mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-11 05:33:47 +01:00
Merge branch 'libressl_201805_029' into maint-0.3.3
This commit is contained in:
commit
bf3e899dce
4
changes/ticket26006
Normal file
4
changes/ticket26006
Normal file
@ -0,0 +1,4 @@
|
|||||||
|
o Minor features (compilation, portability):
|
||||||
|
- Avoid some compilation warnings with recent versions
|
||||||
|
of LibreSSL. Closes ticket 26006.
|
||||||
|
|
@ -9,6 +9,7 @@
|
|||||||
|
|
||||||
#include <openssl/opensslv.h>
|
#include <openssl/opensslv.h>
|
||||||
#include "crypto_openssl_mgt.h"
|
#include "crypto_openssl_mgt.h"
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* \file compat_openssl.h
|
* \file compat_openssl.h
|
||||||
*
|
*
|
||||||
@ -27,8 +28,11 @@
|
|||||||
#define OPENSSL_1_1_API
|
#define OPENSSL_1_1_API
|
||||||
#endif /* OPENSSL_VERSION_NUMBER >= OPENSSL_V_SERIES(1,1,0) && ... */
|
#endif /* OPENSSL_VERSION_NUMBER >= OPENSSL_V_SERIES(1,1,0) && ... */
|
||||||
|
|
||||||
#ifndef OPENSSL_1_1_API
|
#ifndef OPENSSL_VERSION
|
||||||
#define OPENSSL_VERSION SSLEAY_VERSION
|
#define OPENSSL_VERSION SSLEAY_VERSION
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#ifndef OPENSSL_1_1_API
|
||||||
#define OpenSSL_version(v) SSLeay_version(v)
|
#define OpenSSL_version(v) SSLeay_version(v)
|
||||||
#define OpenSSL_version_num() SSLeay()
|
#define OpenSSL_version_num() SSLeay()
|
||||||
#define RAND_OpenSSL() RAND_SSLeay()
|
#define RAND_OpenSSL() RAND_SSLeay()
|
||||||
|
@ -841,8 +841,10 @@ test_tortls_classify_client_ciphers(void *ignored)
|
|||||||
sk_SSL_CIPHER_zero(ciphers);
|
sk_SSL_CIPHER_zero(ciphers);
|
||||||
|
|
||||||
one = get_cipher_by_name("ECDHE-RSA-AES256-GCM-SHA384");
|
one = get_cipher_by_name("ECDHE-RSA-AES256-GCM-SHA384");
|
||||||
|
tt_assert(one);
|
||||||
one->id = 0x00ff;
|
one->id = 0x00ff;
|
||||||
two = get_cipher_by_name("ECDHE-RSA-AES128-GCM-SHA256");
|
two = get_cipher_by_name("ECDHE-RSA-AES128-GCM-SHA256");
|
||||||
|
tt_assert(two);
|
||||||
two->id = 0x0000;
|
two->id = 0x0000;
|
||||||
sk_SSL_CIPHER_push(ciphers, one);
|
sk_SSL_CIPHER_push(ciphers, one);
|
||||||
tls->client_cipher_list_type = 0;
|
tls->client_cipher_list_type = 0;
|
||||||
@ -913,6 +915,7 @@ test_tortls_client_is_using_v2_ciphers(void *ignored)
|
|||||||
|
|
||||||
ciphers = sk_SSL_CIPHER_new_null();
|
ciphers = sk_SSL_CIPHER_new_null();
|
||||||
SSL_CIPHER *one = get_cipher_by_name("ECDHE-RSA-AES256-GCM-SHA384");
|
SSL_CIPHER *one = get_cipher_by_name("ECDHE-RSA-AES256-GCM-SHA384");
|
||||||
|
tt_assert(one);
|
||||||
one->id = 0x00ff;
|
one->id = 0x00ff;
|
||||||
sk_SSL_CIPHER_push(ciphers, one);
|
sk_SSL_CIPHER_push(ciphers, one);
|
||||||
sess->ciphers = ciphers;
|
sess->ciphers = ciphers;
|
||||||
|
Loading…
Reference in New Issue
Block a user