summaryrefslogtreecommitdiffstats
path: root/ssl
diff options
context:
space:
mode:
authorMatt Caswell <matt@openssl.org>2023-10-11 10:45:14 +0100
committerMatt Caswell <matt@openssl.org>2023-10-23 10:08:12 +0100
commitb62ac1abfcac4091cdf8e5e4194c9e3bcc6d382d (patch)
treed0df037614b1a30fe91114e110676fb32c894c19 /ssl
parentacee7d68e1037d18f34d03bcd70af6b1b6e48299 (diff)
Don't fail on a bad dcid in the tranport params when fuzzing
We accept a bad original destination connection id in the transport params while we are fuzzing since this may change every time. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22368)
Diffstat (limited to 'ssl')
-rw-r--r--ssl/quic/quic_channel.c2
1 files changed, 2 insertions, 0 deletions
diff --git a/ssl/quic/quic_channel.c b/ssl/quic/quic_channel.c
index 9e5b841622..ef6ad15087 100644
--- a/ssl/quic/quic_channel.c
+++ b/ssl/quic/quic_channel.c
@@ -1311,11 +1311,13 @@ static int ch_on_transport_params(const unsigned char *params,
goto malformed;
}
+#ifndef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
/* Must match our initial DCID. */
if (!ossl_quic_conn_id_eq(&ch->init_dcid, &cid)) {
reason = TP_REASON_EXPECTED_VALUE("ORIG_DCID");
goto malformed;
}
+#endif
got_orig_dcid = 1;
break;