|  | @@ -840,8 +840,10 @@ test_tortls_classify_client_ciphers(void *ignored)
 | 
	
		
			
				|  |  |    sk_SSL_CIPHER_zero(ciphers);
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |    one = get_cipher_by_name("ECDHE-RSA-AES256-GCM-SHA384");
 | 
	
		
			
				|  |  | +  tt_assert(one);
 | 
	
		
			
				|  |  |    one->id = 0x00ff;
 | 
	
		
			
				|  |  |    two = get_cipher_by_name("ECDHE-RSA-AES128-GCM-SHA256");
 | 
	
		
			
				|  |  | +  tt_assert(two);
 | 
	
		
			
				|  |  |    two->id = 0x0000;
 | 
	
		
			
				|  |  |    sk_SSL_CIPHER_push(ciphers, one);
 | 
	
		
			
				|  |  |    tls->client_cipher_list_type = 0;
 | 
	
	
		
			
				|  | @@ -912,6 +914,7 @@ test_tortls_client_is_using_v2_ciphers(void *ignored)
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |    ciphers = sk_SSL_CIPHER_new_null();
 | 
	
		
			
				|  |  |    SSL_CIPHER *one = get_cipher_by_name("ECDHE-RSA-AES256-GCM-SHA384");
 | 
	
		
			
				|  |  | +  tt_assert(one);
 | 
	
		
			
				|  |  |    one->id = 0x00ff;
 | 
	
		
			
				|  |  |    sk_SSL_CIPHER_push(ciphers, one);
 | 
	
		
			
				|  |  |    sess->ciphers = ciphers;
 |