Pārlūkot izejas kodu

crypto/tls: fix clientHelloMsg fuzzer not to generate the RI SCSV

It was causing mysterious fuzzing failure because it affects the
unmarshaling of the secureNegotiationSupported field.
v1.2.3
EKR pirms 7 gadiem
committed by Peter Wu
vecāks
revīzija
ed06c77b1d
1 mainītis faili ar 5 papildinājumiem un 1 dzēšanām
  1. +5
    -1
      handshake_messages_test.go

+ 5
- 1
handshake_messages_test.go Parādīt failu

@@ -121,7 +121,11 @@ func (*clientHelloMsg) Generate(rand *rand.Rand, size int) reflect.Value {
m.sessionId = randomBytes(rand.Intn(32), rand)
m.cipherSuites = make([]uint16, rand.Intn(63)+1)
for i := 0; i < len(m.cipherSuites); i++ {
m.cipherSuites[i] = uint16(rand.Int31())
cs := uint16(rand.Int31())
if cs == scsvRenegotiation {
cs += 1
}
m.cipherSuites[i] = cs
}
m.compressionMethods = randomBytes(rand.Intn(63)+1, rand)
if rand.Intn(10) > 5 {


Notiek ielāde…
Atcelt
Saglabāt