diff options
author | Rich Salz <rsalz@openssl.org> | 2017-07-26 20:27:30 +0200 |
---|---|---|
committer | Rich Salz <rsalz@openssl.org> | 2017-07-27 01:27:54 +0200 |
commit | 9f08a1c63efa2205aca4361a830ac04407325597 (patch) | |
tree | a3ab9a036edf961cb6b09e5ed7f82919e6b456d5 /fuzz/fuzzer.h | |
parent | Fix the two new tests since approval. (diff) | |
download | openssl-9f08a1c63efa2205aca4361a830ac04407325597.tar.xz openssl-9f08a1c63efa2205aca4361a830ac04407325597.zip |
Install custom RAND_METHOD for fuzzing
Instead of setting a "magic" global variable to force RAND to keep
consistent state and always generate the same bytestream, have
the fuzzing code install its own RAND_METHOD that does this. For
BN_RAND_DEBUG, we just don't do it; that debugging was about mucking
with BN's internal representation, not requiring predictable rand
bytes.
Reviewed-by: Paul Dale <paul.dale@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/4025)
Diffstat (limited to 'fuzz/fuzzer.h')
-rw-r--r-- | fuzz/fuzzer.h | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/fuzz/fuzzer.h b/fuzz/fuzzer.h index 5f9efa4bf6..fcc0d25279 100644 --- a/fuzz/fuzzer.h +++ b/fuzz/fuzzer.h @@ -11,3 +11,4 @@ int FuzzerTestOneInput(const uint8_t *buf, size_t len); int FuzzerInitialize(int *argc, char ***argv); void FuzzerCleanup(void); +void FuzzerSetRand(void); |