From: Kurt Roeckx <kurt@roeckx.be> Date: Thu, 15 Dec 2016 19:11:18 +0000 (+0100) Subject: Make client and server fuzzer support all ciphers X-Git-Tag: OpenSSL_1_1_1-pre1~2839 X-Git-Url: https://granicus.if.org/sourcecode?a=commitdiff_plain;h=4e9954799aaf6a9012603ed35b9168f2001e668d;p=openssl Make client and server fuzzer support all ciphers Also send a SNI extension in the client so the fuzzer can react to it. Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #2088 --- diff --git a/fuzz/client.c b/fuzz/client.c index 391e0cce9f..d4dffd7c3a 100644 --- a/fuzz/client.c +++ b/fuzz/client.c @@ -63,6 +63,8 @@ int FuzzerTestOneInput(const uint8_t *buf, size_t len) ctx = SSL_CTX_new(SSLv23_method()); client = SSL_new(ctx); + OPENSSL_assert(SSL_set_cipher_list(client, "ALL:eNULL:@SECLEVEL=0") == 1); + SSL_set_tlsext_host_name(client, "localhost"); in = BIO_new(BIO_s_mem()); out = BIO_new(BIO_s_mem()); SSL_set_bio(client, in, out); diff --git a/fuzz/server.c b/fuzz/server.c index 3b5df9dc42..c2c54b9e25 100644 --- a/fuzz/server.c +++ b/fuzz/server.c @@ -258,6 +258,8 @@ int FuzzerTestOneInput(const uint8_t *buf, size_t len) X509_free(cert); server = SSL_new(ctx); + ret = SSL_set_cipher_list(server, "ALL:eNULL:@SECLEVEL=0"); + OPENSSL_assert(ret == 1); in = BIO_new(BIO_s_mem()); out = BIO_new(BIO_s_mem()); SSL_set_bio(server, in, out);