diff options
author | Matt Caswell <matt@openssl.org> | 2017-07-05 10:45:02 +0100 |
---|---|---|
committer | Matt Caswell <matt@openssl.org> | 2017-07-07 15:02:09 +0100 |
commit | de2f409ef9de775df6db2c7de69b7bb0df21e380 (patch) | |
tree | 5e5a02e873b83c7e32b7d968fcf1ec42cc1ef479 /test | |
parent | 9b6a82546151d6f971628e2d7828752ee47bfef7 (diff) |
The correct key length for a TLSv1.3 SHA384 ciphersuite is 48
Our test was using 32. The latest ticket nonce changes now validate this
value and so sslapitest was failing.
Reviewed-by: Ben Kaduk <kaduk@mit.edu>
(Merged from https://github.com/openssl/openssl/pull/3852)
Diffstat (limited to 'test')
-rw-r--r-- | test/sslapitest.c | 3 |
1 files changed, 2 insertions, 1 deletions
diff --git a/test/sslapitest.c b/test/sslapitest.c index ae5c4c0bd1..b77a229d7d 100644 --- a/test/sslapitest.c +++ b/test/sslapitest.c @@ -2002,7 +2002,8 @@ static int test_tls13_psk(void) const unsigned char key[] = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, - 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f + 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, 0x20, 0x21, 0x22, 0x23, + 0x24, 0x25, 0x26, 0x27, 0x28, 0x29, 0x2a, 0x2b, 0x2c, 0x2d, 0x2e, 0x2f }; int testresult = 0; |