1. 08 Dec, 2016 22 commits
  2. 07 Dec, 2016 2 commits
  3. 05 Dec, 2016 12 commits
  4. 03 Dec, 2016 1 commit
  5. 02 Dec, 2016 3 commits
    • Kurt Roeckx's avatar
      Run a some tests with -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION · ef2bf0f5
      Kurt Roeckx authored
      
      
      The fuzzers use -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION, and actually
      get different results based on that. We should have at least some
      targets that actually fully use the fuzz corpora.
      
      Reviewed-by: default avatarRich Salz <rsalz@openssl.org>
      GH: #2023
      ef2bf0f5
    • Kurt Roeckx's avatar
      Make the fuzzers more reproducible · d69d8f90
      Kurt Roeckx authored
      
      
      We want to be in the same global state each time we come in
      FuzzerTestOneInput(). There are various reasons why we might not be that
      include:
      - Initialization that happens on first use. This is mostly the
        RUN_ONCE() things, or loading of error strings.
      - Results that get cached. For instance a stack that is sorted, RSA
        blinding that has been set up, ...
      
      So I try to trigger as much as possible in FuzzerInitialize(), and for
      things I didn't find out how to trigger this it needs to happen in
      FuzzerTestOneInput().
      
      Reviewed-by: default avatarRich Salz <rsalz@openssl.org>
      GH: #2023
      d69d8f90
    • Kurt Roeckx's avatar
      Move libfuzzer sanitizer options to README · 0282aeb6
      Kurt Roeckx authored
      
      
      This is something you might want to change depending on the version to
      use, there is no point in us fixing this to something.
      
      Reviewed-by: default avatarRich Salz <rsalz@openssl.org>
      GH: #2023
      0282aeb6