boringssl/ssl
David Benjamin fbc45d7228 No-op ticket encryption in fuzzer mode.
This allows the fuzzer to discover server-side resumption paths by
simply supplying what we'd like the ticket to decrypt to in the clear.
We also have a natural way to get transcripts out of runner. We record
the runner-side transcripts, so all resumption handshakes will replay
the shim-created unencrypted tickets.

BUG=104

Change-Id: Icf9cbf4af520077d38e2c8c2766b6f8bfa3c9ab5
Reviewed-on: https://boringssl-review.googlesource.com/11224
Commit-Queue: David Benjamin <davidben@google.com>
Commit-Queue: Adam Langley <agl@google.com>
Reviewed-by: Adam Langley <agl@google.com>
CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org>
2016-09-22 21:26:23 +00:00
..
test Fix remaining non-determinism in fuzzer transcripts. 2016-09-22 21:14:00 +00:00
CMakeLists.txt
custom_extensions.c Use C99 for size_t loops. 2016-09-12 19:44:24 +00:00
d1_both.c Take the version parameter out of ssl_do_msg_callback. 2016-09-21 18:55:27 +00:00
d1_lib.c Remove RC4 from TLS for real. 2016-09-16 03:06:36 +00:00
d1_pkt.c Take the version parameter out of ssl_do_msg_callback. 2016-09-21 18:55:27 +00:00
d1_srtp.c
dtls_method.c Don't return invalid versions in version_from_wire. 2016-09-21 19:51:45 +00:00
dtls_record.c Take the version parameter out of ssl_do_msg_callback. 2016-09-21 18:55:27 +00:00
handshake_client.c Don't return invalid versions in version_from_wire. 2016-09-21 19:51:45 +00:00
handshake_server.c Add a InvalidChannelIDSignature test. 2016-09-22 20:41:41 +00:00
internal.h Only predict X25519 in TLS 1.3. 2016-09-21 21:18:34 +00:00
s3_both.c Only predict X25519 in TLS 1.3. 2016-09-21 21:18:34 +00:00
s3_enc.c Splitting SSL session state. 2016-07-29 21:22:46 +00:00
s3_lib.c Move peer_psk_identity_hint to SSL_HANDSHAKE. 2016-09-20 22:37:24 +00:00
s3_pkt.c Take the version parameter out of ssl_do_msg_callback. 2016-09-21 18:55:27 +00:00
ssl_aead_ctx.c Use C99 for size_t loops. 2016-09-12 19:44:24 +00:00
ssl_asn1.c Use C99 for size_t loops. 2016-09-12 19:44:24 +00:00
ssl_buffer.c Add SSL_is_dtls. 2016-08-02 20:43:58 +00:00
ssl_cert.c Use C99 for size_t loops. 2016-09-12 19:44:24 +00:00
ssl_cipher.c Remove RC4 from TLS for real. 2016-09-16 03:06:36 +00:00
ssl_ecdh.c Use C99 for size_t loops. 2016-09-12 19:44:24 +00:00
ssl_file.c
ssl_lib.c Fix remaining non-determinism in fuzzer transcripts. 2016-09-22 21:14:00 +00:00
ssl_rsa.c Fix a number of sigalg scope issues. 2016-08-24 00:24:34 +00:00
ssl_session.c No-op ticket encryption in fuzzer mode. 2016-09-22 21:26:23 +00:00
ssl_stat.c Factor out the client_cert_cb code. 2016-07-20 09:25:52 +00:00
ssl_test.cc Support default versions with set_{min,max}_proto_version. 2016-09-21 21:41:49 +00:00
t1_enc.c Splitting SSL session state. 2016-07-29 21:22:46 +00:00
t1_lib.c No-op ticket encryption in fuzzer mode. 2016-09-22 21:26:23 +00:00
tls13_both.c Implement BORINGSSL_UNSAFE_FUZZER_MODE for TLS 1.3. 2016-08-19 19:11:34 +00:00
tls13_client.c Only predict X25519 in TLS 1.3. 2016-09-21 21:18:34 +00:00
tls13_enc.c const-correct a variable. 2016-09-06 18:19:37 +00:00
tls13_server.c Fix some bugs in TLS 1.3 server key_share code. 2016-09-21 20:40:10 +00:00
tls_method.c Don't return invalid versions in version_from_wire. 2016-09-21 19:51:45 +00:00
tls_record.c Take the version parameter out of ssl_do_msg_callback. 2016-09-21 18:55:27 +00:00