diff options
author | Matt Caswell <matt@openssl.org> | 2023-05-18 15:46:58 +0100 |
---|---|---|
committer | Matt Caswell <matt@openssl.org> | 2023-05-24 12:18:33 +0100 |
commit | 5cf99b4040eb1ef63b3254090d16299cad690b1e (patch) | |
tree | 84cb0a5a6e10ca358c45d8def9ec79bb8137f24b /test | |
parent | 2e1da9693a7de72643acdf3da4816c4edf96ca29 (diff) |
Create setter functions for the msg_callback and msg_callback_arg
We create setter functions for the msg_callback and msg_callback_arg so
that these values can be properly propagated to the QRX/QTX/TXP even
after the channel has been created.
Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Hugo Landau <hlandau@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/20914)
Diffstat (limited to 'test')
-rw-r--r-- | test/recipes/75-test_quicapi_data/ssltraceref.txt | 36 |
1 files changed, 18 insertions, 18 deletions
diff --git a/test/recipes/75-test_quicapi_data/ssltraceref.txt b/test/recipes/75-test_quicapi_data/ssltraceref.txt index 3d093af5c7..095a945f6e 100644 --- a/test/recipes/75-test_quicapi_data/ssltraceref.txt +++ b/test/recipes/75-test_quicapi_data/ssltraceref.txt @@ -2,8 +2,8 @@ Sent TLS Record Header: Version = TLS 1.0 (0x301) Content Type = Handshake (22) - Length = 254 - ClientHello, Length=250 + Length = 256 + ClientHello, Length=252 client_version=0x303 (TLS 1.2) Random: gmt_unix_time=0x???????? @@ -13,12 +13,12 @@ Header: {0x13, 0x01} TLS_AES_128_GCM_SHA256 compression_methods (len=1) No Compression (0x00) - extensions, length = 207 - extension_type=UNKNOWN(57), length=47 + extensions, length = 209 + extension_type=UNKNOWN(57), length=49 0000 - 0c 00 0f 00 01 04 80 00-75 30 03 02 44 b0 0e ........u0..D.. - 000f - 01 04 04 04 80 20 00 00-05 04 80 10 00 00 06 ..... ......... - 001e - 04 80 10 00 00 07 04 80-10 00 00 08 01 00 09 ............... - 002d - 01 00 .. + 000f - 01 02 04 04 80 20 00 00-05 04 80 20 00 00 06 ..... ..... ... + 001e - 04 80 20 00 00 07 04 80-20 00 00 08 02 40 64 .. ..... ....@d + 002d - 09 02 40 64 ..@d extension_type=ec_point_formats(11), length=4 uncompressed (0) ansiX962_compressed_prime (1) @@ -67,7 +67,7 @@ Header: Sent Frame: Crypto Offset: 0 - Len: 254 + Len: 256 Sent Frame: Padding Sent Packet Packet Type: Initial @@ -134,14 +134,14 @@ Header: Content Type = ApplicationData (23) Length = 1022 Inner Content Type = Handshake (22) - EncryptedExtensions, Length=86 - extensions, length = 84 - extension_type=UNKNOWN(57), length=65 + EncryptedExtensions, Length=88 + extensions, length = 86 + extension_type=UNKNOWN(57), length=67 0000 - 0c 00 00 08 ?? ?? ?? ??-?? ?? ?? ?? 0f 08 ?? ....????????..? 000f - ?? ?? ?? ?? ?? ?? ?? 01-04 80 00 75 30 03 02 ???????....u0.. - 001e - 44 b0 0e 01 04 04 04 80-20 00 00 05 04 80 10 D....... ...... - 002d - 00 00 06 04 80 10 00 00-07 04 80 10 00 00 08 ............... - 003c - 01 01 09 01 00 ..... + 001e - 44 b0 0e 01 02 04 04 80-20 00 00 05 04 80 20 D....... ..... + 002d - 00 00 06 04 80 20 00 00-07 04 80 20 00 00 08 ..... ..... ... + 003c - 02 40 64 09 02 40 64 .@d..@d extension_type=application_layer_protocol_negotiation(16), length=11 ossltest @@ -234,22 +234,22 @@ YeeuLO02zToHhnQ6KbPXOrQAqcL1kngO4g+j/ru+4AZThFkdkGnltvk= No extensions Received Datagram - Length: 254 + Length: 256 Received Packet Packet Type: Handshake Version: 0x00000001 Destination Conn Id: <zero length id> Source Conn Id: 0x???????????????? - Payload length: 211 + Payload length: 213 Packet Number: 0x00000001 Received Frame: Crypto Offset: 1022 - Len: 190 + Len: 192 Received TLS Record Header: Version = TLS 1.2 (0x303) Content Type = ApplicationData (23) - Length = 190 + Length = 192 Inner Content Type = Handshake (22) CertificateVerify, Length=260 Signature Algorithm: rsa_pss_rsae_sha256 (0x0804) |