From 11a8db912866bd7bf64b434f07bffbc68f8862d3 Mon Sep 17 00:00:00 2001 From: Rajeev Ranjan Date: Fri, 26 Jan 2024 07:49:22 +0100 Subject: [PATCH] fixup! adapt test for TLS_SHA{256,384}_SHA{256,384} --- test/sslapitest.c | 9 ++++++--- 1 file changed, 6 insertions(+), 3 deletions(-) diff --git a/test/sslapitest.c b/test/sslapitest.c index 3db34d1149431..9634556e6be8b 100644 --- a/test/sslapitest.c +++ b/test/sslapitest.c @@ -4445,7 +4445,10 @@ static int test_early_data_psk_with_all_ciphers(int idx) goto end; if (idx == 4 || idx == 5 || idx == 6) { - /* CCM8 ciphers are considered low security due to their short tag */ + /* + * CCM8 ciphers are considered low security due to their short tag. + * Integrity-only cipher do not provide any confidentiality. + */ SSL_set_security_level(clientssl, 0); SSL_set_security_level(serverssl, 0); } @@ -5294,8 +5297,8 @@ static int test_tls13_ciphersuite(int idx) ":" TLS1_3_RFC_AES_128_CCM_SHA256, 1, 1 }, # if !defined(OPENSSL_NO_TLS1_3_INTEGRITY_ONLY_CIPHERS) /* Integrity-only cipher do not provide any confidentiality */ - { TLS1_3_RFC_SHA256_SHA256 - ":" TLS1_3_RFC_SHA384_SHA384, 0, 1 } + { TLS1_3_RFC_SHA256_SHA256, 0, 1 }, + { TLS1_3_RFC_SHA384_SHA384, 0, 1 } # endif }; const char *t13_cipher = NULL;