summaryrefslogtreecommitdiff
path: root/test
diff options
context:
space:
mode:
authorTomas Mraz <tomas@openssl.org>2021-05-28 16:57:22 +0200
committerTomas Mraz <tomas@openssl.org>2021-06-01 12:43:57 +0200
commitc4e91674371404accba3891cbe9d7f976926a337 (patch)
treea67a1ea7191bb4ba5c52d24c03719f258dfa8479 /test
parented576acdf591d4164905ab98e89ca5a3b99d90ab (diff)
downloadopenssl-new-c4e91674371404accba3891cbe9d7f976926a337.tar.gz
Rename also the OSSL_PROVIDER_name() function
Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/15405)
Diffstat (limited to 'test')
-rw-r--r--test/defltfips_test.c4
-rw-r--r--test/provider_fallback_test.c2
-rw-r--r--test/provider_internal_test.c2
3 files changed, 4 insertions, 4 deletions
diff --git a/test/defltfips_test.c b/test/defltfips_test.c
index a2325a19fc..21c5e1524d 100644
--- a/test/defltfips_test.c
+++ b/test/defltfips_test.c
@@ -36,8 +36,8 @@ static int test_is_fips_enabled(void)
if (!TEST_ptr(sha256))
return 0;
if (is_fips
- && !TEST_str_eq(OSSL_PROVIDER_name(EVP_MD_get0_provider(sha256)),
- "fips")) {
+ && !TEST_str_eq(OSSL_PROVIDER_get0_name(EVP_MD_get0_provider(sha256)),
+ "fips")) {
EVP_MD_free(sha256);
return 0;
}
diff --git a/test/provider_fallback_test.c b/test/provider_fallback_test.c
index 0e38bd8605..116a2f4965 100644
--- a/test/provider_fallback_test.c
+++ b/test/provider_fallback_test.c
@@ -21,7 +21,7 @@ static int test_provider(OSSL_LIB_CTX *ctx)
ok = TEST_true(OSSL_PROVIDER_available(ctx, "default"))
&& TEST_ptr(rsameth = EVP_KEYMGMT_fetch(ctx, "RSA", NULL))
&& TEST_ptr(prov = EVP_KEYMGMT_get0_provider(rsameth))
- && TEST_str_eq(OSSL_PROVIDER_name(prov), "default");
+ && TEST_str_eq(OSSL_PROVIDER_get0_name(prov), "default");
EVP_KEYMGMT_free(rsameth);
return ok;
diff --git a/test/provider_internal_test.c b/test/provider_internal_test.c
index 451d0f61b0..7a37ef8c24 100644
--- a/test/provider_internal_test.c
+++ b/test/provider_internal_test.c
@@ -118,7 +118,7 @@ static int test_cache_flushes(void)
goto err;
if (!TEST_ptr_null(md = EVP_MD_fetch(ctx, "SHA256", NULL))) {
- const char *provname = OSSL_PROVIDER_name(EVP_MD_get0_provider(md));
+ const char *provname = OSSL_PROVIDER_get0_name(EVP_MD_get0_provider(md));
if (OSSL_PROVIDER_available(NULL, provname))
TEST_info("%s provider is available\n", provname);