summaryrefslogtreecommitdiff
path: root/fuzz
Commit message (Collapse)AuthorAgeFilesLines
* Update oss-fuzz corporaTim Rühsen2018-02-272919-272/+3247
| | | | Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
* fuzz: added TLS1.3 client and server traces [ci skip]tmp-extend-fuzzer-with-tls13-traceNikos Mavrogiannopoulos2018-02-212-0/+0
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* fuzz: enable fuzzer target in afl examples and add missing script [ci skip]Nikos Mavrogiannopoulos2018-02-212-2/+51
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* fuzz: fixes in README file [ci skip]Nikos Mavrogiannopoulos2018-02-211-5/+16
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* fuzz: enable TLS1.3 in server and client fuzzersNikos Mavrogiannopoulos2018-02-192-2/+4
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* fuzz: added reproducer for leak in gnutls_x509_crl_list_importtmp-mem-leakNikos Mavrogiannopoulos2018-01-101-0/+1
| | | | | | | That was detected by oss-fuzz in: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=4930 Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* gnutls_pkcs12_key_parser_fuzzer.in: added reproducer for oss-fuzz #4890Nikos Mavrogiannopoulos2018-01-091-0/+0
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* fuzz: srp-client: decreased acceptable prime bits to 1024 [ci skip]Nikos Mavrogiannopoulos2017-11-211-1/+1
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* fuzz: srp-client: restrict prime bits to 1537 [ci skip]Nikos Mavrogiannopoulos2017-11-201-0/+1
| | | | | | | That avoids timeouts in the oss-fuzz infrastructure: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=3277 Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* gnutls_x509_ext_import_proxy: corrected memory leakNikos Mavrogiannopoulos2017-11-151-0/+0
| | | | | | | | | Also added reproducer for the memory leak found. Issue found using oss-fuzz: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=3159 Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* Use $(LIBDL) instead of hardcoding -ldl.Thomas Klausner2017-09-061-1/+1
|
* fuzzer: Enhance code coverage of gnutls_base64_encoder_fuzzerTim Rühsen2017-08-241-1/+1
| | | | Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
* fuzzer: Add script 'view-coverage'Tim Rühsen2017-08-241-0/+28
| | | | | | | | | | This helper script is for viewing the code coverage of single (or combined) fuzzers running with all his corpora. It helps optimizing the code coverage by hand-crafting corpora and/or dictionaries. Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
* fuzzer: Change CFLAGS -O0 to -O1 in fuzz/README.mdTim Rühsen2017-08-241-1/+1
| | | | Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
* fuzzer: Update corpora from oss-fuzzTim Rühsen2017-08-247071-826/+2787
| | | | Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
* fuzz: work-around libtool file nametmp-fuzz-updatesNikos Mavrogiannopoulos2017-08-221-0/+5
| | | | | | | | fuzzers utilize argv[0] to discover the name the reproducers are stored in. However libtool creates a script which later runs the executable. Try to detect that situation and use the right paths. Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* fuzz: removed -static ldflag completelyNikos Mavrogiannopoulos2017-08-221-5/+0
| | | | | | | It is not necessary for building the fuzzer, and was causing issues in MacOSX systems. Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
* fuzz: temporarily disable -static build of fuzz/ in MacOSXgnutls_3_6_0Nikos Mavrogiannopoulos2017-08-211-0/+5
| | | | | | This allows running the MacOSX CI tests on travis. Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
* fuzzer: Update base64 fuzzers + corporaTim Rühsen2017-08-1923-0/+27
| | | | Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
* fuzzer: Fix include path in run-clang.sh [skip ci]Tim Rühsen2017-08-191-1/+1
| | | | Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
* fuzz: added missing files into dist [ci skip]Nikos Mavrogiannopoulos2017-08-181-6/+6
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* fuzzer: Add 'make -C fuzz coverage' [ci skip]Tim Rühsen2017-08-161-0/+16
| | | | | | This reports how much code is covered by fuzzing. Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
* fuzzer: Move regression corpora from tests/ to fuzz/Tim Rühsen2017-08-1613-0/+2
| | | | | | See fuzz/README.md for the corresponding paths. Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
* fuzzer: Suppress leak in libgmp <= 6.1.2Tim Rühsen2017-08-161-0/+1
| | | | Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
* fuzzer: Initial check in for improved fuzzingTim Rühsen2017-08-168440-0/+3501
Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>