summaryrefslogtreecommitdiff
path: root/fuzz
Commit message (Collapse)AuthorAgeFilesLines
* fuzz: updated traces for final TLS1.3 versionNikos Mavrogiannopoulos2018-08-206-0/+0
| | | | | | Resolves #359 Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
* fuzz: updated traces for latest TLS1.3 draftNikos Mavrogiannopoulos2018-07-277-0/+26
| | | | | | Relates #359 Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* Fix test code for -WerrorTim Rühsen2018-06-211-0/+4
|
* Remove oss-fuzz copora from tarballTim Rühsen2018-06-202-11/+38
| | | | | | The size of the corpora is huge and not needed for normal builds. This patch also fixes test run issues on Windows.
* fuzzer: added fresh TLS1.3 server traceNikos Mavrogiannopoulos2018-05-051-0/+0
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
* fuzz: corrected TLS1.3 enablement [ci skip]Nikos Mavrogiannopoulos2018-04-225-4/+7
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* tls13/finished: addressed memory leak in receiving finished packetNikos Mavrogiannopoulos2018-04-171-0/+0
| | | | | | | Issue found using oss-fuzz: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=7518 Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* ext/psk_ke_modes: corrected data accessNikos Mavrogiannopoulos2018-04-071-0/+0
| | | | | | | | | That also improves the if-checks. Issue and reproducer discovered via oss-fuzz: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=7470 Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
* fuzz: added client and server traces for TLS 1.3 draft-26 [ci skip]Nikos Mavrogiannopoulos2018-04-076-0/+0
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
* fuzz: added PSK traces with TLS1.3Nikos Mavrogiannopoulos2018-04-066-2/+2
| | | | | | Relates: #359 Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* tests: moved invalid-cert reproducer into fuzz/ reproducersNikos Mavrogiannopoulos2018-03-191-0/+0
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* Improve fuzzer coverage report creationTim Rühsen2018-03-043-14/+22
|
* Update oss-fuzz corporaTim Rühsen2018-02-272919-272/+3247
| | | | Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
* fuzz: added TLS1.3 client and server traces [ci skip]tmp-extend-fuzzer-with-tls13-traceNikos Mavrogiannopoulos2018-02-212-0/+0
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* fuzz: enable fuzzer target in afl examples and add missing script [ci skip]Nikos Mavrogiannopoulos2018-02-212-2/+51
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* fuzz: fixes in README file [ci skip]Nikos Mavrogiannopoulos2018-02-211-5/+16
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* fuzz: enable TLS1.3 in server and client fuzzersNikos Mavrogiannopoulos2018-02-192-2/+4
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* fuzz: added reproducer for leak in gnutls_x509_crl_list_importtmp-mem-leakNikos Mavrogiannopoulos2018-01-101-0/+1
| | | | | | | That was detected by oss-fuzz in: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=4930 Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* gnutls_pkcs12_key_parser_fuzzer.in: added reproducer for oss-fuzz #4890Nikos Mavrogiannopoulos2018-01-091-0/+0
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* fuzz: srp-client: decreased acceptable prime bits to 1024 [ci skip]Nikos Mavrogiannopoulos2017-11-211-1/+1
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* fuzz: srp-client: restrict prime bits to 1537 [ci skip]Nikos Mavrogiannopoulos2017-11-201-0/+1
| | | | | | | That avoids timeouts in the oss-fuzz infrastructure: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=3277 Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* gnutls_x509_ext_import_proxy: corrected memory leakNikos Mavrogiannopoulos2017-11-151-0/+0
| | | | | | | | | Also added reproducer for the memory leak found. Issue found using oss-fuzz: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=3159 Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* Use $(LIBDL) instead of hardcoding -ldl.Thomas Klausner2017-09-061-1/+1
|
* fuzzer: Enhance code coverage of gnutls_base64_encoder_fuzzerTim Rühsen2017-08-241-1/+1
| | | | Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
* fuzzer: Add script 'view-coverage'Tim Rühsen2017-08-241-0/+28
| | | | | | | | | | This helper script is for viewing the code coverage of single (or combined) fuzzers running with all his corpora. It helps optimizing the code coverage by hand-crafting corpora and/or dictionaries. Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
* fuzzer: Change CFLAGS -O0 to -O1 in fuzz/README.mdTim Rühsen2017-08-241-1/+1
| | | | Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
* fuzzer: Update corpora from oss-fuzzTim Rühsen2017-08-247071-826/+2787
| | | | Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
* fuzz: work-around libtool file nametmp-fuzz-updatesNikos Mavrogiannopoulos2017-08-221-0/+5
| | | | | | | | fuzzers utilize argv[0] to discover the name the reproducers are stored in. However libtool creates a script which later runs the executable. Try to detect that situation and use the right paths. Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* fuzz: removed -static ldflag completelyNikos Mavrogiannopoulos2017-08-221-5/+0
| | | | | | | It is not necessary for building the fuzzer, and was causing issues in MacOSX systems. Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
* fuzz: temporarily disable -static build of fuzz/ in MacOSXgnutls_3_6_0Nikos Mavrogiannopoulos2017-08-211-0/+5
| | | | | | This allows running the MacOSX CI tests on travis. Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
* fuzzer: Update base64 fuzzers + corporaTim Rühsen2017-08-1923-0/+27
| | | | Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
* fuzzer: Fix include path in run-clang.sh [skip ci]Tim Rühsen2017-08-191-1/+1
| | | | Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
* fuzz: added missing files into dist [ci skip]Nikos Mavrogiannopoulos2017-08-181-6/+6
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* fuzzer: Add 'make -C fuzz coverage' [ci skip]Tim Rühsen2017-08-161-0/+16
| | | | | | This reports how much code is covered by fuzzing. Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
* fuzzer: Move regression corpora from tests/ to fuzz/Tim Rühsen2017-08-1613-0/+2
| | | | | | See fuzz/README.md for the corresponding paths. Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
* fuzzer: Suppress leak in libgmp <= 6.1.2Tim Rühsen2017-08-161-0/+1
| | | | Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
* fuzzer: Initial check in for improved fuzzingTim Rühsen2017-08-168440-0/+3501
Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>