aboutsummaryrefslogtreecommitdiffstats
path: root/fuzz
Commit message (Collapse)AuthorAgeFilesLines
* Update client, server and x509 fuzz corpusKurt Roeckx2017-02-216183-6/+3
| | | | | | Reviewed-by: Andy Polyakov <appro@openssl.org> Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #2682
* Update client and server corpusKurt Roeckx2017-01-294777-0/+1
| | | | | Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #2318
* Fix build issues with no-dh, no-dsa and no-ecRichard Levitte2017-01-092-0/+24
| | | | Reviewed-by: Kurt Roeckx <kurt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/2192)
* Update fuzz corporaKurt Roeckx2017-01-068085-237/+216
| | | | | Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #2182
* Make client and server fuzzer reproducibleKurt Roeckx2017-01-062-0/+12
| | | | | Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #2182
* Make the bignum fuzzer reproducibleKurt Roeckx2017-01-061-18/+23
| | | | | Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #2182
* Update fuzz documentationKurt Roeckx2017-01-061-5/+48
| | | | | Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #2182
* server fuzzer: add support for DSA and ECDSAKurt Roeckx2017-01-061-1/+321
| | | | | Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #2182
* Update fuzz corporaKurt Roeckx2016-12-192442-0/+0
| | | | | Reviewed-by: Richard Levitte <levitte@openssl.org> GH: #2090
* Make client and server fuzzer support all ciphersKurt Roeckx2016-12-162-0/+4
| | | | | | | Also send a SNI extension in the client so the fuzzer can react to it. Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #2088
* Document the recommended parameters for fuzzingKurt Roeckx2016-12-161-2/+10
| | | | | | | We use those parameters for calculating the coverage. Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #2088
* Update client fuzz corpusKurt Roeckx2016-12-09310-0/+0
| | | | | Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #2060
* Update client fuzzer corpusKurt Roeckx2016-12-091251-1/+0
| | | | | Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #2053
* Fuzz corpora updateKurt Roeckx2016-12-089069-1247/+3758
| | | | | Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #2041
* And client fuzzerKurt Roeckx2016-12-082-2/+99
| | | | | Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #2041
* Make asn1 fuzzer more reproducibleKurt Roeckx2016-12-081-8/+16
| | | | | Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #2041
* Make the fuzzers more reproducibleKurt Roeckx2016-12-038-27/+81
| | | | | | | | | | | | | | | | | We want to be in the same global state each time we come in FuzzerTestOneInput(). There are various reasons why we might not be that include: - Initialization that happens on first use. This is mostly the RUN_ONCE() things, or loading of error strings. - Results that get cached. For instance a stack that is sorted, RSA blinding that has been set up, ... So I try to trigger as much as possible in FuzzerInitialize(), and for things I didn't find out how to trigger this it needs to happen in FuzzerTestOneInput(). Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #2023
* Move libfuzzer sanitizer options to READMEKurt Roeckx2016-12-031-1/+2
| | | | | | | | This is something you might want to change depending on the version to use, there is no point in us fixing this to something. Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #2023
* CMS fuzzer: also use id2Kurt Roeckx2016-12-031-5/+13
| | | | | Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #2023
* Make the random number generator predictable when fuzzing.Kurt Roeckx2016-12-032-1/+10
| | | | | Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #2023
* bndiv fuzzer: move new and free calls to the init and cleanup function.Kurt Roeckx2016-12-031-14/+20
| | | | | Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #2023
* bignum fuzzer: move new and free calls to the init and cleanup function.Kurt Roeckx2016-12-031-14/+20
| | | | | Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #2023
* asn1parse: create the out bio during init, free it during cleanupKurt Roeckx2016-12-031-5/+4
| | | | | Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #2023
* Add a FuzzerClean() functionKurt Roeckx2016-12-0313-0/+47
| | | | | | | | This allows to free everything we allocated, so we can detect memory leaks. Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #2023
* FuzzerInitialize always existsKurt Roeckx2016-12-031-5/+2
| | | | | | | There was a time it could be NULL, but that was changed to always have it. Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #2023
* Fix formatting of fuzzersKurt Roeckx2016-12-0311-21/+42
| | | | | Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #2023
* Update fuzz corporaKurt Roeckx2016-11-123895-654/+374
| | | | | | | | New minimal fuzz corpora set Reviewed-by: Andy Polyakov <appro@openssl.org> GH: #1910
* conf fuzzer: also check for an empty fileKurt Roeckx2016-11-031-2/+7
| | | | | | | Reviewed-by: Tim Hudson <tjh@openssl.org> Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #1828
* Fix link to LibFuzzerSergey Bronnikov2016-11-021-1/+1
| | | | | | | CLA: trivial Reviewed-by: Kurt Roeckx <kurt@openssl.org> Reviewed-by: Rich Salz <rsalz@openssl.org> (Merged from https://github.com/openssl/openssl/pull/1801)
* [fuzzers] do not fail fuzzers with empty inputMike Aizatsky2016-11-012-4/+14
| | | | | | | Reviewed-by: Kurt Roeckx <kurt@roeckx.be> Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #1788
* Update fuzz corporaKurt Roeckx2016-10-102325-124/+59
| | | | | | | | New minimal fuzz corpora for asn1, asn1parse, bndiv, crl and x509 Reviewed-by: Andy Polyakov <appro@openssl.org> GH: #1678
* Add to fuzz corpora for CVE-2016-6309Robert Swiecki2016-09-263-0/+0
| | | | | Reviewed-by: Emilia Käsper <emilia@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org>
* Update fuzz corporaKurt Roeckx2016-08-234156-608/+568
| | | | | | | | | | | | | | | | | | This is a new minimal corpus with the following changes: - asn1: files: 1135 (+474), tuples: 27236 (+7496) - asn1parse: files: 305 (-3), tuples: 8758 (+11) - bignum: files: 370 (-1), tuples: 9547 (+10) - bndiv: files: 160 (+0), tuples: 2416 (+6) - cms: files: 155 (-1), tuples: 3408 (+0) - conf: files: 231 (-11), tuples: 4668 (+3) - crl: files: 905 (+188), tuples: 22876 (+4096) - ct: files: 117 (+35), tuples: 3557 (+908) - x509: files: 920, tuples: 28334 Note that tuple count depends on the binary and is random. Reviewed-by: Emilia Käsper <emilia@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org>
* Some minor tweaks to the fuzzing docsMatt Caswell2016-08-011-1/+1
| | | | Reviewed-by: Rich Salz <rsalz@openssl.org>
* Include what we use.Ben Laurie2016-08-011-0/+2
| | | | Reviewed-by: Rich Salz <rsalz@openssl.org>
* Fix various no-*s.Ben Laurie2016-08-011-0/+12
| | | | Reviewed-by: Rich Salz <rsalz@openssl.org>
* Skip non-existing files.Kurt Roeckx2016-07-261-0/+2
| | | | | Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #1324
* Fix no-ctMatt Caswell2016-07-251-2/+10
| | | | | | Ensure that we don't build/run the ct fuzzing code if no-ct is used. Reviewed-by: Rich Salz <rsalz@openssl.org>
* Add all publicly avaiable asn1 types to the asn1 fuzzer.Kurt Roeckx2016-07-201-1/+108
| | | | | Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #1331
* Fix building with no-cmsMatt Caswell2016-07-191-2/+10
| | | | | | The new fuzzing code broke no-cms Reviewed-by: Richard Levitte <levitte@openssl.org>
* Use _NO_INST in some build.info filesRichard Levitte2016-07-181-2/+2
| | | | Reviewed-by: Rich Salz <rsalz@openssl.org>
* Fix strict-warnings buildMatt Caswell2016-07-181-1/+3
| | | | | | | The i2d_SCT_LIST function is declared as __owur, therefore we need to check the result or a --strict-warnings build will fail. Reviewed-by: Rich Salz <rsalz@openssl.org>
* fuzzers: print and convert it backKurt Roeckx2016-07-162-2/+34
| | | | | Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #1323
* Make fuzzer and fuzz tester builds less magicRichard Levitte2016-07-162-83/+87
| | | | | | | | Instead of having fuzz/build.info.fuzz magically and conditionally included along with the other build.info files, incorporate it in fuzz/build.info and add the conditions there instead. Reviewed-by: Rich Salz <rsalz@openssl.org>
* Don't rely on implicit rsa.h inclusionViktor Dukhovni2016-07-101-0/+1
| | | | | | With no-deprecated, some nested includes don't happen by default. Reviewed-by: Rich Salz <rsalz@openssl.org>
* Add OPENSSL_NO_EC wrapperRich Salz2016-07-061-0/+2
| | | | Reviewed-by: Matt Caswell <matt@openssl.org>
* Update fuzz/README.mdRich Salz2016-07-041-10/+6
| | | | | Reviewed-by: Kurt Roeckx <kurt@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org>
* Simplify INCLUDE statements in build.info filesRichard Levitte2016-07-012-20/+20
| | | | | | | Now that INCLUDE considers both the source and build trees, no need for the rel2abs perl fragment hacks any more. Reviewed-by: Rich Salz <rsalz@openssl.org>
* fix 'set but not used' warningDr. Stephen Henson2016-07-011-2/+0
| | | | Reviewed-by: Rich Salz <rsalz@openssl.org>
* Re-add x509 and crl fuzzerKurt Roeckx2016-07-014-2/+26
| | | | | | Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #1276