diff options
| author | jsing <> | 2022-10-02 16:38:23 +0000 |
|---|---|---|
| committer | jsing <> | 2022-10-02 16:38:23 +0000 |
| commit | 41318db5497cddfa4935c4ea48bcb2eb5786375e (patch) | |
| tree | 71ad3fcbc5cab5d7be0868ff915931274c680328 /src/regress/lib/libssl/unit | |
| parent | efde998d3821e41e124a4bfcdf103e506055fc52 (diff) | |
| download | openbsd-41318db5497cddfa4935c4ea48bcb2eb5786375e.tar.gz openbsd-41318db5497cddfa4935c4ea48bcb2eb5786375e.tar.bz2 openbsd-41318db5497cddfa4935c4ea48bcb2eb5786375e.zip | |
Revise for SSL_CTX_INTERNAL and SSL_INTERNAL removal.
Diffstat (limited to 'src/regress/lib/libssl/unit')
| -rw-r--r-- | src/regress/lib/libssl/unit/cipher_list.c | 4 | ||||
| -rw-r--r-- | src/regress/lib/libssl/unit/ssl_versions.c | 10 | ||||
| -rw-r--r-- | src/regress/lib/libssl/unit/tls_ext_alpn.c | 10 |
3 files changed, 12 insertions, 12 deletions
diff --git a/src/regress/lib/libssl/unit/cipher_list.c b/src/regress/lib/libssl/unit/cipher_list.c index 0623dd69eb..543db41c24 100644 --- a/src/regress/lib/libssl/unit/cipher_list.c +++ b/src/regress/lib/libssl/unit/cipher_list.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: cipher_list.c,v 1.11 2022/07/07 13:11:45 tb Exp $ */ | 1 | /* $OpenBSD: cipher_list.c,v 1.12 2022/10/02 16:38:23 jsing Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2015 Doug Hogan <doug@openbsd.org> | 3 | * Copyright (c) 2015 Doug Hogan <doug@openbsd.org> |
| 4 | * Copyright (c) 2015 Joel Sing <jsing@openbsd.org> | 4 | * Copyright (c) 2015 Joel Sing <jsing@openbsd.org> |
| @@ -129,7 +129,7 @@ ssl_list_to_bytes_no_scsv(SSL *s, STACK_OF(SSL_CIPHER) **ciphers) | |||
| 129 | buf[buflen - 1] = 0xab; | 129 | buf[buflen - 1] = 0xab; |
| 130 | 130 | ||
| 131 | /* Set renegotiate so it doesn't add SCSV */ | 131 | /* Set renegotiate so it doesn't add SCSV */ |
| 132 | s->internal->renegotiate = 1; | 132 | s->renegotiate = 1; |
| 133 | 133 | ||
| 134 | CHECK(CBB_init_fixed(&cbb, buf, buflen)); | 134 | CHECK(CBB_init_fixed(&cbb, buf, buflen)); |
| 135 | CHECK(ssl_cipher_list_to_bytes(s, *ciphers, &cbb)); | 135 | CHECK(ssl_cipher_list_to_bytes(s, *ciphers, &cbb)); |
diff --git a/src/regress/lib/libssl/unit/ssl_versions.c b/src/regress/lib/libssl/unit/ssl_versions.c index 8a6360557f..e9bcecafe5 100644 --- a/src/regress/lib/libssl/unit/ssl_versions.c +++ b/src/regress/lib/libssl/unit/ssl_versions.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ssl_versions.c,v 1.17 2022/02/08 19:06:56 tb Exp $ */ | 1 | /* $OpenBSD: ssl_versions.c,v 1.18 2022/10/02 16:38:23 jsing Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2016, 2017 Joel Sing <jsing@openbsd.org> | 3 | * Copyright (c) 2016, 2017 Joel Sing <jsing@openbsd.org> |
| 4 | * | 4 | * |
| @@ -214,8 +214,8 @@ test_ssl_enabled_version_range(void) | |||
| 214 | SSL_set_options(ssl, vrt->options); | 214 | SSL_set_options(ssl, vrt->options); |
| 215 | 215 | ||
| 216 | minver = maxver = 0xffff; | 216 | minver = maxver = 0xffff; |
| 217 | ssl->internal->min_tls_version = vrt->minver; | 217 | ssl->min_tls_version = vrt->minver; |
| 218 | ssl->internal->max_tls_version = vrt->maxver; | 218 | ssl->max_tls_version = vrt->maxver; |
| 219 | 219 | ||
| 220 | if (ssl_enabled_tls_version_range(ssl, &minver, &maxver) != 1) { | 220 | if (ssl_enabled_tls_version_range(ssl, &minver, &maxver) != 1) { |
| 221 | if (vrt->want_minver != 0 || vrt->want_maxver != 0) { | 221 | if (vrt->want_minver != 0 || vrt->want_maxver != 0) { |
| @@ -516,8 +516,8 @@ test_ssl_max_shared_version(void) | |||
| 516 | SSL_set_options(ssl, svt->options); | 516 | SSL_set_options(ssl, svt->options); |
| 517 | 517 | ||
| 518 | maxver = 0; | 518 | maxver = 0; |
| 519 | ssl->internal->min_tls_version = svt->minver; | 519 | ssl->min_tls_version = svt->minver; |
| 520 | ssl->internal->max_tls_version = svt->maxver; | 520 | ssl->max_tls_version = svt->maxver; |
| 521 | 521 | ||
| 522 | if (!ssl_max_shared_version(ssl, svt->peerver, &maxver)) { | 522 | if (!ssl_max_shared_version(ssl, svt->peerver, &maxver)) { |
| 523 | if (svt->want_maxver != 0) { | 523 | if (svt->want_maxver != 0) { |
diff --git a/src/regress/lib/libssl/unit/tls_ext_alpn.c b/src/regress/lib/libssl/unit/tls_ext_alpn.c index 378929aa5b..f0e4894557 100644 --- a/src/regress/lib/libssl/unit/tls_ext_alpn.c +++ b/src/regress/lib/libssl/unit/tls_ext_alpn.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: tls_ext_alpn.c,v 1.7 2020/07/03 04:14:10 tb Exp $ */ | 1 | /* $OpenBSD: tls_ext_alpn.c,v 1.8 2022/10/02 16:38:23 jsing Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2015 Doug Hogan <doug@openbsd.org> | 3 | * Copyright (c) 2015 Doug Hogan <doug@openbsd.org> |
| 4 | * | 4 | * |
| @@ -344,8 +344,8 @@ check_valid_alpn(SSL *s) | |||
| 344 | SSL_CTX_set_alpn_select_cb(s->ctx, dummy_alpn_cb, NULL); | 344 | SSL_CTX_set_alpn_select_cb(s->ctx, dummy_alpn_cb, NULL); |
| 345 | 345 | ||
| 346 | /* Prerequisites to test these. */ | 346 | /* Prerequisites to test these. */ |
| 347 | CHECK(s->internal->alpn_client_proto_list != NULL); | 347 | CHECK(s->alpn_client_proto_list != NULL); |
| 348 | CHECK(s->ctx->internal->alpn_select_cb != NULL); | 348 | CHECK(s->ctx->alpn_select_cb != NULL); |
| 349 | //CHECK(s->s3->tmp.finish_md_len == 0); | 349 | //CHECK(s->s3->tmp.finish_md_len == 0); |
| 350 | 350 | ||
| 351 | CHECK_BOTH(1, 1, proto_single); | 351 | CHECK_BOTH(1, 1, proto_single); |
| @@ -376,8 +376,8 @@ check_invalid_alpn(SSL *s) | |||
| 376 | SSL_CTX_set_alpn_select_cb(s->ctx, dummy_alpn_cb, NULL); | 376 | SSL_CTX_set_alpn_select_cb(s->ctx, dummy_alpn_cb, NULL); |
| 377 | 377 | ||
| 378 | /* Prerequisites to test these. */ | 378 | /* Prerequisites to test these. */ |
| 379 | CHECK(s->internal->alpn_client_proto_list != NULL); | 379 | CHECK(s->alpn_client_proto_list != NULL); |
| 380 | CHECK(s->ctx->internal->alpn_select_cb != NULL); | 380 | CHECK(s->ctx->alpn_select_cb != NULL); |
| 381 | //CHECK(s->s3->tmp.finish_md_len == 0); | 381 | //CHECK(s->s3->tmp.finish_md_len == 0); |
| 382 | 382 | ||
| 383 | /* None of these are valid for client or server */ | 383 | /* None of these are valid for client or server */ |
