diff options
author | jsing <> | 2022-10-02 16:38:23 +0000 |
---|---|---|
committer | jsing <> | 2022-10-02 16:38:23 +0000 |
commit | a73d040fe367d3cf7a19fc4c9a9293676e1e4f06 (patch) | |
tree | 71ad3fcbc5cab5d7be0868ff915931274c680328 /src/regress/lib/libssl/unit | |
parent | 7a087580717329de5ef02600e4e1489d86249a88 (diff) | |
download | openbsd-a73d040fe367d3cf7a19fc4c9a9293676e1e4f06.tar.gz openbsd-a73d040fe367d3cf7a19fc4c9a9293676e1e4f06.tar.bz2 openbsd-a73d040fe367d3cf7a19fc4c9a9293676e1e4f06.zip |
Revise for SSL_CTX_INTERNAL and SSL_INTERNAL removal.
Diffstat (limited to 'src/regress/lib/libssl/unit')
-rw-r--r-- | src/regress/lib/libssl/unit/cipher_list.c | 4 | ||||
-rw-r--r-- | src/regress/lib/libssl/unit/ssl_versions.c | 10 | ||||
-rw-r--r-- | src/regress/lib/libssl/unit/tls_ext_alpn.c | 10 |
3 files changed, 12 insertions, 12 deletions
diff --git a/src/regress/lib/libssl/unit/cipher_list.c b/src/regress/lib/libssl/unit/cipher_list.c index 0623dd69eb..543db41c24 100644 --- a/src/regress/lib/libssl/unit/cipher_list.c +++ b/src/regress/lib/libssl/unit/cipher_list.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: cipher_list.c,v 1.11 2022/07/07 13:11:45 tb Exp $ */ | 1 | /* $OpenBSD: cipher_list.c,v 1.12 2022/10/02 16:38:23 jsing Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2015 Doug Hogan <doug@openbsd.org> | 3 | * Copyright (c) 2015 Doug Hogan <doug@openbsd.org> |
4 | * Copyright (c) 2015 Joel Sing <jsing@openbsd.org> | 4 | * Copyright (c) 2015 Joel Sing <jsing@openbsd.org> |
@@ -129,7 +129,7 @@ ssl_list_to_bytes_no_scsv(SSL *s, STACK_OF(SSL_CIPHER) **ciphers) | |||
129 | buf[buflen - 1] = 0xab; | 129 | buf[buflen - 1] = 0xab; |
130 | 130 | ||
131 | /* Set renegotiate so it doesn't add SCSV */ | 131 | /* Set renegotiate so it doesn't add SCSV */ |
132 | s->internal->renegotiate = 1; | 132 | s->renegotiate = 1; |
133 | 133 | ||
134 | CHECK(CBB_init_fixed(&cbb, buf, buflen)); | 134 | CHECK(CBB_init_fixed(&cbb, buf, buflen)); |
135 | CHECK(ssl_cipher_list_to_bytes(s, *ciphers, &cbb)); | 135 | CHECK(ssl_cipher_list_to_bytes(s, *ciphers, &cbb)); |
diff --git a/src/regress/lib/libssl/unit/ssl_versions.c b/src/regress/lib/libssl/unit/ssl_versions.c index 8a6360557f..e9bcecafe5 100644 --- a/src/regress/lib/libssl/unit/ssl_versions.c +++ b/src/regress/lib/libssl/unit/ssl_versions.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ssl_versions.c,v 1.17 2022/02/08 19:06:56 tb Exp $ */ | 1 | /* $OpenBSD: ssl_versions.c,v 1.18 2022/10/02 16:38:23 jsing Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2016, 2017 Joel Sing <jsing@openbsd.org> | 3 | * Copyright (c) 2016, 2017 Joel Sing <jsing@openbsd.org> |
4 | * | 4 | * |
@@ -214,8 +214,8 @@ test_ssl_enabled_version_range(void) | |||
214 | SSL_set_options(ssl, vrt->options); | 214 | SSL_set_options(ssl, vrt->options); |
215 | 215 | ||
216 | minver = maxver = 0xffff; | 216 | minver = maxver = 0xffff; |
217 | ssl->internal->min_tls_version = vrt->minver; | 217 | ssl->min_tls_version = vrt->minver; |
218 | ssl->internal->max_tls_version = vrt->maxver; | 218 | ssl->max_tls_version = vrt->maxver; |
219 | 219 | ||
220 | if (ssl_enabled_tls_version_range(ssl, &minver, &maxver) != 1) { | 220 | if (ssl_enabled_tls_version_range(ssl, &minver, &maxver) != 1) { |
221 | if (vrt->want_minver != 0 || vrt->want_maxver != 0) { | 221 | if (vrt->want_minver != 0 || vrt->want_maxver != 0) { |
@@ -516,8 +516,8 @@ test_ssl_max_shared_version(void) | |||
516 | SSL_set_options(ssl, svt->options); | 516 | SSL_set_options(ssl, svt->options); |
517 | 517 | ||
518 | maxver = 0; | 518 | maxver = 0; |
519 | ssl->internal->min_tls_version = svt->minver; | 519 | ssl->min_tls_version = svt->minver; |
520 | ssl->internal->max_tls_version = svt->maxver; | 520 | ssl->max_tls_version = svt->maxver; |
521 | 521 | ||
522 | if (!ssl_max_shared_version(ssl, svt->peerver, &maxver)) { | 522 | if (!ssl_max_shared_version(ssl, svt->peerver, &maxver)) { |
523 | if (svt->want_maxver != 0) { | 523 | if (svt->want_maxver != 0) { |
diff --git a/src/regress/lib/libssl/unit/tls_ext_alpn.c b/src/regress/lib/libssl/unit/tls_ext_alpn.c index 378929aa5b..f0e4894557 100644 --- a/src/regress/lib/libssl/unit/tls_ext_alpn.c +++ b/src/regress/lib/libssl/unit/tls_ext_alpn.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: tls_ext_alpn.c,v 1.7 2020/07/03 04:14:10 tb Exp $ */ | 1 | /* $OpenBSD: tls_ext_alpn.c,v 1.8 2022/10/02 16:38:23 jsing Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2015 Doug Hogan <doug@openbsd.org> | 3 | * Copyright (c) 2015 Doug Hogan <doug@openbsd.org> |
4 | * | 4 | * |
@@ -344,8 +344,8 @@ check_valid_alpn(SSL *s) | |||
344 | SSL_CTX_set_alpn_select_cb(s->ctx, dummy_alpn_cb, NULL); | 344 | SSL_CTX_set_alpn_select_cb(s->ctx, dummy_alpn_cb, NULL); |
345 | 345 | ||
346 | /* Prerequisites to test these. */ | 346 | /* Prerequisites to test these. */ |
347 | CHECK(s->internal->alpn_client_proto_list != NULL); | 347 | CHECK(s->alpn_client_proto_list != NULL); |
348 | CHECK(s->ctx->internal->alpn_select_cb != NULL); | 348 | CHECK(s->ctx->alpn_select_cb != NULL); |
349 | //CHECK(s->s3->tmp.finish_md_len == 0); | 349 | //CHECK(s->s3->tmp.finish_md_len == 0); |
350 | 350 | ||
351 | CHECK_BOTH(1, 1, proto_single); | 351 | CHECK_BOTH(1, 1, proto_single); |
@@ -376,8 +376,8 @@ check_invalid_alpn(SSL *s) | |||
376 | SSL_CTX_set_alpn_select_cb(s->ctx, dummy_alpn_cb, NULL); | 376 | SSL_CTX_set_alpn_select_cb(s->ctx, dummy_alpn_cb, NULL); |
377 | 377 | ||
378 | /* Prerequisites to test these. */ | 378 | /* Prerequisites to test these. */ |
379 | CHECK(s->internal->alpn_client_proto_list != NULL); | 379 | CHECK(s->alpn_client_proto_list != NULL); |
380 | CHECK(s->ctx->internal->alpn_select_cb != NULL); | 380 | CHECK(s->ctx->alpn_select_cb != NULL); |
381 | //CHECK(s->s3->tmp.finish_md_len == 0); | 381 | //CHECK(s->s3->tmp.finish_md_len == 0); |
382 | 382 | ||
383 | /* None of these are valid for client or server */ | 383 | /* None of these are valid for client or server */ |