summaryrefslogtreecommitdiffstats
path: root/fuzz
AgeCommit message (Collapse)Author
2017-01-09Fix build issues with no-dh, no-dsa and no-ecRichard Levitte
Reviewed-by: Kurt Roeckx <kurt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/2192)
2017-01-06Update fuzz corporaKurt Roeckx
Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #2182
2017-01-06Make client and server fuzzer reproducibleKurt Roeckx
Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #2182
2017-01-06Make the bignum fuzzer reproducibleKurt Roeckx
Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #2182
2017-01-06Update fuzz documentationKurt Roeckx
Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #2182
2017-01-06server fuzzer: add support for DSA and ECDSAKurt Roeckx
Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #2182
2016-12-19Update fuzz corporaKurt Roeckx
Reviewed-by: Richard Levitte <levitte@openssl.org> GH: #2090
2016-12-16Make client and server fuzzer support all ciphersKurt Roeckx
Also send a SNI extension in the client so the fuzzer can react to it. Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #2088
2016-12-16Document the recommended parameters for fuzzingKurt Roeckx
We use those parameters for calculating the coverage. Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #2088
2016-12-09Update client fuzz corpusKurt Roeckx
Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #2060
2016-12-09Update client fuzzer corpusKurt Roeckx
Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #2053
2016-12-08Fuzz corpora updateKurt Roeckx
Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #2041
2016-12-08And client fuzzerKurt Roeckx
Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #2041
2016-12-08Make asn1 fuzzer more reproducibleKurt Roeckx
Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #2041
2016-12-03Make the fuzzers more reproducibleKurt Roeckx
We want to be in the same global state each time we come in FuzzerTestOneInput(). There are various reasons why we might not be that include: - Initialization that happens on first use. This is mostly the RUN_ONCE() things, or loading of error strings. - Results that get cached. For instance a stack that is sorted, RSA blinding that has been set up, ... So I try to trigger as much as possible in FuzzerInitialize(), and for things I didn't find out how to trigger this it needs to happen in FuzzerTestOneInput(). Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #2023
2016-12-03Move libfuzzer sanitizer options to READMEKurt Roeckx
This is something you might want to change depending on the version to use, there is no point in us fixing this to something. Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #2023
2016-12-03CMS fuzzer: also use id2Kurt Roeckx
Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #2023
2016-12-03Make the random number generator predictable when fuzzing.Kurt Roeckx
Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #2023
2016-12-03bndiv fuzzer: move new and free calls to the init and cleanup function.Kurt Roeckx
Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #2023
2016-12-03bignum fuzzer: move new and free calls to the init and cleanup function.Kurt Roeckx
Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #2023
2016-12-03asn1parse: create the out bio during init, free it during cleanupKurt Roeckx
Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #2023
2016-12-03Add a FuzzerClean() functionKurt Roeckx
This allows to free everything we allocated, so we can detect memory leaks. Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #2023
2016-12-03FuzzerInitialize always existsKurt Roeckx
There was a time it could be NULL, but that was changed to always have it. Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #2023
2016-12-03Fix formatting of fuzzersKurt Roeckx
Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #2023
2016-11-12Update fuzz corporaKurt Roeckx
New minimal fuzz corpora set Reviewed-by: Andy Polyakov <appro@openssl.org> GH: #1910
2016-11-03conf fuzzer: also check for an empty fileKurt Roeckx
Reviewed-by: Tim Hudson <tjh@openssl.org> Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #1828
2016-11-02Fix link to LibFuzzerSergey Bronnikov
CLA: trivial Reviewed-by: Kurt Roeckx <kurt@openssl.org> Reviewed-by: Rich Salz <rsalz@openssl.org> (Merged from https://github.com/openssl/openssl/pull/1801)
2016-11-01[fuzzers] do not fail fuzzers with empty inputMike Aizatsky
Reviewed-by: Kurt Roeckx <kurt@roeckx.be> Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #1788
2016-10-10Update fuzz corporaKurt Roeckx
New minimal fuzz corpora for asn1, asn1parse, bndiv, crl and x509 Reviewed-by: Andy Polyakov <appro@openssl.org> GH: #1678
2016-09-26Add to fuzz corpora for CVE-2016-6309Robert Swiecki
Reviewed-by: Emilia Käsper <emilia@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org>
2016-08-23Update fuzz corporaKurt Roeckx
This is a new minimal corpus with the following changes: - asn1: files: 1135 (+474), tuples: 27236 (+7496) - asn1parse: files: 305 (-3), tuples: 8758 (+11) - bignum: files: 370 (-1), tuples: 9547 (+10) - bndiv: files: 160 (+0), tuples: 2416 (+6) - cms: files: 155 (-1), tuples: 3408 (+0) - conf: files: 231 (-11), tuples: 4668 (+3) - crl: files: 905 (+188), tuples: 22876 (+4096) - ct: files: 117 (+35), tuples: 3557 (+908) - x509: files: 920, tuples: 28334 Note that tuple count depends on the binary and is random. Reviewed-by: Emilia Käsper <emilia@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org>
2016-08-01Some minor tweaks to the fuzzing docsMatt Caswell
Reviewed-by: Rich Salz <rsalz@openssl.org>
2016-08-01Include what we use.Ben Laurie
Reviewed-by: Rich Salz <rsalz@openssl.org>
2016-08-01Fix various no-*s.Ben Laurie
Reviewed-by: Rich Salz <rsalz@openssl.org>
2016-07-26Skip non-existing files.Kurt Roeckx
Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #1324
2016-07-25Fix no-ctMatt Caswell
Ensure that we don't build/run the ct fuzzing code if no-ct is used. Reviewed-by: Rich Salz <rsalz@openssl.org>
2016-07-20Add all publicly avaiable asn1 types to the asn1 fuzzer.Kurt Roeckx
Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #1331
2016-07-19Fix building with no-cmsMatt Caswell
The new fuzzing code broke no-cms Reviewed-by: Richard Levitte <levitte@openssl.org>
2016-07-18Use _NO_INST in some build.info filesRichard Levitte
Reviewed-by: Rich Salz <rsalz@openssl.org>
2016-07-18Fix strict-warnings buildMatt Caswell
The i2d_SCT_LIST function is declared as __owur, therefore we need to check the result or a --strict-warnings build will fail. Reviewed-by: Rich Salz <rsalz@openssl.org>
2016-07-16fuzzers: print and convert it backKurt Roeckx
Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #1323
2016-07-16Make fuzzer and fuzz tester builds less magicRichard Levitte
Instead of having fuzz/build.info.fuzz magically and conditionally included along with the other build.info files, incorporate it in fuzz/build.info and add the conditions there instead. Reviewed-by: Rich Salz <rsalz@openssl.org>
2016-07-10Don't rely on implicit rsa.h inclusionViktor Dukhovni
With no-deprecated, some nested includes don't happen by default. Reviewed-by: Rich Salz <rsalz@openssl.org>
2016-07-06Add OPENSSL_NO_EC wrapperRich Salz
Reviewed-by: Matt Caswell <matt@openssl.org>
2016-07-04Update fuzz/README.mdRich Salz
Reviewed-by: Kurt Roeckx <kurt@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org>
2016-07-01Simplify INCLUDE statements in build.info filesRichard Levitte
Now that INCLUDE considers both the source and build trees, no need for the rel2abs perl fragment hacks any more. Reviewed-by: Rich Salz <rsalz@openssl.org>
2016-07-01fix 'set but not used' warningDr. Stephen Henson
Reviewed-by: Rich Salz <rsalz@openssl.org>
2016-07-01Re-add x509 and crl fuzzerKurt Roeckx
Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #1276
2016-07-01Run the fuzzing corpora as tests.Ben Laurie
Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Rich Salz <rsalz@openssl.org>
2016-06-28Add comment about X509_printAlex Gaynor
Signed-off-by: Kurt Roeckx <kurt@roeckx.be> Reviewed-by: Emilia Kasper <emilia@openssl.org> GH: #1255