X-Git-Url: https://git.openssl.org/gitweb/?a=blobdiff_plain;f=fuzz%2Fclient.c;h=451989773ad7b5c5a49984114adbb5c0f0b03b63;hb=bdbf2df2e685ae653f3c683ce2f734eb0c0888e0;hp=622d782b2cb3783f07bf41cab3e02b5f81905e7f;hpb=14a6570f318562faf850f842ef3ce56f54ddc890;p=openssl.git diff --git a/fuzz/client.c b/fuzz/client.c index 622d782b2c..451989773a 100644 --- a/fuzz/client.c +++ b/fuzz/client.c @@ -1,7 +1,7 @@ /* - * Copyright 2016 The OpenSSL Project Authors. All Rights Reserved. + * Copyright 2016-2018 The OpenSSL Project Authors. All Rights Reserved. * - * Licensed under the OpenSSL licenses, (the "License"); + * Licensed under the Apache License 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * https://www.openssl.org/source/license.html @@ -18,10 +18,7 @@ #include #include "fuzzer.h" -#ifdef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -extern int rand_predictable; -#endif -#define ENTROPY_NEEDED 32 +#include "rand.inc" /* unused, to avoid warning. */ static int idx; @@ -31,15 +28,13 @@ static int idx; #define TIME_IMPL(t) { if (t != NULL) *t = FUZZTIME; return FUZZTIME; } /* - * This might not in all cases and still get the current time - * instead of the fixed time. This will just result in things - * not being fully reproducible and have a slightly different - * coverage. + * This might not work in all cases (and definitely not on Windows + * because of the way linkers are) and callees can still get the + * current time instead of the fixed time. This will just result + * in things not being fully reproducible and have a slightly + * different coverage. */ -#if defined(_WIN32) && defined(_TIME64_T_DEFINED) -time64_t _time64(time64_t *t) TIME_IMPL(t) -#endif -#if !defined(_WIN32) || !defined(_MSC_VER) +#if !defined(_WIN32) time_t time(time_t *t) TIME_IMPL(t) #endif @@ -49,18 +44,13 @@ int FuzzerInitialize(int *argc, char ***argv) OPENSSL_init_crypto(OPENSSL_INIT_LOAD_CRYPTO_STRINGS | OPENSSL_INIT_ASYNC, NULL); OPENSSL_init_ssl(OPENSSL_INIT_LOAD_SSL_STRINGS, NULL); - ERR_get_state(); + ERR_clear_error(); CRYPTO_free_ex_index(0, -1); idx = SSL_get_ex_data_X509_STORE_CTX_idx(); - RAND_add("", 1, ENTROPY_NEEDED); - RAND_status(); + FuzzerSetRand(); comp_methods = SSL_COMP_get_compression_methods(); - OPENSSL_sk_sort((OPENSSL_STACK *)comp_methods); - - -#ifdef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION - rand_predictable = 1; -#endif + if (comp_methods != NULL) + sk_SSL_COMP_sort(comp_methods); return 1; } @@ -83,6 +73,7 @@ int FuzzerTestOneInput(const uint8_t *buf, size_t len) ctx = SSL_CTX_new(SSLv23_method()); client = SSL_new(ctx); + OPENSSL_assert(SSL_set_min_proto_version(client, 0) == 1); OPENSSL_assert(SSL_set_cipher_list(client, "ALL:eNULL:@SECLEVEL=0") == 1); SSL_set_tlsext_host_name(client, "localhost"); in = BIO_new(BIO_s_mem());