crypto/tls: fix clientHelloMsg fuzzer not to generate the RI SCSV
It was causing mysterious fuzzing failure because it affects the unmarshaling of the secureNegotiationSupported field. Change-Id: Id396b84eab90a3b22fb6e306b10bdd7e39707012 Reviewed-on: https://go-review.googlesource.com/60912 Run-TryBot: Filippo Valsorda <hi@filippo.io> TryBot-Result: Gobot Gobot <gobot@golang.org> Reviewed-by: Adam Langley <agl@golang.org>
Tento commit je obsažen v:
rodič
50729f1a6c
revize
2fda84b4f0
@ -116,7 +116,11 @@ func (*clientHelloMsg) Generate(rand *rand.Rand, size int) reflect.Value {
|
|||||||
m.sessionId = randomBytes(rand.Intn(32), rand)
|
m.sessionId = randomBytes(rand.Intn(32), rand)
|
||||||
m.cipherSuites = make([]uint16, rand.Intn(63)+1)
|
m.cipherSuites = make([]uint16, rand.Intn(63)+1)
|
||||||
for i := 0; i < len(m.cipherSuites); i++ {
|
for i := 0; i < len(m.cipherSuites); i++ {
|
||||||
m.cipherSuites[i] = uint16(rand.Int31())
|
cs := uint16(rand.Int31())
|
||||||
|
if cs == scsvRenegotiation {
|
||||||
|
cs += 1
|
||||||
|
}
|
||||||
|
m.cipherSuites[i] = cs
|
||||||
}
|
}
|
||||||
m.compressionMethods = randomBytes(rand.Intn(63)+1, rand)
|
m.compressionMethods = randomBytes(rand.Intn(63)+1, rand)
|
||||||
if rand.Intn(10) > 5 {
|
if rand.Intn(10) > 5 {
|
||||||
|
Načítá se…
Odkázat v novém úkolu
Zablokovat Uživatele