Enable all curves (inc CECPQ2) during fuzzing.

Change-Id: I8083e841de135e9ec244609b1c20f0280ce20072
Reviewed-on: https://boringssl-review.googlesource.com/c/34664
Reviewed-by: David Benjamin <davidben@google.com>
This commit is contained in:
Adam Langley 2019-01-29 07:32:23 -08:00 committed by Adam Langley
parent 70fe610556
commit fcc1ad78f9
2 changed files with 8 additions and 1 deletions

View File

@ -300,7 +300,7 @@ static const uint16_t kDefaultGroupsServer[] = {
SSL_CURVE_X25519, SSL_CURVE_X25519,
SSL_CURVE_SECP256R1, SSL_CURVE_SECP256R1,
SSL_CURVE_SECP384R1, SSL_CURVE_SECP384R1,
};; };
Span<const uint16_t> tls1_get_grouplist(const SSL_HANDSHAKE *hs) { Span<const uint16_t> tls1_get_grouplist(const SSL_HANDSHAKE *hs) {
if (!hs->config->supported_group_list.empty()) { if (!hs->config->supported_group_list.empty()) {

View File

@ -414,6 +414,13 @@ class TLSFuzzer {
return false; return false;
} }
static const int kCurves[] = {NID_CECPQ2, NID_X25519, NID_X9_62_prime256v1,
NID_secp384r1, NID_secp521r1};
if (!SSL_CTX_set1_curves(ctx_.get(), kCurves,
OPENSSL_ARRAY_SIZE(kCurves))) {
return false;
}
SSL_CTX_set_early_data_enabled(ctx_.get(), 1); SSL_CTX_set_early_data_enabled(ctx_.get(), 1);
SSL_CTX_set_next_proto_select_cb(ctx_.get(), NPNSelectCallback, nullptr); SSL_CTX_set_next_proto_select_cb(ctx_.get(), NPNSelectCallback, nullptr);