33
33
34
34
static int setup_server_keys (struct s2n_connection * server_conn , struct s2n_blob * key )
35
35
{
36
- GUARD (server_conn -> initial .cipher_suite -> cipher -> init (& server_conn -> initial .server_key ));
37
- GUARD (server_conn -> initial .cipher_suite -> cipher -> init (& server_conn -> initial .client_key ));
38
- GUARD (server_conn -> initial .cipher_suite -> cipher -> set_encryption_key (& server_conn -> initial .server_key , key ));
39
- GUARD (server_conn -> initial .cipher_suite -> cipher -> set_decryption_key (& server_conn -> initial .client_key , key ));
36
+ GUARD (server_conn -> initial .cipher_suite -> record_alg -> cipher -> init (& server_conn -> initial .server_key ));
37
+ GUARD (server_conn -> initial .cipher_suite -> record_alg -> cipher -> init (& server_conn -> initial .client_key ));
38
+ GUARD (server_conn -> initial .cipher_suite -> record_alg -> cipher -> set_encryption_key (& server_conn -> initial .server_key , key ));
39
+ GUARD (server_conn -> initial .cipher_suite -> record_alg -> cipher -> set_decryption_key (& server_conn -> initial .client_key , key ));
40
40
41
41
return 0 ;
42
42
}
@@ -61,8 +61,7 @@ int main(int argc, char **argv)
61
61
conn -> client = & conn -> initial ;
62
62
63
63
/* test the AES128 cipher */
64
- conn -> initial .cipher_suite -> cipher = & s2n_aes128_gcm ;
65
- conn -> initial .cipher_suite -> hmac_alg = S2N_HMAC_NONE ;
64
+ conn -> initial .cipher_suite -> record_alg = & s2n_record_alg_aes128_gcm ;
66
65
EXPECT_SUCCESS (setup_server_keys (conn , & aes128 ));
67
66
68
67
int max_fragment = S2N_SMALL_FRAGMENT_LENGTH ;
@@ -76,8 +75,7 @@ int main(int argc, char **argv)
76
75
conn -> actual_protocol_version = S2N_TLS12 ;
77
76
conn -> server = & conn -> initial ;
78
77
conn -> client = & conn -> initial ;
79
- conn -> initial .cipher_suite -> cipher = & s2n_aes128_gcm ;
80
- conn -> initial .cipher_suite -> hmac_alg = S2N_HMAC_NONE ;
78
+ conn -> initial .cipher_suite -> record_alg = & s2n_record_alg_aes128_gcm ;
81
79
EXPECT_SUCCESS (setup_server_keys (conn , & aes128 ));
82
80
EXPECT_SUCCESS (bytes_written = s2n_record_write (conn , TLS_APPLICATION_DATA , & in ));
83
81
@@ -90,8 +88,8 @@ int main(int argc, char **argv)
90
88
}
91
89
92
90
uint16_t predicted_length = bytes_written ;
93
- predicted_length += conn -> initial .cipher_suite -> cipher -> io .aead .record_iv_size ;
94
- predicted_length += conn -> initial .cipher_suite -> cipher -> io .aead .tag_size ;
91
+ predicted_length += conn -> initial .cipher_suite -> record_alg -> cipher -> io .aead .record_iv_size ;
92
+ predicted_length += conn -> initial .cipher_suite -> record_alg -> cipher -> io .aead .tag_size ;
95
93
96
94
EXPECT_EQUAL (conn -> out .blob .data [0 ], TLS_APPLICATION_DATA );
97
95
EXPECT_EQUAL (conn -> out .blob .data [1 ], 3 );
@@ -126,8 +124,7 @@ int main(int argc, char **argv)
126
124
conn -> server_protocol_version = S2N_TLS12 ;
127
125
conn -> client_protocol_version = S2N_TLS12 ;
128
126
conn -> actual_protocol_version = S2N_TLS12 ;
129
- conn -> initial .cipher_suite -> cipher = & s2n_aes128_gcm ;
130
- conn -> initial .cipher_suite -> hmac_alg = S2N_HMAC_NONE ;
127
+ conn -> initial .cipher_suite -> record_alg = & s2n_record_alg_aes128_gcm ;
131
128
EXPECT_SUCCESS (setup_server_keys (conn , & aes128 ));
132
129
EXPECT_SUCCESS (s2n_record_write (conn , TLS_APPLICATION_DATA , & in ));
133
130
@@ -153,8 +150,7 @@ int main(int argc, char **argv)
153
150
conn -> server_protocol_version = S2N_TLS12 ;
154
151
conn -> client_protocol_version = S2N_TLS12 ;
155
152
conn -> actual_protocol_version = S2N_TLS12 ;
156
- conn -> initial .cipher_suite -> cipher = & s2n_aes128_gcm ;
157
- conn -> initial .cipher_suite -> hmac_alg = S2N_HMAC_NONE ;
153
+ conn -> initial .cipher_suite -> record_alg = & s2n_record_alg_aes128_gcm ;
158
154
EXPECT_SUCCESS (setup_server_keys (conn , & aes128 ));
159
155
EXPECT_SUCCESS (s2n_record_write (conn , TLS_APPLICATION_DATA , & in ));
160
156
@@ -178,8 +174,7 @@ int main(int argc, char **argv)
178
174
conn -> server_protocol_version = S2N_TLS12 ;
179
175
conn -> client_protocol_version = S2N_TLS12 ;
180
176
conn -> actual_protocol_version = S2N_TLS12 ;
181
- conn -> initial .cipher_suite -> cipher = & s2n_aes128_gcm ;
182
- conn -> initial .cipher_suite -> hmac_alg = S2N_HMAC_NONE ;
177
+ conn -> initial .cipher_suite -> record_alg = & s2n_record_alg_aes128_gcm ;
183
178
EXPECT_SUCCESS (setup_server_keys (conn , & aes128 ));
184
179
EXPECT_SUCCESS (s2n_record_write (conn , TLS_APPLICATION_DATA , & in ));
185
180
@@ -203,8 +198,7 @@ int main(int argc, char **argv)
203
198
conn -> server_protocol_version = S2N_TLS12 ;
204
199
conn -> client_protocol_version = S2N_TLS12 ;
205
200
conn -> actual_protocol_version = S2N_TLS12 ;
206
- conn -> initial .cipher_suite -> cipher = & s2n_aes128_gcm ;
207
- conn -> initial .cipher_suite -> hmac_alg = S2N_HMAC_NONE ;
201
+ conn -> initial .cipher_suite -> record_alg = & s2n_record_alg_aes128_gcm ;
208
202
EXPECT_SUCCESS (setup_server_keys (conn , & aes128 ));
209
203
EXPECT_SUCCESS (s2n_record_write (conn , TLS_APPLICATION_DATA , & in ));
210
204
@@ -222,14 +216,13 @@ int main(int argc, char **argv)
222
216
EXPECT_SUCCESS (s2n_stuffer_wipe (& conn -> in ));
223
217
}
224
218
}
225
- EXPECT_SUCCESS (conn -> initial .cipher_suite -> cipher -> destroy_key (& conn -> initial .server_key ));
226
- EXPECT_SUCCESS (conn -> initial .cipher_suite -> cipher -> destroy_key (& conn -> initial .client_key ));
219
+ EXPECT_SUCCESS (conn -> initial .cipher_suite -> record_alg -> cipher -> destroy_key (& conn -> initial .server_key ));
220
+ EXPECT_SUCCESS (conn -> initial .cipher_suite -> record_alg -> cipher -> destroy_key (& conn -> initial .client_key ));
227
221
EXPECT_SUCCESS (s2n_connection_free (conn ));
228
222
229
223
/* test the AES256 cipher */
230
224
EXPECT_NOT_NULL (conn = s2n_connection_new (S2N_SERVER ));
231
- conn -> initial .cipher_suite -> cipher = & s2n_aes256_gcm ;
232
- conn -> initial .cipher_suite -> hmac_alg = S2N_HMAC_NONE ;
225
+ conn -> initial .cipher_suite -> record_alg = & s2n_record_alg_aes256_gcm ;
233
226
EXPECT_SUCCESS (setup_server_keys (conn , & aes256 ));
234
227
conn -> actual_protocol_version = S2N_TLS12 ;
235
228
@@ -241,8 +234,7 @@ int main(int argc, char **argv)
241
234
conn -> server_protocol_version = S2N_TLS12 ;
242
235
conn -> client_protocol_version = S2N_TLS12 ;
243
236
conn -> actual_protocol_version = S2N_TLS12 ;
244
- conn -> initial .cipher_suite -> cipher = & s2n_aes256_gcm ;
245
- conn -> initial .cipher_suite -> hmac_alg = S2N_HMAC_NONE ;
237
+ conn -> initial .cipher_suite -> record_alg = & s2n_record_alg_aes256_gcm ;
246
238
EXPECT_SUCCESS (setup_server_keys (conn , & aes256 ));
247
239
conn -> actual_protocol_version = S2N_TLS12 ;
248
240
EXPECT_SUCCESS (bytes_written = s2n_record_write (conn , TLS_APPLICATION_DATA , & in ));
@@ -256,8 +248,8 @@ int main(int argc, char **argv)
256
248
}
257
249
258
250
uint16_t predicted_length = bytes_written ;
259
- predicted_length += conn -> initial .cipher_suite -> cipher -> io .aead .record_iv_size ;
260
- predicted_length += conn -> initial .cipher_suite -> cipher -> io .aead .tag_size ;
251
+ predicted_length += conn -> initial .cipher_suite -> record_alg -> cipher -> io .aead .record_iv_size ;
252
+ predicted_length += conn -> initial .cipher_suite -> record_alg -> cipher -> io .aead .tag_size ;
261
253
262
254
EXPECT_EQUAL (conn -> out .blob .data [0 ], TLS_APPLICATION_DATA );
263
255
EXPECT_EQUAL (conn -> out .blob .data [1 ], 3 );
@@ -291,8 +283,7 @@ int main(int argc, char **argv)
291
283
conn -> server_protocol_version = S2N_TLS12 ;
292
284
conn -> client_protocol_version = S2N_TLS12 ;
293
285
conn -> actual_protocol_version = S2N_TLS12 ;
294
- conn -> initial .cipher_suite -> cipher = & s2n_aes256_gcm ;
295
- conn -> initial .cipher_suite -> hmac_alg = S2N_HMAC_NONE ;
286
+ conn -> initial .cipher_suite -> record_alg = & s2n_record_alg_aes256_gcm ;
296
287
EXPECT_SUCCESS (setup_server_keys (conn , & aes256 ));
297
288
conn -> actual_protocol_version = S2N_TLS12 ;
298
289
EXPECT_SUCCESS (s2n_record_write (conn , TLS_APPLICATION_DATA , & in ));
@@ -319,8 +310,7 @@ int main(int argc, char **argv)
319
310
conn -> server_protocol_version = S2N_TLS12 ;
320
311
conn -> client_protocol_version = S2N_TLS12 ;
321
312
conn -> actual_protocol_version = S2N_TLS12 ;
322
- conn -> initial .cipher_suite -> cipher = & s2n_aes256_gcm ;
323
- conn -> initial .cipher_suite -> hmac_alg = S2N_HMAC_NONE ;
313
+ conn -> initial .cipher_suite -> record_alg = & s2n_record_alg_aes256_gcm ;
324
314
EXPECT_SUCCESS (setup_server_keys (conn , & aes256 ));
325
315
conn -> actual_protocol_version = S2N_TLS12 ;
326
316
EXPECT_SUCCESS (s2n_record_write (conn , TLS_APPLICATION_DATA , & in ));
@@ -345,8 +335,7 @@ int main(int argc, char **argv)
345
335
conn -> server_protocol_version = S2N_TLS12 ;
346
336
conn -> client_protocol_version = S2N_TLS12 ;
347
337
conn -> actual_protocol_version = S2N_TLS12 ;
348
- conn -> initial .cipher_suite -> cipher = & s2n_aes256_gcm ;
349
- conn -> initial .cipher_suite -> hmac_alg = S2N_HMAC_NONE ;
338
+ conn -> initial .cipher_suite -> record_alg = & s2n_record_alg_aes256_gcm ;
350
339
EXPECT_SUCCESS (setup_server_keys (conn , & aes256 ));
351
340
conn -> actual_protocol_version = S2N_TLS12 ;
352
341
EXPECT_SUCCESS (s2n_record_write (conn , TLS_APPLICATION_DATA , & in ));
@@ -371,8 +360,7 @@ int main(int argc, char **argv)
371
360
conn -> server_protocol_version = S2N_TLS12 ;
372
361
conn -> client_protocol_version = S2N_TLS12 ;
373
362
conn -> actual_protocol_version = S2N_TLS12 ;
374
- conn -> initial .cipher_suite -> cipher = & s2n_aes256_gcm ;
375
- conn -> initial .cipher_suite -> hmac_alg = S2N_HMAC_NONE ;
363
+ conn -> initial .cipher_suite -> record_alg = & s2n_record_alg_aes256_gcm ;
376
364
EXPECT_SUCCESS (setup_server_keys (conn , & aes256 ));
377
365
conn -> actual_protocol_version = S2N_TLS12 ;
378
366
EXPECT_SUCCESS (s2n_record_write (conn , TLS_APPLICATION_DATA , & in ));
@@ -391,8 +379,8 @@ int main(int argc, char **argv)
391
379
EXPECT_SUCCESS (s2n_stuffer_wipe (& conn -> in ));
392
380
}
393
381
}
394
- EXPECT_SUCCESS (conn -> initial .cipher_suite -> cipher -> destroy_key (& conn -> initial .server_key ));
395
- EXPECT_SUCCESS (conn -> initial .cipher_suite -> cipher -> destroy_key (& conn -> initial .client_key ));
382
+ EXPECT_SUCCESS (conn -> initial .cipher_suite -> record_alg -> cipher -> destroy_key (& conn -> initial .server_key ));
383
+ EXPECT_SUCCESS (conn -> initial .cipher_suite -> record_alg -> cipher -> destroy_key (& conn -> initial .client_key ));
396
384
EXPECT_SUCCESS (s2n_connection_free (conn ));
397
385
398
386
END_TEST ();
0 commit comments