Enable all curves (inc CECPQ2) during fuzzing.
Change-Id: I8083e841de135e9ec244609b1c20f0280ce20072 Reviewed-on: https://boringssl-review.googlesource.com/c/34664 Reviewed-by: David Benjamin <davidben@google.com>
This commit is contained in:
parent
70fe610556
commit
fcc1ad78f9
@ -300,7 +300,7 @@ static const uint16_t kDefaultGroupsServer[] = {
|
|||||||
SSL_CURVE_X25519,
|
SSL_CURVE_X25519,
|
||||||
SSL_CURVE_SECP256R1,
|
SSL_CURVE_SECP256R1,
|
||||||
SSL_CURVE_SECP384R1,
|
SSL_CURVE_SECP384R1,
|
||||||
};;
|
};
|
||||||
|
|
||||||
Span<const uint16_t> tls1_get_grouplist(const SSL_HANDSHAKE *hs) {
|
Span<const uint16_t> tls1_get_grouplist(const SSL_HANDSHAKE *hs) {
|
||||||
if (!hs->config->supported_group_list.empty()) {
|
if (!hs->config->supported_group_list.empty()) {
|
||||||
|
@ -414,6 +414,13 @@ class TLSFuzzer {
|
|||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static const int kCurves[] = {NID_CECPQ2, NID_X25519, NID_X9_62_prime256v1,
|
||||||
|
NID_secp384r1, NID_secp521r1};
|
||||||
|
if (!SSL_CTX_set1_curves(ctx_.get(), kCurves,
|
||||||
|
OPENSSL_ARRAY_SIZE(kCurves))) {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
SSL_CTX_set_early_data_enabled(ctx_.get(), 1);
|
SSL_CTX_set_early_data_enabled(ctx_.get(), 1);
|
||||||
|
|
||||||
SSL_CTX_set_next_proto_select_cb(ctx_.get(), NPNSelectCallback, nullptr);
|
SSL_CTX_set_next_proto_select_cb(ctx_.get(), NPNSelectCallback, nullptr);
|
||||||
|
Loading…
Reference in New Issue
Block a user