X-Git-Url: https://git.librecmc.org/?a=blobdiff_plain;f=fuzz%2Fclient.c;h=7ce609ca6a033be31ba44462d358d33b342f07fc;hb=cd5e2b0a689a7b22bd470e70ed0b8c84305d6d03;hp=104938f42dd8ea552b0cf70f45a3be799e59f049;hpb=b12ae4a912a19cbab8d993e61114e65fce0d1834;p=oweals%2Fopenssl.git diff --git a/fuzz/client.c b/fuzz/client.c index 104938f42d..7ce609ca6a 100644 --- a/fuzz/client.c +++ b/fuzz/client.c @@ -1,5 +1,5 @@ /* - * Copyright 2016 The OpenSSL Project Authors. All Rights Reserved. + * Copyright 2016-2018 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the OpenSSL licenses, (the "License"); * you may not use this file except in compliance with the License. @@ -18,10 +18,7 @@ #include #include "fuzzer.h" -#ifdef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -extern int rand_predictable; -#endif -#define ENTROPY_NEEDED 32 +#include "rand.inc" /* unused, to avoid warning. */ static int idx; @@ -50,15 +47,10 @@ int FuzzerInitialize(int *argc, char ***argv) ERR_get_state(); CRYPTO_free_ex_index(0, -1); idx = SSL_get_ex_data_X509_STORE_CTX_idx(); - RAND_add("", 1, ENTROPY_NEEDED); - RAND_status(); + FuzzerSetRand(); comp_methods = SSL_COMP_get_compression_methods(); - OPENSSL_sk_sort((OPENSSL_STACK *)comp_methods); - - -#ifdef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION - rand_predictable = 1; -#endif + if (comp_methods != NULL) + sk_SSL_COMP_sort(comp_methods); return 1; } @@ -81,6 +73,7 @@ int FuzzerTestOneInput(const uint8_t *buf, size_t len) ctx = SSL_CTX_new(SSLv23_method()); client = SSL_new(ctx); + OPENSSL_assert(SSL_set_min_proto_version(client, 0) == 1); OPENSSL_assert(SSL_set_cipher_list(client, "ALL:eNULL:@SECLEVEL=0") == 1); SSL_set_tlsext_host_name(client, "localhost"); in = BIO_new(BIO_s_mem());