boringssl/ssl
Matthew Braithwaite e30fac6371 Fuzz SSL_serialize_handoff() and SSL_serialize_handback().
This is done by adding two new tagged data types to the shim's
transcript: one for the serialized handoff, and another for the
serialized handback.

Then, the handshake driver in |TLSFuzzer| is modified to be able to
drive a handoff+handback sequence in the same way as was done for
testing: by swapping |BIO|s into additional |SSL| objects.  (If a
particular transcript does not contain a serialized handoff, this is a
no-op.)

Change-Id: Iab23e4dc27959ffd3d444adc41d40a4274e83653
Reviewed-on: https://boringssl-review.googlesource.com/27204
Commit-Queue: Matt Braithwaite <mab@google.com>
CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org>
Reviewed-by: Adam Langley <agl@google.com>
2018-05-05 02:41:04 +00:00
..
test Fuzz SSL_serialize_handoff() and SSL_serialize_handback(). 2018-05-05 02:41:04 +00:00
bio_ssl.cc Switch a number of files to C++. 2017-07-12 20:54:02 +00:00
CMakeLists.txt Add initial, experimental support for split handshakes. 2018-01-31 22:24:17 +00:00
custom_extensions.cc
d1_both.cc Avoid compiler errors for Android ARMv7. 2018-05-03 19:11:34 +00:00
d1_lib.cc
d1_pkt.cc
d1_srtp.cc Move srtp_profiles to SSL_CONFIG. 2018-05-03 15:20:13 +00:00
dtls_method.cc Remove trailing whitespace from ssl/. 2018-02-26 22:05:13 +00:00
dtls_record.cc Use the actual record header, rather than reassembling it. 2018-04-10 19:52:33 +00:00
handoff.cc SSL_apply_handback: check session is where it's expected to be. 2018-05-05 02:25:24 +00:00
handshake_client.cc SSL_CONFIG: new struct for sheddable handshake configuration. 2018-05-01 20:40:16 +00:00
handshake_server.cc SSL_CONFIG: new struct for sheddable handshake configuration. 2018-05-01 20:40:16 +00:00
handshake.cc SSL_CONFIG: new struct for sheddable handshake configuration. 2018-05-01 20:40:16 +00:00
internal.h SSL_apply_handback: check that SSL version is valid. 2018-05-04 18:27:34 +00:00
s3_both.cc Avoid compiler errors for Android ARMv7. 2018-05-03 19:11:34 +00:00
s3_lib.cc SSL_CONFIG: new struct for sheddable handshake configuration. 2018-05-01 20:40:16 +00:00
s3_pkt.cc
span_test.cc
ssl_aead_ctx.cc Use the actual record header, rather than reassembling it. 2018-04-10 19:52:33 +00:00
ssl_asn1.cc
ssl_buffer.cc
ssl_cert.cc SSL_CONFIG: new struct for sheddable handshake configuration. 2018-05-01 20:40:16 +00:00
ssl_cipher.cc Temporarily restore SHA256 and SHA384 cipher suite aliases. 2018-05-03 15:48:50 +00:00
ssl_file.cc Avoid modifying stack in sk_find. 2018-04-12 21:02:12 +00:00
ssl_key_share.cc Check for nullptr result of SSLKeyShare::Create(). 2018-04-10 22:55:53 +00:00
ssl_lib.cc Fuzz SSL_serialize_handoff() and SSL_serialize_handback(). 2018-05-05 02:41:04 +00:00
ssl_privkey.cc SSL_CONFIG: new struct for sheddable handshake configuration. 2018-05-01 20:40:16 +00:00
ssl_session.cc Consistently use session_ctx for session caching. 2018-05-02 20:15:08 +00:00
ssl_stat.cc Remove trailing whitespace from ssl/. 2018-02-26 22:05:13 +00:00
ssl_test.cc Remove legacy SHA-2 CBC ciphers. 2018-05-02 19:21:56 +00:00
ssl_transcript.cc Hand back ECDHE split handshakes after the first server message. 2018-04-04 17:58:15 +00:00
ssl_versions.cc SSL_apply_handback: check that SSL version is valid. 2018-05-04 18:27:34 +00:00
ssl_x509.cc SSL_CONFIG: new struct for sheddable handshake configuration. 2018-05-01 20:40:16 +00:00
t1_enc.cc Add initial, experimental support for split handshakes. 2018-01-31 22:24:17 +00:00
t1_lib.cc Consistently use session_ctx for session caching. 2018-05-02 20:15:08 +00:00
tls13_both.cc SSL_CONFIG: new struct for sheddable handshake configuration. 2018-05-01 20:40:16 +00:00
tls13_client.cc Consistently use session_ctx for session caching. 2018-05-02 20:15:08 +00:00
tls13_enc.cc
tls13_server.cc Consistently use session_ctx for session caching. 2018-05-02 20:15:08 +00:00
tls_method.cc SSL_CONFIG: new struct for sheddable handshake configuration. 2018-05-01 20:40:16 +00:00
tls_record.cc Use the actual record header, rather than reassembling it. 2018-04-10 19:52:33 +00:00