summaryrefslogtreecommitdiffstats
path: root/test
diff options
context:
space:
mode:
authorMatt Caswell <matt@openssl.org>2023-05-18 15:46:58 +0100
committerMatt Caswell <matt@openssl.org>2023-05-24 12:18:33 +0100
commit5cf99b4040eb1ef63b3254090d16299cad690b1e (patch)
tree84cb0a5a6e10ca358c45d8def9ec79bb8137f24b /test
parent2e1da9693a7de72643acdf3da4816c4edf96ca29 (diff)
Create setter functions for the msg_callback and msg_callback_arg
We create setter functions for the msg_callback and msg_callback_arg so that these values can be properly propagated to the QRX/QTX/TXP even after the channel has been created. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/20914)
Diffstat (limited to 'test')
-rw-r--r--test/recipes/75-test_quicapi_data/ssltraceref.txt36
1 files changed, 18 insertions, 18 deletions
diff --git a/test/recipes/75-test_quicapi_data/ssltraceref.txt b/test/recipes/75-test_quicapi_data/ssltraceref.txt
index 3d093af5c7..095a945f6e 100644
--- a/test/recipes/75-test_quicapi_data/ssltraceref.txt
+++ b/test/recipes/75-test_quicapi_data/ssltraceref.txt
@@ -2,8 +2,8 @@ Sent TLS Record
Header:
Version = TLS 1.0 (0x301)
Content Type = Handshake (22)
- Length = 254
- ClientHello, Length=250
+ Length = 256
+ ClientHello, Length=252
client_version=0x303 (TLS 1.2)
Random:
gmt_unix_time=0x????????
@@ -13,12 +13,12 @@ Header:
{0x13, 0x01} TLS_AES_128_GCM_SHA256
compression_methods (len=1)
No Compression (0x00)
- extensions, length = 207
- extension_type=UNKNOWN(57), length=47
+ extensions, length = 209
+ extension_type=UNKNOWN(57), length=49
0000 - 0c 00 0f 00 01 04 80 00-75 30 03 02 44 b0 0e ........u0..D..
- 000f - 01 04 04 04 80 20 00 00-05 04 80 10 00 00 06 ..... .........
- 001e - 04 80 10 00 00 07 04 80-10 00 00 08 01 00 09 ...............
- 002d - 01 00 ..
+ 000f - 01 02 04 04 80 20 00 00-05 04 80 20 00 00 06 ..... ..... ...
+ 001e - 04 80 20 00 00 07 04 80-20 00 00 08 02 40 64 .. ..... ....@d
+ 002d - 09 02 40 64 ..@d
extension_type=ec_point_formats(11), length=4
uncompressed (0)
ansiX962_compressed_prime (1)
@@ -67,7 +67,7 @@ Header:
Sent Frame: Crypto
Offset: 0
- Len: 254
+ Len: 256
Sent Frame: Padding
Sent Packet
Packet Type: Initial
@@ -134,14 +134,14 @@ Header:
Content Type = ApplicationData (23)
Length = 1022
Inner Content Type = Handshake (22)
- EncryptedExtensions, Length=86
- extensions, length = 84
- extension_type=UNKNOWN(57), length=65
+ EncryptedExtensions, Length=88
+ extensions, length = 86
+ extension_type=UNKNOWN(57), length=67
0000 - 0c 00 00 08 ?? ?? ?? ??-?? ?? ?? ?? 0f 08 ?? ....????????..?
000f - ?? ?? ?? ?? ?? ?? ?? 01-04 80 00 75 30 03 02 ???????....u0..
- 001e - 44 b0 0e 01 04 04 04 80-20 00 00 05 04 80 10 D....... ......
- 002d - 00 00 06 04 80 10 00 00-07 04 80 10 00 00 08 ...............
- 003c - 01 01 09 01 00 .....
+ 001e - 44 b0 0e 01 02 04 04 80-20 00 00 05 04 80 20 D....... .....
+ 002d - 00 00 06 04 80 20 00 00-07 04 80 20 00 00 08 ..... ..... ...
+ 003c - 02 40 64 09 02 40 64 .@d..@d
extension_type=application_layer_protocol_negotiation(16), length=11
ossltest
@@ -234,22 +234,22 @@ YeeuLO02zToHhnQ6KbPXOrQAqcL1kngO4g+j/ru+4AZThFkdkGnltvk=
No extensions
Received Datagram
- Length: 254
+ Length: 256
Received Packet
Packet Type: Handshake
Version: 0x00000001
Destination Conn Id: <zero length id>
Source Conn Id: 0x????????????????
- Payload length: 211
+ Payload length: 213
Packet Number: 0x00000001
Received Frame: Crypto
Offset: 1022
- Len: 190
+ Len: 192
Received TLS Record
Header:
Version = TLS 1.2 (0x303)
Content Type = ApplicationData (23)
- Length = 190
+ Length = 192
Inner Content Type = Handshake (22)
CertificateVerify, Length=260
Signature Algorithm: rsa_pss_rsae_sha256 (0x0804)