mirror of
https://github.com/openssl/openssl.git
synced 2025-01-30 14:01:55 +08:00
Make client and server fuzzer support all ciphers
Also send a SNI extension in the client so the fuzzer can react to it. Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #2088
This commit is contained in:
parent
e104d01deb
commit
4e9954799a
@ -63,6 +63,8 @@ int FuzzerTestOneInput(const uint8_t *buf, size_t len)
|
||||
ctx = SSL_CTX_new(SSLv23_method());
|
||||
|
||||
client = SSL_new(ctx);
|
||||
OPENSSL_assert(SSL_set_cipher_list(client, "ALL:eNULL:@SECLEVEL=0") == 1);
|
||||
SSL_set_tlsext_host_name(client, "localhost");
|
||||
in = BIO_new(BIO_s_mem());
|
||||
out = BIO_new(BIO_s_mem());
|
||||
SSL_set_bio(client, in, out);
|
||||
|
@ -258,6 +258,8 @@ int FuzzerTestOneInput(const uint8_t *buf, size_t len)
|
||||
X509_free(cert);
|
||||
|
||||
server = SSL_new(ctx);
|
||||
ret = SSL_set_cipher_list(server, "ALL:eNULL:@SECLEVEL=0");
|
||||
OPENSSL_assert(ret == 1);
|
||||
in = BIO_new(BIO_s_mem());
|
||||
out = BIO_new(BIO_s_mem());
|
||||
SSL_set_bio(server, in, out);
|
||||
|
Loading…
Reference in New Issue
Block a user