summaryrefslogtreecommitdiff
path: root/regress/lib/libssl
diff options
context:
space:
mode:
authorJoel Sing <jsing@cvs.openbsd.org>2022-01-05 17:11:00 +0000
committerJoel Sing <jsing@cvs.openbsd.org>2022-01-05 17:11:00 +0000
commit6d25353780e6d08a08986ed8c6eb4fbd6f6c01e0 (patch)
tree22f9499a5d2ca08555371c783d7bee6a23def920 /regress/lib/libssl
parentc4aaa06084079d3d0d02d00d8b230c04abe49ac7 (diff)
Revise for tls13_key_share rename.
Diffstat (limited to 'regress/lib/libssl')
-rw-r--r--regress/lib/libssl/tlsext/tlsexttest.c22
1 files changed, 11 insertions, 11 deletions
diff --git a/regress/lib/libssl/tlsext/tlsexttest.c b/regress/lib/libssl/tlsext/tlsexttest.c
index 57fae149d0a..24b4e097847 100644
--- a/regress/lib/libssl/tlsext/tlsexttest.c
+++ b/regress/lib/libssl/tlsext/tlsexttest.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: tlsexttest.c,v 1.55 2021/12/29 22:50:30 tb Exp $ */
+/* $OpenBSD: tlsexttest.c,v 1.56 2022/01/05 17:10:59 jsing Exp $ */
/*
* Copyright (c) 2017 Joel Sing <jsing@openbsd.org>
* Copyright (c) 2017 Doug Hogan <doug@openbsd.org>
@@ -3172,10 +3172,10 @@ test_tlsext_keyshare_client(void)
if ((ssl = SSL_new(ssl_ctx)) == NULL)
errx(1, "failed to create SSL");
- if ((S3I(ssl)->hs.tls13.key_share =
- tls13_key_share_new_nid(NID_X25519)) == NULL)
+ if ((S3I(ssl)->hs.key_share =
+ tls_key_share_new_nid(NID_X25519)) == NULL)
errx(1, "failed to create key share");
- if (!tls13_key_share_generate(S3I(ssl)->hs.tls13.key_share))
+ if (!tls_key_share_generate(S3I(ssl)->hs.key_share))
errx(1, "failed to generate key share");
S3I(ssl)->hs.our_max_tls_version = TLS1_2_VERSION;
@@ -3290,20 +3290,20 @@ test_tlsext_keyshare_server(void)
goto done;
}
- if ((S3I(ssl)->hs.tls13.key_share =
- tls13_key_share_new_nid(NID_X25519)) == NULL) {
+ if ((S3I(ssl)->hs.key_share =
+ tls_key_share_new_nid(NID_X25519)) == NULL) {
FAIL("failed to create key share");
goto done;
}
- if (!tls13_key_share_generate(S3I(ssl)->hs.tls13.key_share)) {
+ if (!tls_key_share_generate(S3I(ssl)->hs.key_share)) {
FAIL("failed to generate key share");
goto done;
}
CBS_init(&cbs, bogokey, sizeof(bogokey));
- if (!tls13_key_share_peer_public(S3I(ssl)->hs.tls13.key_share,
+ if (!tls_key_share_peer_public(S3I(ssl)->hs.key_share,
0x001d, &cbs)) {
FAIL("failed to load peer public key\n");
goto done;
@@ -3325,12 +3325,12 @@ test_tlsext_keyshare_server(void)
goto done;
}
- if ((S3I(ssl)->hs.tls13.key_share =
- tls13_key_share_new_nid(NID_X25519)) == NULL) {
+ if ((S3I(ssl)->hs.key_share =
+ tls_key_share_new_nid(NID_X25519)) == NULL) {
FAIL("failed to create key share");
goto done;
}
- if (!tls13_key_share_generate(S3I(ssl)->hs.tls13.key_share)) {
+ if (!tls_key_share_generate(S3I(ssl)->hs.key_share)) {
FAIL("failed to generate key share");
goto done;
}