diff options
author | Matt Caswell <matt@openssl.org> | 2021-04-27 12:05:00 +0100 |
---|---|---|
committer | Matt Caswell <matt@openssl.org> | 2021-04-29 15:52:49 +0100 |
commit | 8ce390e1399a27e1c6e14756927e2331ee1cb5c5 (patch) | |
tree | 1ce6913ff3c8cb63084b3eb71e8692b5e3519d04 /test | |
parent | fdf312709a34eb173f8366f55db0e0884b1f6a26 (diff) |
Adjust sslapitest for SHA1 security level
SHA1 is now in security level 0. SHA1 is required for DTLSv1.1. Therefore
sslapitest needed some adjustments in the event that DTLSv1.2 is disabled.
Reviewed-by: Paul Dale <pauli@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/15047)
Diffstat (limited to 'test')
-rw-r--r-- | test/sslapitest.c | 55 |
1 files changed, 55 insertions, 0 deletions
diff --git a/test/sslapitest.c b/test/sslapitest.c index 4625d34046..d4c8bf4d38 100644 --- a/test/sslapitest.c +++ b/test/sslapitest.c @@ -971,6 +971,19 @@ static int execute_test_large_message(const SSL_METHOD *smeth, privkey))) goto end; +#ifdef OPENSSL_NO_DTLS1_2 + if (smeth == DTLS_server_method()) { + /* + * Default sigalgs are SHA1 based in <DTLS1.2 which is in security + * level 0 + */ + if (!TEST_true(SSL_CTX_set_cipher_list(sctx, "DEFAULT:@SECLEVEL=0")) + || !TEST_true(SSL_CTX_set_cipher_list(cctx, + "DEFAULT:@SECLEVEL=0"))) + goto end; + } +#endif + if (read_ahead) { /* * Test that read_ahead works correctly when dealing with large @@ -1436,6 +1449,11 @@ static int test_large_message_tls_read_ahead(void) #ifndef OPENSSL_NO_DTLS static int test_large_message_dtls(void) { +# ifdef OPENSSL_NO_DTLS1_2 + /* Not supported in the FIPS provider */ + if (is_fips) + return 1; +# endif /* * read_ahead is not relevant to DTLS because DTLS always acts as if * read_ahead is set. @@ -1467,6 +1485,26 @@ static int execute_cleanse_plaintext(const SSL_METHOD *smeth, privkey))) goto end; +#ifdef OPENSSL_NO_DTLS1_2 + if (smeth == DTLS_server_method()) { +# ifdef OPENSSL_NO_DTLS1_2 + /* Not supported in the FIPS provider */ + if (is_fips) { + testresult = 1; + goto end; + }; +# endif + /* + * Default sigalgs are SHA1 based in <DTLS1.2 which is in security + * level 0 + */ + if (!TEST_true(SSL_CTX_set_cipher_list(sctx, "DEFAULT:@SECLEVEL=0")) + || !TEST_true(SSL_CTX_set_cipher_list(cctx, + "DEFAULT:@SECLEVEL=0"))) + goto end; + } +#endif + if (!TEST_true(create_ssl_objects(sctx, cctx, &serverssl, &clientssl, NULL, NULL))) goto end; @@ -1550,6 +1588,7 @@ static int test_cleanse_plaintext(void) #endif #if !defined(OPENSSL_NO_DTLS) + if (!TEST_true(execute_cleanse_plaintext(DTLS_server_method(), DTLS_client_method(), DTLS1_VERSION, @@ -6619,6 +6658,22 @@ static int test_ssl_pending(int tst) DTLS1_VERSION, 0, &sctx, &cctx, cert, privkey))) goto end; + +# ifdef OPENSSL_NO_DTLS1_2 + /* Not supported in the FIPS provider */ + if (is_fips) { + testresult = 1; + goto end; + }; + /* + * Default sigalgs are SHA1 based in <DTLS1.2 which is in security + * level 0 + */ + if (!TEST_true(SSL_CTX_set_cipher_list(sctx, "DEFAULT:@SECLEVEL=0")) + || !TEST_true(SSL_CTX_set_cipher_list(cctx, + "DEFAULT:@SECLEVEL=0"))) + goto end; +# endif #else return 1; #endif |