Allow PSK binder mismatches in fuzzer mode. BUG=112 Change-Id: I88ef17e32e33b091ff1e27b7950f88e1d48f9278 Reviewed-on: https://boringssl-review.googlesource.com/12239 Reviewed-by: David Benjamin <davidben@google.com> Commit-Queue: David Benjamin <davidben@google.com> CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org>
diff --git a/ssl/tls13_enc.c b/ssl/tls13_enc.c index c846d9c..d87d8a6 100644 --- a/ssl/tls13_enc.c +++ b/ssl/tls13_enc.c
@@ -438,8 +438,12 @@ return 0; } - if (CBS_len(&binder) != hash_len || - CRYPTO_memcmp(CBS_data(&binder), verify_data, hash_len) != 0) { + int binder_ok = CBS_len(&binder) == hash_len && + CRYPTO_memcmp(CBS_data(&binder), verify_data, hash_len) == 0; +#if defined(BORINGSSL_UNSAFE_FUZZER_MODE) + binder_ok = 1; +#endif + if (!binder_ok) { OPENSSL_PUT_ERROR(SSL, SSL_R_DIGEST_CHECK_FAILED); return 0; }