Fix fuzzer build. I'm going to work on adding these to CI, since we keep breaking it on accident. Change-Id: I9acd4d3fa7b00c4f0cb0f187dae6bb9c51997515 Reviewed-on: https://boringssl-review.googlesource.com/16125 Reviewed-by: Steven Valdez <svaldez@google.com> Commit-Queue: David Benjamin <davidben@google.com> CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org>
diff --git a/fuzz/client.cc b/fuzz/client.cc index ee75a7c..d7361c8 100644 --- a/fuzz/client.cc +++ b/fuzz/client.cc
@@ -270,7 +270,7 @@ SSL_set_bio(client, in, out); SSL_set_connect_state(client); SSL_set_renegotiate_mode(client, ssl_renegotiate_freely); - SSL_set_max_version(client, TLS1_3_VERSION); + SSL_set_max_proto_version(client, TLS1_3_VERSION); SSL_enable_ocsp_stapling(client); SSL_enable_signed_cert_timestamps(client); SSL_set_tlsext_host_name(client, "hostname");
diff --git a/fuzz/server.cc b/fuzz/server.cc index af1696c..2d259fb 100644 --- a/fuzz/server.cc +++ b/fuzz/server.cc
@@ -271,7 +271,7 @@ BIO *out = BIO_new(BIO_s_mem()); SSL_set_bio(server, in, out); SSL_set_accept_state(server); - SSL_set_max_version(server, TLS1_3_VERSION); + SSL_set_max_proto_version(server, TLS1_3_VERSION); SSL_set_tls_channel_id_enabled(server, 1); // Enable ciphers that are off by default.