From: Kurt Roeckx <kurt@roeckx.be>
Date: Thu, 15 Dec 2016 19:11:18 +0000 (+0100)
Subject: Make client and server fuzzer support all ciphers
X-Git-Tag: OpenSSL_1_1_1-pre1~2839
X-Git-Url: https://granicus.if.org/sourcecode?a=commitdiff_plain;h=4e9954799aaf6a9012603ed35b9168f2001e668d;p=openssl

Make client and server fuzzer support all ciphers

Also send a SNI extension in the client so the fuzzer can react to it.

Reviewed-by: Rich Salz <rsalz@openssl.org>
GH: #2088
---

diff --git a/fuzz/client.c b/fuzz/client.c
index 391e0cce9f..d4dffd7c3a 100644
--- a/fuzz/client.c
+++ b/fuzz/client.c
@@ -63,6 +63,8 @@ int FuzzerTestOneInput(const uint8_t *buf, size_t len)
     ctx = SSL_CTX_new(SSLv23_method());
 
     client = SSL_new(ctx);
+    OPENSSL_assert(SSL_set_cipher_list(client, "ALL:eNULL:@SECLEVEL=0") == 1);
+    SSL_set_tlsext_host_name(client, "localhost");
     in = BIO_new(BIO_s_mem());
     out = BIO_new(BIO_s_mem());
     SSL_set_bio(client, in, out);
diff --git a/fuzz/server.c b/fuzz/server.c
index 3b5df9dc42..c2c54b9e25 100644
--- a/fuzz/server.c
+++ b/fuzz/server.c
@@ -258,6 +258,8 @@ int FuzzerTestOneInput(const uint8_t *buf, size_t len)
     X509_free(cert);
 
     server = SSL_new(ctx);
+    ret = SSL_set_cipher_list(server, "ALL:eNULL:@SECLEVEL=0");
+    OPENSSL_assert(ret == 1);
     in = BIO_new(BIO_s_mem());
     out = BIO_new(BIO_s_mem());
     SSL_set_bio(server, in, out);