Fix TLS 1.3 variant fuzzers.
This was broken when we added the API to SSL. Change-Id: I92d4330b0d70f655c9a9ad33898d6b84704e915c Reviewed-on: https://boringssl-review.googlesource.com/17884 Reviewed-by: Steven Valdez <svaldez@google.com> Commit-Queue: Steven Valdez <svaldez@google.com> Commit-Queue: David Benjamin <davidben@google.com>
This commit is contained in:
parent
3ba4fb47e6
commit
2abda63a4f
@ -51,7 +51,6 @@ static inline bssl::UniquePtr<SSL> SetupTest(CBS *cbs, SSL_CTX *ctx,
|
||||
// |ctx| is shared between runs, so we must clear any modifications to it made
|
||||
// later on in this function.
|
||||
SSL_CTX_flush_sessions(ctx, 0);
|
||||
SSL_CTX_set_tls13_variant(ctx, tls13_default);
|
||||
|
||||
bssl::UniquePtr<SSL> ssl(SSL_new(ctx));
|
||||
if (is_server) {
|
||||
@ -100,7 +99,7 @@ static inline bssl::UniquePtr<SSL> SetupTest(CBS *cbs, SSL_CTX *ctx,
|
||||
if (!CBS_get_u8(cbs, &variant)) {
|
||||
return nullptr;
|
||||
}
|
||||
SSL_CTX_set_tls13_variant(ctx, static_cast<tls13_variant_t>(variant));
|
||||
SSL_set_tls13_variant(ssl.get(), static_cast<tls13_variant_t>(variant));
|
||||
break;
|
||||
}
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user