diff options
-rw-r--r-- | src/lib/libssl/s3_lib.c | 4 | ||||
-rw-r--r-- | src/lib/libssl/ssl_versions.c | 12 | ||||
-rw-r--r-- | src/regress/lib/libssl/Makefile | 6 | ||||
-rw-r--r-- | src/regress/lib/libssl/interop/version/Makefile | 4 | ||||
-rw-r--r-- | src/regress/lib/libssl/ssl/ssltest.c | 16 | ||||
-rw-r--r-- | src/regress/lib/libssl/ssl/testssl | 36 | ||||
-rw-r--r-- | src/regress/lib/libssl/tls/tlstest.c | 78 | ||||
-rw-r--r-- | src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py | 43 | ||||
-rw-r--r-- | src/regress/lib/libssl/unit/ssl_versions.c | 68 |
9 files changed, 106 insertions, 161 deletions
diff --git a/src/lib/libssl/s3_lib.c b/src/lib/libssl/s3_lib.c index 37ca7bd113..7561060120 100644 --- a/src/lib/libssl/s3_lib.c +++ b/src/lib/libssl/s3_lib.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: s3_lib.c,v 1.244 2023/05/26 13:44:05 tb Exp $ */ | 1 | /* $OpenBSD: s3_lib.c,v 1.245 2023/07/02 17:21:32 beck Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -1672,7 +1672,7 @@ ssl3_clear(SSL *s) | |||
1672 | s->s3->in_read_app_data = 0; | 1672 | s->s3->in_read_app_data = 0; |
1673 | 1673 | ||
1674 | s->packet_length = 0; | 1674 | s->packet_length = 0; |
1675 | s->version = TLS1_VERSION; | 1675 | s->version = TLS1_2_VERSION; |
1676 | 1676 | ||
1677 | s->s3->hs.state = SSL_ST_BEFORE|((s->server) ? SSL_ST_ACCEPT : SSL_ST_CONNECT); | 1677 | s->s3->hs.state = SSL_ST_BEFORE|((s->server) ? SSL_ST_ACCEPT : SSL_ST_CONNECT); |
1678 | } | 1678 | } |
diff --git a/src/lib/libssl/ssl_versions.c b/src/lib/libssl/ssl_versions.c index fbc0004f4b..8273546062 100644 --- a/src/lib/libssl/ssl_versions.c +++ b/src/lib/libssl/ssl_versions.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ssl_versions.c,v 1.26 2022/11/26 16:08:56 tb Exp $ */ | 1 | /* $OpenBSD: ssl_versions.c,v 1.27 2023/07/02 17:21:32 beck Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2016, 2017 Joel Sing <jsing@openbsd.org> | 3 | * Copyright (c) 2016, 2017 Joel Sing <jsing@openbsd.org> |
4 | * | 4 | * |
@@ -150,11 +150,7 @@ ssl_enabled_tls_version_range(SSL *s, uint16_t *min_ver, uint16_t *max_ver) | |||
150 | options |= SSL_OP_NO_TLSv1 | SSL_OP_NO_TLSv1_2; | 150 | options |= SSL_OP_NO_TLSv1 | SSL_OP_NO_TLSv1_2; |
151 | } | 151 | } |
152 | 152 | ||
153 | if ((options & SSL_OP_NO_TLSv1) == 0) | 153 | if ((options & SSL_OP_NO_TLSv1_2) == 0) |
154 | min_version = TLS1_VERSION; | ||
155 | else if ((options & SSL_OP_NO_TLSv1_1) == 0) | ||
156 | min_version = TLS1_1_VERSION; | ||
157 | else if ((options & SSL_OP_NO_TLSv1_2) == 0) | ||
158 | min_version = TLS1_2_VERSION; | 154 | min_version = TLS1_2_VERSION; |
159 | else if ((options & SSL_OP_NO_TLSv1_3) == 0) | 155 | else if ((options & SSL_OP_NO_TLSv1_3) == 0) |
160 | min_version = TLS1_3_VERSION; | 156 | min_version = TLS1_3_VERSION; |
@@ -162,10 +158,6 @@ ssl_enabled_tls_version_range(SSL *s, uint16_t *min_ver, uint16_t *max_ver) | |||
162 | if ((options & SSL_OP_NO_TLSv1_3) && min_version < TLS1_3_VERSION) | 158 | if ((options & SSL_OP_NO_TLSv1_3) && min_version < TLS1_3_VERSION) |
163 | max_version = TLS1_2_VERSION; | 159 | max_version = TLS1_2_VERSION; |
164 | if ((options & SSL_OP_NO_TLSv1_2) && min_version < TLS1_2_VERSION) | 160 | if ((options & SSL_OP_NO_TLSv1_2) && min_version < TLS1_2_VERSION) |
165 | max_version = TLS1_1_VERSION; | ||
166 | if ((options & SSL_OP_NO_TLSv1_1) && min_version < TLS1_1_VERSION) | ||
167 | max_version = TLS1_VERSION; | ||
168 | if ((options & SSL_OP_NO_TLSv1) && min_version < TLS1_VERSION) | ||
169 | max_version = 0; | 161 | max_version = 0; |
170 | 162 | ||
171 | /* Everything has been disabled... */ | 163 | /* Everything has been disabled... */ |
diff --git a/src/regress/lib/libssl/Makefile b/src/regress/lib/libssl/Makefile index bae1248ab1..f9919404f2 100644 --- a/src/regress/lib/libssl/Makefile +++ b/src/regress/lib/libssl/Makefile | |||
@@ -1,11 +1,11 @@ | |||
1 | # $OpenBSD: Makefile,v 1.51 2022/11/05 21:58:24 jsing Exp $ | 1 | # $OpenBSD: Makefile,v 1.52 2023/07/02 17:21:32 beck Exp $ |
2 | 2 | ||
3 | SUBDIR += api | 3 | SUBDIR += api |
4 | SUBDIR += asn1 | 4 | SUBDIR += asn1 |
5 | SUBDIR += buffer | 5 | SUBDIR += buffer |
6 | SUBDIR += bytestring | 6 | SUBDIR += bytestring |
7 | SUBDIR += ciphers | 7 | SUBDIR += ciphers |
8 | SUBDIR += client | 8 | #SUBDIR += client |
9 | SUBDIR += dtls | 9 | SUBDIR += dtls |
10 | SUBDIR += exporter | 10 | SUBDIR += exporter |
11 | SUBDIR += handshake | 11 | SUBDIR += handshake |
@@ -13,7 +13,7 @@ SUBDIR += pqueue | |||
13 | SUBDIR += quic | 13 | SUBDIR += quic |
14 | SUBDIR += record | 14 | SUBDIR += record |
15 | SUBDIR += record_layer | 15 | SUBDIR += record_layer |
16 | SUBDIR += server | 16 | #SUBDIR += server |
17 | SUBDIR += ssl | 17 | SUBDIR += ssl |
18 | SUBDIR += tls | 18 | SUBDIR += tls |
19 | SUBDIR += tlsext | 19 | SUBDIR += tlsext |
diff --git a/src/regress/lib/libssl/interop/version/Makefile b/src/regress/lib/libssl/interop/version/Makefile index 9d0ae418ba..c4f7705d63 100644 --- a/src/regress/lib/libssl/interop/version/Makefile +++ b/src/regress/lib/libssl/interop/version/Makefile | |||
@@ -1,4 +1,4 @@ | |||
1 | # $OpenBSD: Makefile,v 1.6 2023/04/19 15:34:23 tb Exp $ | 1 | # $OpenBSD: Makefile,v 1.7 2023/07/02 17:21:32 beck Exp $ |
2 | 2 | ||
3 | # Connect a client to a server. Both can be current libressl, or | 3 | # Connect a client to a server. Both can be current libressl, or |
4 | # openssl 1.1 or openssl 3.0. Pin client or server to a fixed TLS | 4 | # openssl 1.1 or openssl 3.0. Pin client or server to a fixed TLS |
@@ -14,7 +14,7 @@ LIBRARIES += openssl11 | |||
14 | LIBRARIES += openssl30 | 14 | LIBRARIES += openssl30 |
15 | .endif | 15 | .endif |
16 | 16 | ||
17 | VERSIONS = any TLS1 TLS1_1 TLS1_2 TLS1_3 | 17 | VERSIONS = any TLS1_2 TLS1_3 |
18 | 18 | ||
19 | .for cver in ${VERSIONS} | 19 | .for cver in ${VERSIONS} |
20 | .for sver in ${VERSIONS} | 20 | .for sver in ${VERSIONS} |
diff --git a/src/regress/lib/libssl/ssl/ssltest.c b/src/regress/lib/libssl/ssl/ssltest.c index b4b10446e6..6b8e243073 100644 --- a/src/regress/lib/libssl/ssl/ssltest.c +++ b/src/regress/lib/libssl/ssl/ssltest.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ssltest.c,v 1.39 2023/04/15 16:50:05 tb Exp $ */ | 1 | /* $OpenBSD: ssltest.c,v 1.40 2023/07/02 17:21:32 beck Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -336,7 +336,7 @@ sv_usage(void) | |||
336 | fprintf(stderr, " -dhe1024dsa - use 1024 bit key (with 160-bit subprime) for DHE\n"); | 336 | fprintf(stderr, " -dhe1024dsa - use 1024 bit key (with 160-bit subprime) for DHE\n"); |
337 | fprintf(stderr, " -no_dhe - disable DHE\n"); | 337 | fprintf(stderr, " -no_dhe - disable DHE\n"); |
338 | fprintf(stderr, " -no_ecdhe - disable ECDHE\n"); | 338 | fprintf(stderr, " -no_ecdhe - disable ECDHE\n"); |
339 | fprintf(stderr, " -dtls1 - use DTLSv1\n"); | 339 | fprintf(stderr, " -dtls1_2 - use DTLSv1.2\n"); |
340 | fprintf(stderr, " -tls1 - use TLSv1\n"); | 340 | fprintf(stderr, " -tls1 - use TLSv1\n"); |
341 | fprintf(stderr, " -tls1_2 - use TLSv1.2\n"); | 341 | fprintf(stderr, " -tls1_2 - use TLSv1.2\n"); |
342 | fprintf(stderr, " -CApath arg - PEM format directory of CA's\n"); | 342 | fprintf(stderr, " -CApath arg - PEM format directory of CA's\n"); |
@@ -409,7 +409,7 @@ main(int argc, char *argv[]) | |||
409 | int badop = 0; | 409 | int badop = 0; |
410 | int bio_pair = 0; | 410 | int bio_pair = 0; |
411 | int force = 0; | 411 | int force = 0; |
412 | int tls1 = 0, tls1_2 = 0, dtls1 = 0, ret = 1; | 412 | int tls1 = 0, tls1_2 = 0, dtls1_2 = 0, ret = 1; |
413 | int client_auth = 0; | 413 | int client_auth = 0; |
414 | int server_auth = 0, i; | 414 | int server_auth = 0, i; |
415 | char *app_verify_arg = "Test Callback Argument"; | 415 | char *app_verify_arg = "Test Callback Argument"; |
@@ -464,8 +464,8 @@ main(int argc, char *argv[]) | |||
464 | no_dhe = 1; | 464 | no_dhe = 1; |
465 | else if (strcmp(*argv, "-no_ecdhe") == 0) | 465 | else if (strcmp(*argv, "-no_ecdhe") == 0) |
466 | no_ecdhe = 1; | 466 | no_ecdhe = 1; |
467 | else if (strcmp(*argv, "-dtls1") == 0) | 467 | else if (strcmp(*argv, "-dtls1_2") == 0) |
468 | dtls1 = 1; | 468 | dtls1_2 = 1; |
469 | else if (strcmp(*argv, "-tls1") == 0) | 469 | else if (strcmp(*argv, "-tls1") == 0) |
470 | tls1 = 1; | 470 | tls1 = 1; |
471 | else if (strcmp(*argv, "-tls1_2") == 0) | 471 | else if (strcmp(*argv, "-tls1_2") == 0) |
@@ -565,7 +565,7 @@ bad: | |||
565 | goto end; | 565 | goto end; |
566 | } | 566 | } |
567 | 567 | ||
568 | if (!dtls1 && !tls1 && !tls1_2 && number > 1 && !reuse && !force) { | 568 | if (!dtls1_2 && !tls1 && !tls1_2 && number > 1 && !reuse && !force) { |
569 | fprintf(stderr, | 569 | fprintf(stderr, |
570 | "This case cannot work. Use -f to perform " | 570 | "This case cannot work. Use -f to perform " |
571 | "the test anyway (and\n-d to see what happens), " | 571 | "the test anyway (and\n-d to see what happens), " |
@@ -588,8 +588,8 @@ bad: | |||
588 | SSL_library_init(); | 588 | SSL_library_init(); |
589 | SSL_load_error_strings(); | 589 | SSL_load_error_strings(); |
590 | 590 | ||
591 | if (dtls1) | 591 | if (dtls1_2) |
592 | meth = DTLSv1_method(); | 592 | meth = DTLSv1_2_method(); |
593 | else if (tls1) | 593 | else if (tls1) |
594 | meth = TLSv1_method(); | 594 | meth = TLSv1_method(); |
595 | else if (tls1_2) | 595 | else if (tls1_2) |
diff --git a/src/regress/lib/libssl/ssl/testssl b/src/regress/lib/libssl/ssl/testssl index 43efaa6460..70db1752b7 100644 --- a/src/regress/lib/libssl/ssl/testssl +++ b/src/regress/lib/libssl/ssl/testssl | |||
@@ -95,8 +95,7 @@ done | |||
95 | if $openssl no-dh; then | 95 | if $openssl no-dh; then |
96 | echo skipping anonymous DH tests | 96 | echo skipping anonymous DH tests |
97 | else | 97 | else |
98 | echo test tls1 with 1024bit anonymous DH, multiple handshakes | 98 | echo skipping tls1 tests. |
99 | $ssltest -v -bio_pair -tls1 -cipher ADH -dhe1024dsa -num 10 -f -time $extra || exit 1 | ||
100 | fi | 99 | fi |
101 | 100 | ||
102 | #if $openssl no-rsa; then | 101 | #if $openssl no-rsa; then |
@@ -117,17 +116,16 @@ fi | |||
117 | # DTLS tests | 116 | # DTLS tests |
118 | # | 117 | # |
119 | 118 | ||
120 | echo test dtlsv1 | 119 | $ssltest -dtls1_2 $extra || exit 1 |
121 | $ssltest -dtls1 $extra || exit 1 | ||
122 | 120 | ||
123 | echo test dtlsv1 with server authentication | 121 | echo test dtlsv1_2 with server authentication |
124 | $ssltest -dtls1 -server_auth $CA $extra || exit 1 | 122 | $ssltest -dtls1_2 -server_auth $CA $extra || exit 1 |
125 | 123 | ||
126 | echo test dtlsv1 with client authentication | 124 | echo test dtlsv1_2 with client authentication |
127 | $ssltest -dtls1 -client_auth $CA $extra || exit 1 | 125 | $ssltest -dtls1_2 -client_auth $CA $extra || exit 1 |
128 | 126 | ||
129 | echo test dtlsv1 with both client and server authentication | 127 | echo test dtlsv1_2 with both client and server authentication |
130 | $ssltest -dtls1 -server_auth -client_auth $CA $extra || exit 1 | 128 | $ssltest -dtls1_2 -server_auth -client_auth $CA $extra || exit 1 |
131 | 129 | ||
132 | echo "Testing DTLS ciphersuites" | 130 | echo "Testing DTLS ciphersuites" |
133 | for protocol in SSLv3; do | 131 | for protocol in SSLv3; do |
@@ -136,7 +134,7 @@ for protocol in SSLv3; do | |||
136 | awk "/ $protocol / { print \\$1 }" | | 134 | awk "/ $protocol / { print \\$1 }" | |
137 | grep -v RC4`; do | 135 | grep -v RC4`; do |
138 | echo "Testing $cipher" | 136 | echo "Testing $cipher" |
139 | $ssltest -cipher $cipher -dtls1 | 137 | $ssltest -cipher $cipher -dtls1_2 |
140 | if [ $? -ne 0 ] ; then | 138 | if [ $? -ne 0 ] ; then |
141 | echo "Failed $cipher" | 139 | echo "Failed $cipher" |
142 | exit 1 | 140 | exit 1 |
@@ -148,17 +146,17 @@ done | |||
148 | # ALPN tests | 146 | # ALPN tests |
149 | # | 147 | # |
150 | echo "Testing ALPN..." | 148 | echo "Testing ALPN..." |
151 | $ssltest -bio_pair -tls1 -alpn_client foo -alpn_server bar || exit 1 | 149 | $ssltest -bio_pair -alpn_client foo -alpn_server bar || exit 1 |
152 | $ssltest -bio_pair -tls1 -alpn_client foo -alpn_server foo \ | 150 | $ssltest -bio_pair -alpn_client foo -alpn_server foo \ |
153 | -alpn_expected foo || exit 1 | 151 | -alpn_expected foo || exit 1 |
154 | $ssltest -bio_pair -tls1 -alpn_client foo,bar -alpn_server foo \ | 152 | $ssltest -bio_pair -alpn_client foo,bar -alpn_server foo \ |
155 | -alpn_expected foo || exit 1 | 153 | -alpn_expected foo || exit 1 |
156 | $ssltest -bio_pair -tls1 -alpn_client bar,foo -alpn_server foo \ | 154 | $ssltest -bio_pair -alpn_client bar,foo -alpn_server foo \ |
157 | -alpn_expected foo || exit 1 | 155 | -alpn_expected foo || exit 1 |
158 | $ssltest -bio_pair -tls1 -alpn_client bar,foo -alpn_server foo,bar \ | 156 | $ssltest -bio_pair -alpn_client bar,foo -alpn_server foo,bar \ |
159 | -alpn_expected foo || exit 1 | 157 | -alpn_expected foo || exit 1 |
160 | $ssltest -bio_pair -tls1 -alpn_client bar,foo -alpn_server bar,foo \ | 158 | $ssltest -bio_pair -alpn_client bar,foo -alpn_server bar,foo \ |
161 | -alpn_expected bar || exit 1 | 159 | -alpn_expected bar || exit 1 |
162 | $ssltest -bio_pair -tls1 -alpn_client foo,bar -alpn_server bar,foo \ | 160 | $ssltest -bio_pair -alpn_client foo,bar -alpn_server bar,foo \ |
163 | -alpn_expected bar || exit 1 | 161 | -alpn_expected bar || exit 1 |
164 | $ssltest -bio_pair -tls1 -alpn_client baz -alpn_server bar,foo || exit 1 | 162 | $ssltest -bio_pair -alpn_client baz -alpn_server bar,foo || exit 1 |
diff --git a/src/regress/lib/libssl/tls/tlstest.c b/src/regress/lib/libssl/tls/tlstest.c index 5c72717e6e..8154e7576c 100644 --- a/src/regress/lib/libssl/tls/tlstest.c +++ b/src/regress/lib/libssl/tls/tlstest.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: tlstest.c,v 1.1 2021/10/23 14:34:10 jsing Exp $ */ | 1 | /* $OpenBSD: tlstest.c,v 1.2 2023/07/02 17:21:33 beck Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2020, 2021 Joel Sing <jsing@openbsd.org> | 3 | * Copyright (c) 2020, 2021 Joel Sing <jsing@openbsd.org> |
4 | * | 4 | * |
@@ -245,14 +245,6 @@ static const struct tls_test tls_tests[] = { | |||
245 | .server_max_version = TLS1_2_VERSION, | 245 | .server_max_version = TLS1_2_VERSION, |
246 | }, | 246 | }, |
247 | { | 247 | { |
248 | .desc = "Default client and TLSv1.1 server", | ||
249 | .server_max_version = TLS1_1_VERSION, | ||
250 | }, | ||
251 | { | ||
252 | .desc = "Default client and TLSv1.0 server", | ||
253 | .server_max_version = TLS1_VERSION, | ||
254 | }, | ||
255 | { | ||
256 | .desc = "Default client and default server with ECDHE KEX", | 248 | .desc = "Default client and default server with ECDHE KEX", |
257 | .server_ciphers = "ECDHE-RSA-AES128-SHA", | 249 | .server_ciphers = "ECDHE-RSA-AES128-SHA", |
258 | }, | 250 | }, |
@@ -262,16 +254,6 @@ static const struct tls_test tls_tests[] = { | |||
262 | .server_ciphers = "ECDHE-RSA-AES128-SHA", | 254 | .server_ciphers = "ECDHE-RSA-AES128-SHA", |
263 | }, | 255 | }, |
264 | { | 256 | { |
265 | .desc = "Default client and TLSv1.1 server with ECDHE KEX", | ||
266 | .server_max_version = TLS1_1_VERSION, | ||
267 | .server_ciphers = "ECDHE-RSA-AES128-SHA", | ||
268 | }, | ||
269 | { | ||
270 | .desc = "Default client and TLSv1.0 server with ECDHE KEX", | ||
271 | .server_max_version = TLS1_VERSION, | ||
272 | .server_ciphers = "ECDHE-RSA-AES128-SHA", | ||
273 | }, | ||
274 | { | ||
275 | .desc = "Default client and default server with DHE KEX", | 257 | .desc = "Default client and default server with DHE KEX", |
276 | .server_ciphers = "DHE-RSA-AES128-SHA", | 258 | .server_ciphers = "DHE-RSA-AES128-SHA", |
277 | }, | 259 | }, |
@@ -281,16 +263,6 @@ static const struct tls_test tls_tests[] = { | |||
281 | .server_ciphers = "DHE-RSA-AES128-SHA", | 263 | .server_ciphers = "DHE-RSA-AES128-SHA", |
282 | }, | 264 | }, |
283 | { | 265 | { |
284 | .desc = "Default client and TLSv1.1 server with DHE KEX", | ||
285 | .server_max_version = TLS1_1_VERSION, | ||
286 | .server_ciphers = "DHE-RSA-AES128-SHA", | ||
287 | }, | ||
288 | { | ||
289 | .desc = "Default client and TLSv1.0 server with DHE KEX", | ||
290 | .server_max_version = TLS1_VERSION, | ||
291 | .server_ciphers = "DHE-RSA-AES128-SHA", | ||
292 | }, | ||
293 | { | ||
294 | .desc = "Default client and default server with RSA KEX", | 266 | .desc = "Default client and default server with RSA KEX", |
295 | .server_ciphers = "AES128-SHA", | 267 | .server_ciphers = "AES128-SHA", |
296 | }, | 268 | }, |
@@ -300,72 +272,24 @@ static const struct tls_test tls_tests[] = { | |||
300 | .server_ciphers = "AES128-SHA", | 272 | .server_ciphers = "AES128-SHA", |
301 | }, | 273 | }, |
302 | { | 274 | { |
303 | .desc = "Default client and TLSv1.1 server with RSA KEX", | ||
304 | .server_max_version = TLS1_1_VERSION, | ||
305 | .server_ciphers = "AES128-SHA", | ||
306 | }, | ||
307 | { | ||
308 | .desc = "Default client and TLSv1.0 server with RSA KEX", | ||
309 | .server_max_version = TLS1_VERSION, | ||
310 | .server_ciphers = "AES128-SHA", | ||
311 | }, | ||
312 | { | ||
313 | .desc = "TLSv1.2 client and default server", | 275 | .desc = "TLSv1.2 client and default server", |
314 | .client_max_version = TLS1_2_VERSION, | 276 | .client_max_version = TLS1_2_VERSION, |
315 | }, | 277 | }, |
316 | { | 278 | { |
317 | .desc = "TLSv1.1 client and default server", | ||
318 | .client_max_version = TLS1_1_VERSION, | ||
319 | }, | ||
320 | { | ||
321 | .desc = "TLSv1.0 client and default server", | ||
322 | .client_max_version = TLS1_VERSION, | ||
323 | }, | ||
324 | { | ||
325 | .desc = "TLSv1.2 client and default server with ECDHE KEX", | 279 | .desc = "TLSv1.2 client and default server with ECDHE KEX", |
326 | .client_max_version = TLS1_2_VERSION, | 280 | .client_max_version = TLS1_2_VERSION, |
327 | .client_ciphers = "ECDHE-RSA-AES128-SHA", | 281 | .client_ciphers = "ECDHE-RSA-AES128-SHA", |
328 | }, | 282 | }, |
329 | { | 283 | { |
330 | .desc = "TLSv1.1 client and default server with ECDHE KEX", | ||
331 | .client_max_version = TLS1_1_VERSION, | ||
332 | .client_ciphers = "ECDHE-RSA-AES128-SHA", | ||
333 | }, | ||
334 | { | ||
335 | .desc = "TLSv1.0 client and default server with ECDHE KEX", | ||
336 | .client_max_version = TLS1_VERSION, | ||
337 | .client_ciphers = "ECDHE-RSA-AES128-SHA", | ||
338 | }, | ||
339 | { | ||
340 | .desc = "TLSv1.2 client and default server with DHE KEX", | 284 | .desc = "TLSv1.2 client and default server with DHE KEX", |
341 | .server_max_version = TLS1_2_VERSION, | 285 | .server_max_version = TLS1_2_VERSION, |
342 | .client_ciphers = "DHE-RSA-AES128-SHA", | 286 | .client_ciphers = "DHE-RSA-AES128-SHA", |
343 | }, | 287 | }, |
344 | { | 288 | { |
345 | .desc = "TLSv1.1 client and default server with DHE KEX", | ||
346 | .client_max_version = TLS1_1_VERSION, | ||
347 | .client_ciphers = "DHE-RSA-AES128-SHA", | ||
348 | }, | ||
349 | { | ||
350 | .desc = "TLSv1.0 client and default server with DHE KEX", | ||
351 | .client_max_version = TLS1_VERSION, | ||
352 | .client_ciphers = "DHE-RSA-AES128-SHA", | ||
353 | }, | ||
354 | { | ||
355 | .desc = "TLSv1.2 client and default server with RSA KEX", | 289 | .desc = "TLSv1.2 client and default server with RSA KEX", |
356 | .client_max_version = TLS1_2_VERSION, | 290 | .client_max_version = TLS1_2_VERSION, |
357 | .client_ciphers = "AES128-SHA", | 291 | .client_ciphers = "AES128-SHA", |
358 | }, | 292 | }, |
359 | { | ||
360 | .desc = "TLSv1.1 client and default server with RSA KEX", | ||
361 | .client_max_version = TLS1_1_VERSION, | ||
362 | .client_ciphers = "AES128-SHA", | ||
363 | }, | ||
364 | { | ||
365 | .desc = "TLSv1.0 client and default server with RSA KEX", | ||
366 | .client_max_version = TLS1_VERSION, | ||
367 | .client_ciphers = "AES128-SHA", | ||
368 | }, | ||
369 | }; | 293 | }; |
370 | 294 | ||
371 | #define N_TLS_TESTS (sizeof(tls_tests) / sizeof(*tls_tests)) | 295 | #define N_TLS_TESTS (sizeof(tls_tests) / sizeof(*tls_tests)) |
diff --git a/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py b/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py index 2953320c1d..aa7e384e1f 100644 --- a/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py +++ b/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py | |||
@@ -1,4 +1,4 @@ | |||
1 | # $OpenBSD: tlsfuzzer.py,v 1.49 2023/06/10 05:00:58 tb Exp $ | 1 | # $OpenBSD: tlsfuzzer.py,v 1.50 2023/07/02 17:21:33 beck Exp $ |
2 | # | 2 | # |
3 | # Copyright (c) 2020 Theo Buehler <tb@openbsd.org> | 3 | # Copyright (c) 2020 Theo Buehler <tb@openbsd.org> |
4 | # | 4 | # |
@@ -323,6 +323,8 @@ tls13_unsupported_tests = TestGroup("TLSv1.3 tests for unsupported features", [ | |||
323 | tls12_exclude_legacy_protocols = [ | 323 | tls12_exclude_legacy_protocols = [ |
324 | # all these have BIO_read timeouts against TLSv1.3 | 324 | # all these have BIO_read timeouts against TLSv1.3 |
325 | "-e", "Protocol (3, 0)", | 325 | "-e", "Protocol (3, 0)", |
326 | "-e", "Protocol (3, 1)", | ||
327 | "-e", "Protocol (3, 2)", | ||
326 | "-e", "Protocol (3, 0) in SSLv2 compatible ClientHello", | 328 | "-e", "Protocol (3, 0) in SSLv2 compatible ClientHello", |
327 | # the following only fail with TLSv1.3 | 329 | # the following only fail with TLSv1.3 |
328 | "-e", "Protocol (3, 1) in SSLv2 compatible ClientHello", | 330 | "-e", "Protocol (3, 1) in SSLv2 compatible ClientHello", |
@@ -331,13 +333,20 @@ tls12_exclude_legacy_protocols = [ | |||
331 | "-e", "Protocol (3, 1) with x448 group", | 333 | "-e", "Protocol (3, 1) with x448 group", |
332 | "-e", "Protocol (3, 2) with x448 group", | 334 | "-e", "Protocol (3, 2) with x448 group", |
333 | "-e", "Protocol (3, 3) with x448 group", | 335 | "-e", "Protocol (3, 3) with x448 group", |
336 | # These don't work without TLSv1.0 and TLSv1.1 | ||
337 | "-e", "Protocol (3, 1) with secp256r1 group", | ||
338 | "-e", "Protocol (3, 1) with secp384r1 group", | ||
339 | "-e", "Protocol (3, 1) with secp521r1 group", | ||
340 | "-e", "Protocol (3, 1) with x25519 group", | ||
341 | "-e", "Protocol (3, 2) with secp256r1 group", | ||
342 | "-e", "Protocol (3, 2) with secp384r1 group", | ||
343 | "-e", "Protocol (3, 2) with secp521r1 group", | ||
344 | "-e", "Protocol (3, 2) with x25519 group", | ||
334 | ] | 345 | ] |
335 | 346 | ||
336 | tls12_tests = TestGroup("TLSv1.2 tests", [ | 347 | tls12_tests = TestGroup("TLSv1.2 tests", [ |
337 | # Tests that pass as they are. | 348 | # Tests that pass as they are. |
338 | Test("test-TLSv1_2-rejected-without-TLSv1_2.py"), | ||
339 | Test("test-aes-gcm-nonces.py"), | 349 | Test("test-aes-gcm-nonces.py"), |
340 | Test("test-chacha20.py"), | ||
341 | Test("test-connection-abort.py"), | 350 | Test("test-connection-abort.py"), |
342 | Test("test-conversation.py"), | 351 | Test("test-conversation.py"), |
343 | Test("test-cve-2016-2107.py"), | 352 | Test("test-cve-2016-2107.py"), |
@@ -386,13 +395,30 @@ tls12_tests = TestGroup("TLSv1.2 tests", [ | |||
386 | ] | 395 | ] |
387 | ), | 396 | ), |
388 | Test("test-dhe-key-share-random.py", tls12_exclude_legacy_protocols), | 397 | Test("test-dhe-key-share-random.py", tls12_exclude_legacy_protocols), |
389 | Test("test-export-ciphers-rejected.py", ["--min-ver", "TLSv1.0"]), | 398 | Test("test-export-ciphers-rejected.py", ["--min-ver", "TLSv1.2"]), |
390 | Test( | 399 | Test( |
391 | "test-downgrade-protection.py", | 400 | "test-downgrade-protection.py", |
392 | tls12_args = ["--server-max-protocol", "TLSv1.2"], | 401 | tls12_args = ["--server-max-protocol", "TLSv1.2"], |
393 | tls13_args = ["--server-max-protocol", "TLSv1.3"], | 402 | tls13_args = [ |
403 | "--server-max-protocol", "TLSv1.3", | ||
404 | "-e", "TLS 1.3 downgrade check for Protocol (3, 1)", | ||
405 | "-e", "TLS 1.3 downgrade check for Protocol (3, 2)", | ||
406 | ] | ||
407 | ), | ||
408 | Test( | ||
409 | "test-fallback-scsv.py", | ||
410 | tls13_args = [ | ||
411 | "--tls-1.3", | ||
412 | "-e", "FALLBACK - hello TLSv1.1 - pos 0", | ||
413 | "-e", "FALLBACK - hello TLSv1.1 - pos 1", | ||
414 | "-e", "FALLBACK - hello TLSv1.1 - pos 2", | ||
415 | "-e", "FALLBACK - record TLSv1.1 hello TLSv1.1 - pos 0", | ||
416 | "-e", "FALLBACK - record TLSv1.1 hello TLSv1.1 - pos 1", | ||
417 | "-e", "FALLBACK - record TLSv1.1 hello TLSv1.1 - pos 2", | ||
418 | "-e", "record TLSv1.1 hello TLSv1.1", | ||
419 | "-e", "sanity - TLSv1.1", | ||
420 | ] | ||
394 | ), | 421 | ), |
395 | Test("test-fallback-scsv.py", tls13_args = ["--tls-1.3"] ), | ||
396 | 422 | ||
397 | Test("test-invalid-compression-methods.py", [ | 423 | Test("test-invalid-compression-methods.py", [ |
398 | "-x", "invalid compression methods", | 424 | "-x", "invalid compression methods", |
@@ -412,6 +438,8 @@ tls12_tests = TestGroup("TLSv1.2 tests", [ | |||
412 | Test("test-sig-algs-renegotiation-resumption.py", ["--sig-algs-drop-ok"]), | 438 | Test("test-sig-algs-renegotiation-resumption.py", ["--sig-algs-drop-ok"]), |
413 | 439 | ||
414 | Test("test-serverhello-random.py", args = tls12_exclude_legacy_protocols), | 440 | Test("test-serverhello-random.py", args = tls12_exclude_legacy_protocols), |
441 | |||
442 | Test("test-chacha20.py", [ "-e", "Chacha20 in TLS1.1" ]), | ||
415 | ]) | 443 | ]) |
416 | 444 | ||
417 | tls12_slow_tests = TestGroup("slow TLSv1.2 tests", [ | 445 | tls12_slow_tests = TestGroup("slow TLSv1.2 tests", [ |
@@ -549,6 +577,9 @@ tls12_failing_tests = TestGroup("failing TLSv1.2 tests", [ | |||
549 | 577 | ||
550 | # x448 tests need disabling plus x25519 corner cases need sorting out | 578 | # x448 tests need disabling plus x25519 corner cases need sorting out |
551 | Test("test-x25519.py"), | 579 | Test("test-x25519.py"), |
580 | |||
581 | # Needs TLS 1.0 or 1.1 | ||
582 | Test("test-TLSv1_2-rejected-without-TLSv1_2.py"), | ||
552 | ]) | 583 | ]) |
553 | 584 | ||
554 | tls12_unsupported_tests = TestGroup("TLSv1.2 for unsupported features", [ | 585 | tls12_unsupported_tests = TestGroup("TLSv1.2 for unsupported features", [ |
diff --git a/src/regress/lib/libssl/unit/ssl_versions.c b/src/regress/lib/libssl/unit/ssl_versions.c index 261bed3a7a..ebfe8d2c28 100644 --- a/src/regress/lib/libssl/unit/ssl_versions.c +++ b/src/regress/lib/libssl/unit/ssl_versions.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ssl_versions.c,v 1.19 2022/11/26 16:08:57 tb Exp $ */ | 1 | /* $OpenBSD: ssl_versions.c,v 1.20 2023/07/02 17:21:33 beck Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2016, 2017 Joel Sing <jsing@openbsd.org> | 3 | * Copyright (c) 2016, 2017 Joel Sing <jsing@openbsd.org> |
4 | * | 4 | * |
@@ -32,43 +32,43 @@ static struct version_range_test version_range_tests[] = { | |||
32 | .options = 0, | 32 | .options = 0, |
33 | .minver = TLS1_VERSION, | 33 | .minver = TLS1_VERSION, |
34 | .maxver = TLS1_3_VERSION, | 34 | .maxver = TLS1_3_VERSION, |
35 | .want_minver = TLS1_VERSION, | 35 | .want_minver = TLS1_2_VERSION, |
36 | .want_maxver = TLS1_3_VERSION, | 36 | .want_maxver = TLS1_3_VERSION, |
37 | }, | 37 | }, |
38 | { | 38 | { |
39 | .options = 0, | 39 | .options = 0, |
40 | .minver = TLS1_VERSION, | 40 | .minver = TLS1_VERSION, |
41 | .maxver = TLS1_2_VERSION, | 41 | .maxver = TLS1_2_VERSION, |
42 | .want_minver = TLS1_VERSION, | 42 | .want_minver = TLS1_2_VERSION, |
43 | .want_maxver = TLS1_2_VERSION, | 43 | .want_maxver = TLS1_2_VERSION, |
44 | }, | 44 | }, |
45 | { | 45 | { |
46 | .options = SSL_OP_NO_TLSv1, | 46 | .options = SSL_OP_NO_TLSv1, |
47 | .minver = TLS1_VERSION, | 47 | .minver = TLS1_VERSION, |
48 | .maxver = TLS1_2_VERSION, | 48 | .maxver = TLS1_2_VERSION, |
49 | .want_minver = TLS1_1_VERSION, | 49 | .want_minver = TLS1_2_VERSION, |
50 | .want_maxver = TLS1_2_VERSION, | 50 | .want_maxver = TLS1_2_VERSION, |
51 | }, | 51 | }, |
52 | { | 52 | { |
53 | .options = SSL_OP_NO_TLSv1_3, | 53 | .options = SSL_OP_NO_TLSv1_3, |
54 | .minver = TLS1_VERSION, | 54 | .minver = TLS1_VERSION, |
55 | .maxver = TLS1_3_VERSION, | 55 | .maxver = TLS1_3_VERSION, |
56 | .want_minver = TLS1_VERSION, | 56 | .want_minver = TLS1_2_VERSION, |
57 | .want_maxver = TLS1_2_VERSION, | 57 | .want_maxver = TLS1_2_VERSION, |
58 | }, | 58 | }, |
59 | { | 59 | { |
60 | .options = SSL_OP_NO_TLSv1_2, | 60 | .options = SSL_OP_NO_TLSv1_2, |
61 | .minver = TLS1_VERSION, | 61 | .minver = TLS1_VERSION, |
62 | .maxver = TLS1_2_VERSION, | 62 | .maxver = TLS1_2_VERSION, |
63 | .want_minver = TLS1_VERSION, | 63 | .want_minver = 0, |
64 | .want_maxver = TLS1_1_VERSION, | 64 | .want_maxver = 0, |
65 | }, | 65 | }, |
66 | { | 66 | { |
67 | .options = SSL_OP_NO_TLSv1_1, | 67 | .options = SSL_OP_NO_TLSv1_1, |
68 | .minver = TLS1_VERSION, | 68 | .minver = TLS1_VERSION, |
69 | .maxver = TLS1_2_VERSION, | 69 | .maxver = TLS1_2_VERSION, |
70 | .want_minver = TLS1_VERSION, | 70 | .want_minver = TLS1_2_VERSION, |
71 | .want_maxver = TLS1_VERSION, | 71 | .want_maxver = TLS1_2_VERSION, |
72 | }, | 72 | }, |
73 | { | 73 | { |
74 | .options = SSL_OP_NO_TLSv1 | SSL_OP_NO_TLSv1_1, | 74 | .options = SSL_OP_NO_TLSv1 | SSL_OP_NO_TLSv1_1, |
@@ -81,15 +81,15 @@ static struct version_range_test version_range_tests[] = { | |||
81 | .options = SSL_OP_NO_TLSv1_1 | SSL_OP_NO_TLSv1_2, | 81 | .options = SSL_OP_NO_TLSv1_1 | SSL_OP_NO_TLSv1_2, |
82 | .minver = TLS1_VERSION, | 82 | .minver = TLS1_VERSION, |
83 | .maxver = TLS1_2_VERSION, | 83 | .maxver = TLS1_2_VERSION, |
84 | .want_minver = TLS1_VERSION, | 84 | .want_minver = 0, |
85 | .want_maxver = TLS1_VERSION, | 85 | .want_maxver = 0, |
86 | }, | 86 | }, |
87 | { | 87 | { |
88 | .options = SSL_OP_NO_TLSv1 | SSL_OP_NO_TLSv1_2, | 88 | .options = SSL_OP_NO_TLSv1 | SSL_OP_NO_TLSv1_2, |
89 | .minver = TLS1_VERSION, | 89 | .minver = TLS1_VERSION, |
90 | .maxver = TLS1_2_VERSION, | 90 | .maxver = TLS1_2_VERSION, |
91 | .want_minver = TLS1_1_VERSION, | 91 | .want_minver = 0, |
92 | .want_maxver = TLS1_1_VERSION, | 92 | .want_maxver = 0, |
93 | }, | 93 | }, |
94 | { | 94 | { |
95 | .options = SSL_OP_NO_TLSv1 | SSL_OP_NO_TLSv1_1 | | 95 | .options = SSL_OP_NO_TLSv1 | SSL_OP_NO_TLSv1_1 | |
@@ -119,14 +119,14 @@ static struct version_range_test version_range_tests[] = { | |||
119 | .options = 0, | 119 | .options = 0, |
120 | .minver = TLS1_VERSION, | 120 | .minver = TLS1_VERSION, |
121 | .maxver = TLS1_2_VERSION, | 121 | .maxver = TLS1_2_VERSION, |
122 | .want_minver = TLS1_VERSION, | 122 | .want_minver = TLS1_2_VERSION, |
123 | .want_maxver = TLS1_2_VERSION, | 123 | .want_maxver = TLS1_2_VERSION, |
124 | }, | 124 | }, |
125 | { | 125 | { |
126 | .options = 0, | 126 | .options = 0, |
127 | .minver = TLS1_1_VERSION, | 127 | .minver = TLS1_1_VERSION, |
128 | .maxver = TLS1_2_VERSION, | 128 | .maxver = TLS1_2_VERSION, |
129 | .want_minver = TLS1_1_VERSION, | 129 | .want_minver = TLS1_2_VERSION, |
130 | .want_maxver = TLS1_2_VERSION, | 130 | .want_maxver = TLS1_2_VERSION, |
131 | }, | 131 | }, |
132 | { | 132 | { |
@@ -140,14 +140,14 @@ static struct version_range_test version_range_tests[] = { | |||
140 | .options = 0, | 140 | .options = 0, |
141 | .minver = TLS1_VERSION, | 141 | .minver = TLS1_VERSION, |
142 | .maxver = TLS1_3_VERSION, | 142 | .maxver = TLS1_3_VERSION, |
143 | .want_minver = TLS1_VERSION, | 143 | .want_minver = TLS1_2_VERSION, |
144 | .want_maxver = TLS1_3_VERSION, | 144 | .want_maxver = TLS1_3_VERSION, |
145 | }, | 145 | }, |
146 | { | 146 | { |
147 | .options = 0, | 147 | .options = 0, |
148 | .minver = TLS1_1_VERSION, | 148 | .minver = TLS1_1_VERSION, |
149 | .maxver = TLS1_3_VERSION, | 149 | .maxver = TLS1_3_VERSION, |
150 | .want_minver = TLS1_1_VERSION, | 150 | .want_minver = TLS1_2_VERSION, |
151 | .want_maxver = TLS1_3_VERSION, | 151 | .want_maxver = TLS1_3_VERSION, |
152 | }, | 152 | }, |
153 | { | 153 | { |
@@ -168,15 +168,15 @@ static struct version_range_test version_range_tests[] = { | |||
168 | .options = 0, | 168 | .options = 0, |
169 | .minver = TLS1_VERSION, | 169 | .minver = TLS1_VERSION, |
170 | .maxver = TLS1_1_VERSION, | 170 | .maxver = TLS1_1_VERSION, |
171 | .want_minver = TLS1_VERSION, | 171 | .want_minver = 0, |
172 | .want_maxver = TLS1_1_VERSION, | 172 | .want_maxver = 0, |
173 | }, | 173 | }, |
174 | { | 174 | { |
175 | .options = 0, | 175 | .options = 0, |
176 | .minver = TLS1_VERSION, | 176 | .minver = TLS1_VERSION, |
177 | .maxver = TLS1_VERSION, | 177 | .maxver = TLS1_VERSION, |
178 | .want_minver = TLS1_VERSION, | 178 | .want_minver = 0, |
179 | .want_maxver = TLS1_VERSION, | 179 | .want_maxver = 0, |
180 | }, | 180 | }, |
181 | }; | 181 | }; |
182 | 182 | ||
@@ -276,7 +276,7 @@ static struct shared_version_test shared_version_tests[] = { | |||
276 | .minver = TLS1_VERSION, | 276 | .minver = TLS1_VERSION, |
277 | .maxver = TLS1_2_VERSION, | 277 | .maxver = TLS1_2_VERSION, |
278 | .peerver = TLS1_VERSION, | 278 | .peerver = TLS1_VERSION, |
279 | .want_maxver = TLS1_VERSION, | 279 | .want_maxver = 0, |
280 | }, | 280 | }, |
281 | { | 281 | { |
282 | .ssl_method = TLS_method, | 282 | .ssl_method = TLS_method, |
@@ -284,7 +284,7 @@ static struct shared_version_test shared_version_tests[] = { | |||
284 | .minver = TLS1_VERSION, | 284 | .minver = TLS1_VERSION, |
285 | .maxver = TLS1_2_VERSION, | 285 | .maxver = TLS1_2_VERSION, |
286 | .peerver = TLS1_1_VERSION, | 286 | .peerver = TLS1_1_VERSION, |
287 | .want_maxver = TLS1_1_VERSION, | 287 | .want_maxver = 0, |
288 | }, | 288 | }, |
289 | { | 289 | { |
290 | .ssl_method = TLS_method, | 290 | .ssl_method = TLS_method, |
@@ -316,7 +316,7 @@ static struct shared_version_test shared_version_tests[] = { | |||
316 | .minver = TLS1_VERSION, | 316 | .minver = TLS1_VERSION, |
317 | .maxver = TLS1_2_VERSION, | 317 | .maxver = TLS1_2_VERSION, |
318 | .peerver = TLS1_2_VERSION, | 318 | .peerver = TLS1_2_VERSION, |
319 | .want_maxver = TLS1_1_VERSION, | 319 | .want_maxver = 0, |
320 | }, | 320 | }, |
321 | { | 321 | { |
322 | .ssl_method = TLS_method, | 322 | .ssl_method = TLS_method, |
@@ -324,7 +324,7 @@ static struct shared_version_test shared_version_tests[] = { | |||
324 | .minver = TLS1_VERSION, | 324 | .minver = TLS1_VERSION, |
325 | .maxver = TLS1_2_VERSION, | 325 | .maxver = TLS1_2_VERSION, |
326 | .peerver = TLS1_2_VERSION, | 326 | .peerver = TLS1_2_VERSION, |
327 | .want_maxver = TLS1_VERSION, | 327 | .want_maxver = 0, |
328 | }, | 328 | }, |
329 | { | 329 | { |
330 | .ssl_method = TLS_method, | 330 | .ssl_method = TLS_method, |
@@ -340,7 +340,7 @@ static struct shared_version_test shared_version_tests[] = { | |||
340 | .minver = TLS1_VERSION, | 340 | .minver = TLS1_VERSION, |
341 | .maxver = TLS1_2_VERSION, | 341 | .maxver = TLS1_2_VERSION, |
342 | .peerver = TLS1_1_VERSION, | 342 | .peerver = TLS1_1_VERSION, |
343 | .want_maxver = TLS1_1_VERSION, | 343 | .want_maxver = 0, |
344 | }, | 344 | }, |
345 | { | 345 | { |
346 | .ssl_method = TLS_method, | 346 | .ssl_method = TLS_method, |
@@ -356,7 +356,7 @@ static struct shared_version_test shared_version_tests[] = { | |||
356 | .minver = TLS1_VERSION, | 356 | .minver = TLS1_VERSION, |
357 | .maxver = TLS1_2_VERSION, | 357 | .maxver = TLS1_2_VERSION, |
358 | .peerver = TLS1_1_VERSION, | 358 | .peerver = TLS1_1_VERSION, |
359 | .want_maxver = TLS1_VERSION, | 359 | .want_maxver = 0, |
360 | }, | 360 | }, |
361 | { | 361 | { |
362 | .ssl_method = TLS_method, | 362 | .ssl_method = TLS_method, |
@@ -372,7 +372,7 @@ static struct shared_version_test shared_version_tests[] = { | |||
372 | .minver = TLS1_VERSION, | 372 | .minver = TLS1_VERSION, |
373 | .maxver = TLS1_1_VERSION, | 373 | .maxver = TLS1_1_VERSION, |
374 | .peerver = TLS1_2_VERSION, | 374 | .peerver = TLS1_2_VERSION, |
375 | .want_maxver = TLS1_1_VERSION, | 375 | .want_maxver = 0, |
376 | }, | 376 | }, |
377 | { | 377 | { |
378 | .ssl_method = TLS_method, | 378 | .ssl_method = TLS_method, |
@@ -380,7 +380,7 @@ static struct shared_version_test shared_version_tests[] = { | |||
380 | .minver = TLS1_VERSION, | 380 | .minver = TLS1_VERSION, |
381 | .maxver = TLS1_VERSION, | 381 | .maxver = TLS1_VERSION, |
382 | .peerver = TLS1_2_VERSION, | 382 | .peerver = TLS1_2_VERSION, |
383 | .want_maxver = TLS1_VERSION, | 383 | .want_maxver = 0, |
384 | }, | 384 | }, |
385 | { | 385 | { |
386 | .ssl_method = TLSv1_method, | 386 | .ssl_method = TLSv1_method, |
@@ -388,7 +388,7 @@ static struct shared_version_test shared_version_tests[] = { | |||
388 | .minver = TLS1_VERSION, | 388 | .minver = TLS1_VERSION, |
389 | .maxver = TLS1_2_VERSION, | 389 | .maxver = TLS1_2_VERSION, |
390 | .peerver = TLS1_VERSION, | 390 | .peerver = TLS1_VERSION, |
391 | .want_maxver = TLS1_VERSION, | 391 | .want_maxver = 0, |
392 | }, | 392 | }, |
393 | { | 393 | { |
394 | .ssl_method = TLSv1_method, | 394 | .ssl_method = TLSv1_method, |
@@ -404,7 +404,7 @@ static struct shared_version_test shared_version_tests[] = { | |||
404 | .minver = TLS1_VERSION, | 404 | .minver = TLS1_VERSION, |
405 | .maxver = TLS1_2_VERSION, | 405 | .maxver = TLS1_2_VERSION, |
406 | .peerver = TLS1_1_VERSION, | 406 | .peerver = TLS1_1_VERSION, |
407 | .want_maxver = TLS1_1_VERSION, | 407 | .want_maxver = 0, |
408 | }, | 408 | }, |
409 | { | 409 | { |
410 | .ssl_method = DTLS_method, | 410 | .ssl_method = DTLS_method, |
@@ -412,7 +412,7 @@ static struct shared_version_test shared_version_tests[] = { | |||
412 | .minver = TLS1_1_VERSION, | 412 | .minver = TLS1_1_VERSION, |
413 | .maxver = TLS1_2_VERSION, | 413 | .maxver = TLS1_2_VERSION, |
414 | .peerver = DTLS1_VERSION, | 414 | .peerver = DTLS1_VERSION, |
415 | .want_maxver = DTLS1_VERSION, | 415 | .want_maxver = 0, |
416 | }, | 416 | }, |
417 | { | 417 | { |
418 | .ssl_method = DTLS_method, | 418 | .ssl_method = DTLS_method, |
@@ -436,7 +436,7 @@ static struct shared_version_test shared_version_tests[] = { | |||
436 | .minver = TLS1_1_VERSION, | 436 | .minver = TLS1_1_VERSION, |
437 | .maxver = TLS1_1_VERSION, | 437 | .maxver = TLS1_1_VERSION, |
438 | .peerver = DTLS1_2_VERSION, | 438 | .peerver = DTLS1_2_VERSION, |
439 | .want_maxver = DTLS1_VERSION, | 439 | .want_maxver = 0, |
440 | }, | 440 | }, |
441 | { | 441 | { |
442 | .ssl_method = DTLSv1_2_method, | 442 | .ssl_method = DTLSv1_2_method, |
@@ -476,7 +476,7 @@ static struct shared_version_test shared_version_tests[] = { | |||
476 | .minver = TLS1_1_VERSION, | 476 | .minver = TLS1_1_VERSION, |
477 | .maxver = TLS1_2_VERSION, | 477 | .maxver = TLS1_2_VERSION, |
478 | .peerver = DTLS1_2_VERSION, | 478 | .peerver = DTLS1_2_VERSION, |
479 | .want_maxver = DTLS1_VERSION, | 479 | .want_maxver = 0, |
480 | }, | 480 | }, |
481 | }; | 481 | }; |
482 | 482 | ||