Fix fuzzer build.
I'm going to work on adding these to CI, since we keep breaking it on
accident.
Change-Id: I9acd4d3fa7b00c4f0cb0f187dae6bb9c51997515
Reviewed-on: https://boringssl-review.googlesource.com/16125
Reviewed-by: Steven Valdez <svaldez@google.com>
Commit-Queue: David Benjamin <davidben@google.com>
CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org>
diff --git a/fuzz/client.cc b/fuzz/client.cc
index ee75a7c..d7361c8 100644
--- a/fuzz/client.cc
+++ b/fuzz/client.cc
@@ -270,7 +270,7 @@
SSL_set_bio(client, in, out);
SSL_set_connect_state(client);
SSL_set_renegotiate_mode(client, ssl_renegotiate_freely);
- SSL_set_max_version(client, TLS1_3_VERSION);
+ SSL_set_max_proto_version(client, TLS1_3_VERSION);
SSL_enable_ocsp_stapling(client);
SSL_enable_signed_cert_timestamps(client);
SSL_set_tlsext_host_name(client, "hostname");
diff --git a/fuzz/server.cc b/fuzz/server.cc
index af1696c..2d259fb 100644
--- a/fuzz/server.cc
+++ b/fuzz/server.cc
@@ -271,7 +271,7 @@
BIO *out = BIO_new(BIO_s_mem());
SSL_set_bio(server, in, out);
SSL_set_accept_state(server);
- SSL_set_max_version(server, TLS1_3_VERSION);
+ SSL_set_max_proto_version(server, TLS1_3_VERSION);
SSL_set_tls_channel_id_enabled(server, 1);
// Enable ciphers that are off by default.