie_len = strlen(cookie); |
| 3362 | 3362 | ||
| 3363 | if (!tlsext_cookie_client_needs(ssl, SSL_TLSEXT_MSG_CH)) { | 3363 | if (!tlsext_cookie_client_needs(ssl, SSL_TLSEXT_MSG_CH)) { |
| 3364 | FAIL("client should need cookie\n"); | 3364 | FAIL("client should need cookie\n"); |
| @@ -3388,7 +3388,7 @@ test_tlsext_cookie_client(void) | |||
| 3388 | 3388 | ||
| 3389 | CBS_init(&cbs, data, dlen); | 3389 | CBS_init(&cbs, data, dlen); |
| 3390 | 3390 | ||
| 3391 | /* Checks cookie against what's in the hs_tls13 */ | 3391 | /* Checks cookie against what's in the hs.tls13 */ |
| 3392 | if (!tlsext_cookie_server_parse(ssl, SSL_TLSEXT_MSG_CH, &cbs, &alert)) { | 3392 | if (!tlsext_cookie_server_parse(ssl, SSL_TLSEXT_MSG_CH, &cbs, &alert)) { |
| 3393 | FAIL("failed to parse client cookie\n"); | 3393 | FAIL("failed to parse client cookie\n"); |
| 3394 | failure = 1; | 3394 | failure = 1; |
| @@ -3444,8 +3444,8 @@ test_tlsext_cookie_server(void) | |||
| 3444 | } | 3444 | } |
| 3445 | 3445 | ||
| 3446 | /* Normally would be set by server before sending HRR */ | 3446 | /* Normally would be set by server before sending HRR */ |
| 3447 | S3I(ssl)->hs_tls13.cookie = strdup(cookie); | 3447 | S3I(ssl)->hs.tls13.cookie = strdup(cookie); |
| 3448 | S3I(ssl)->hs_tls13.cookie_len = strlen(cookie); | 3448 | S3I(ssl)->hs.tls13.cookie_len = strlen(cookie); |
| 3449 | 3449 | ||
| 3450 | if (!tlsext_cookie_server_needs(ssl, SSL_TLSEXT_MSG_SH)) { | 3450 | if (!tlsext_cookie_server_needs(ssl, SSL_TLSEXT_MSG_SH)) { |
| 3451 | FAIL("server should need cookie\n"); | 3451 | FAIL("server should need cookie\n"); |
| @@ -3481,9 +3481,9 @@ test_tlsext_cookie_server(void) | |||
| 3481 | goto done; | 3481 | goto done; |
| 3482 | } | 3482 | } |
| 3483 | 3483 | ||
| 3484 | freezero(S3I(ssl)->hs_tls13.cookie, S3I(ssl)->hs_tls13.cookie_len); | 3484 | freezero(S3I(ssl)->hs.tls13.cookie, S3I(ssl)->hs.tls13.cookie_len); |
| 3485 | S3I(ssl)->hs_tls13.cookie = NULL; | 3485 | S3I(ssl)->hs.tls13.cookie = NULL; |
| 3486 | S3I(ssl)->hs_tls13.cookie_len = 0; | 3486 | S3I(ssl)->hs.tls13.cookie_len = 0; |
| 3487 | 3487 | ||
| 3488 | if (!tlsext_cookie_client_parse(ssl, SSL_TLSEXT_MSG_SH, &cbs, &alert)) { | 3488 | if (!tlsext_cookie_client_parse(ssl, SSL_TLSEXT_MSG_SH, &cbs, &alert)) { |
| 3489 | FAIL("failed to parse server cookie\n"); | 3489 | FAIL("failed to parse server cookie\n"); |
| @@ -3491,8 +3491,8 @@ test_tlsext_cookie_server(void) | |||
| 3491 | goto done; | 3491 | goto done; |
| 3492 | } | 3492 | } |
| 3493 | 3493 | ||
| 3494 | if (memcmp(cookie, S3I(ssl)->hs_tls13.cookie, | 3494 | if (memcmp(cookie, S3I(ssl)->hs.tls13.cookie, |
| 3495 | S3I(ssl)->hs_tls13.cookie_len) != 0) { | 3495 | S3I(ssl)->hs.tls13.cookie_len) != 0) { |
| 3496 | FAIL("parsed server cookie does not match sent cookie\n"); | 3496 | FAIL("parsed server cookie does not match sent cookie\n"); |
| 3497 | failure = 1; | 3497 | failure = 1; |
| 3498 | goto done; | 3498 | goto done; |
