Fix TLS 1.3 variant fuzzers.

This was broken when we added the API to SSL.

Change-Id: I92d4330b0d70f655c9a9ad33898d6b84704e915c
Reviewed-on: https://boringssl-review.googlesource.com/17884
Reviewed-by: Steven Valdez <svaldez@google.com>
Commit-Queue: Steven Valdez <svaldez@google.com>
Commit-Queue: David Benjamin <davidben@google.com>
This commit is contained in:
David Benjamin 2017-07-14 16:06:04 -04:00 committed by Steven Valdez
parent 3ba4fb47e6
commit 2abda63a4f

View File

@ -51,7 +51,6 @@ static inline bssl::UniquePtr<SSL> SetupTest(CBS *cbs, SSL_CTX *ctx,
// |ctx| is shared between runs, so we must clear any modifications to it made
// later on in this function.
SSL_CTX_flush_sessions(ctx, 0);
SSL_CTX_set_tls13_variant(ctx, tls13_default);
bssl::UniquePtr<SSL> ssl(SSL_new(ctx));
if (is_server) {
@ -100,7 +99,7 @@ static inline bssl::UniquePtr<SSL> SetupTest(CBS *cbs, SSL_CTX *ctx,
if (!CBS_get_u8(cbs, &variant)) {
return nullptr;
}
SSL_CTX_set_tls13_variant(ctx, static_cast<tls13_variant_t>(variant));
SSL_set_tls13_variant(ssl.get(), static_cast<tls13_variant_t>(variant));
break;
}