Make client and server fuzzer support all ciphers

Also send a SNI extension in the client so the fuzzer can react to it.

Reviewed-by: Rich Salz <rsalz@openssl.org>
GH: #2088
This commit is contained in:
Kurt Roeckx 2016-12-15 20:11:18 +01:00
parent e104d01deb
commit 4e9954799a
2 changed files with 4 additions and 0 deletions

View File

@ -63,6 +63,8 @@ int FuzzerTestOneInput(const uint8_t *buf, size_t len)
ctx = SSL_CTX_new(SSLv23_method());
client = SSL_new(ctx);
OPENSSL_assert(SSL_set_cipher_list(client, "ALL:eNULL:@SECLEVEL=0") == 1);
SSL_set_tlsext_host_name(client, "localhost");
in = BIO_new(BIO_s_mem());
out = BIO_new(BIO_s_mem());
SSL_set_bio(client, in, out);

View File

@ -258,6 +258,8 @@ int FuzzerTestOneInput(const uint8_t *buf, size_t len)
X509_free(cert);
server = SSL_new(ctx);
ret = SSL_set_cipher_list(server, "ALL:eNULL:@SECLEVEL=0");
OPENSSL_assert(ret == 1);
in = BIO_new(BIO_s_mem());
out = BIO_new(BIO_s_mem());
SSL_set_bio(server, in, out);