test mlkem768x25519-sha256
authordjm <djm@openbsd.org>
Mon, 9 Sep 2024 03:13:39 +0000 (03:13 +0000)
committerdjm <djm@openbsd.org>
Mon, 9 Sep 2024 03:13:39 +0000 (03:13 +0000)
regress/usr.bin/ssh/unittests/kex/Makefile
regress/usr.bin/ssh/unittests/kex/test_kex.c

index 3c89840..ca4f0ee 100644 (file)
@@ -1,4 +1,4 @@
-#      $OpenBSD: Makefile,v 1.15 2024/05/19 19:10:01 anton Exp $
+#      $OpenBSD: Makefile,v 1.16 2024/09/09 03:13:39 djm Exp $
 
 PROG=test_kex
 SRCS=tests.c test_kex.c test_proposal.c
@@ -25,6 +25,7 @@ SRCS+=        kexc25519.c
 SRCS+= smult_curve25519_ref.c
 SRCS+= kexgen.c
 SRCS+= kexsntrup761x25519.c
+SRCS+= kexmlkem768x25519.c
 SRCS+= sntrup761.c
 SRCS+= utf8.c
 
index 5b7de7b..1381d5d 100644 (file)
@@ -1,4 +1,4 @@
-/*     $OpenBSD: test_kex.c,v 1.8 2024/03/25 19:28:09 djm Exp $ */
+/*     $OpenBSD: test_kex.c,v 1.9 2024/09/09 03:13:39 djm Exp $ */
 /*
  * Regress test KEX
  *
@@ -145,6 +145,7 @@ do_kex_with_key(char *kex, int keytype, int bits)
        server2->kex->kex[KEX_ECDH_SHA2] = kex_gen_server;
        server2->kex->kex[KEX_C25519_SHA256] = kex_gen_server;
        server2->kex->kex[KEX_KEM_SNTRUP761X25519_SHA512] = kex_gen_server;
+       server2->kex->kex[KEX_KEM_MLKEM768X25519_SHA256] = kex_gen_server;
        server2->kex->load_host_public_key = server->kex->load_host_public_key;
        server2->kex->load_host_private_key = server->kex->load_host_private_key;
        server2->kex->sign = server->kex->sign;
@@ -193,4 +194,5 @@ kex_tests(void)
        do_kex("diffie-hellman-group14-sha1");
        do_kex("diffie-hellman-group1-sha1");
        do_kex("sntrup761x25519-sha512@openssh.com");
+       do_kex("mlkem768x25519-sha256");
 }