aboutsummaryrefslogtreecommitdiffhomepage
path: root/projects/gnutls
Commit message (Collapse)AuthorAge
* [gnutls] use bootstrap before build (#2069)Gravatar Nikos Mavrogiannopoulos2019-01-04
| | | Signed-off-by: Nikos Mavrogiannopoulos <n.mavrogiannopoulos@gmail.com>
* [gnutls] added Ander Juaristi (#1321)Gravatar Nikos Mavrogiannopoulos2018-04-16
| | | Signed-off-by: Nikos Mavrogiannopoulos <n.mavrogiannopoulos@gmail.com>
* [gnutls] unconditionally disable assembler in gmp (#833)Gravatar Nikos Mavrogiannopoulos2018-02-09
| | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* [gnutls] updated reference to libtasn1 project (#1106)Gravatar Nikos Mavrogiannopoulos2018-01-23
| | | | | | | The project was moved to gitlab. Closes #1101 Signed-off-by: Nikos Mavrogiannopoulos <n.mavrogiannopoulos@gmail.com>
* added Niels from nettle, to be able to inspect logs (#987)Gravatar Nikos Mavrogiannopoulos2017-11-16
| | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* [gnutls] Fix disabling assembler for GMP (#783)Gravatar Tim Rühsen2017-08-19
|
* [gnutls] Fix build (#782)Gravatar Tim Rühsen2017-08-18
|
* New fuzzing architecture (#779)Gravatar Nikos Mavrogiannopoulos2017-08-16
| | | | Requisites are build as static libraries and as these linked to the fuzzers. p11-kit can't be build statically, thus our fuzzers are not using it.
* disable getrandom() via syscall, it confuses mem sanitizer (#764)Gravatar Nikos Mavrogiannopoulos2017-08-08
| | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* [gnutls] added Tim Ruehsen to CCS list (#762)Gravatar Nikos Mavrogiannopoulos2017-08-06
| | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
* [gnutls] modified to use the internal corpora only (#705)Gravatar Nikos Mavrogiannopoulos2017-07-07
| | | | | | This avoids issues from external corpora format changing which could effectively disable fuzzying. Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
* [gnutls] statically link with nettle and hogweed and avoid using gmp (#661)Gravatar Nikos Mavrogiannopoulos2017-06-08
| | | | This allows the memory sanitizer to track all variable assignment and use.
* added contributor to CCS list (#654)Gravatar Nikos Mavrogiannopoulos2017-06-07
|
* Enable msan on some projects, disable experiment on others. (#590)Gravatar Abhishek Arya2017-05-10
|
* [gnutls] Remove double-quotes from string comparison in build.sh.Gravatar Max Moroz2017-05-09
|
* [gnutls] Fixed #578 -- when using MSAN disable assembly in gnutls (#580)Gravatar Alex Gaynor2017-05-09
| | | | | | * Fixed #578 -- when using MSAN disable assembly in gnutls * Use the more public API for this
* Enable MSan experimental on some projects. (#570)Gravatar Abhishek Arya2017-05-05
|
* Use apt-get update && apt-get install, per best practices: (#561)Gravatar Devin Jeanpierre2017-05-01
| | | | | | | | | | | | | | | | | | | https://docs.docker.com/engine/userguide/eng-image/dockerfile_best-practices/ I ran into this because I was getting errors locally, like: E: Failed to fetch http://archive.ubuntu.com/ubuntu/pool/main/d/dpkg/libdpkg-perl_1.18.4ubuntu1.1_all.deb 404 Not Found [IP: 91.189.88.149 80] It turns out you get these if you don't update, and the official best practices are to `run apt-get update && apt-get install`. In fact, running _any_ apt-get install command without the apt-get update && before it can result in unfortunate caching artifacts -- see "cache busting". (P.S. thanks to Peng on Freenode for helping me, I'm bad at Ubuntu.) So: sed -re \ 's/RUN apt-get ((-y )?(install|build-dep))/RUN apt-get update \&\& apt-get \1/' -i \ projects/**/Dockerfile I also manually fixed the cases that already ran apt-get update in their Dockerfile: dlplibs/Dockerfile grpc/Dockerfile libreoffice/Dockerfile
* oss-fuzz/BASE_IMAGE -> oss-fuzz-base/BASE_IMAGEGravatar Oliver Chang2017-03-22
|
* [infra] ossfuzz/IMAGE -> gcr.io/oss-fuzz/IMAGEGravatar Oliver Chang2017-03-15
|
* Update project.yamlGravatar Abhishek Arya2017-02-02
|
* [gnutls] grammar better (#253)Gravatar Alex Gaynor2017-01-06
|
* [gnutls] use ubsan as well (#247)Gravatar Alex Gaynor2017-01-05
| | | Now that we've fixed most of the ASAN discovered bugs, let's have some fun with UBSAN
* [infra] updating usages of base-libfuzzer (#142)Gravatar Mike Aizatsky2017-01-03
|
* [gnutls] If the upstream repo has a corpus, include it (#222)Gravatar Alex Gaynor2016-12-28
|
* [gnutls] updated primary contact email (#204)Gravatar Nikos Mavrogiannopoulos2016-12-19
| | | That is, in order to be able to access the issues opened.
* Move the gnutls fuzzers to their own repo. (#188)Gravatar Alex Gaynor2016-12-15
| | | Also add two new ones.
* [gnutls] use an initial corpus for x509 (#164)Gravatar Alex Gaynor2016-12-10
| | | | | | | | * [gnutls] use an initial corpus for x509 and add OpenSSL's corpus for client transcripts * Use --depth=1 on clones
* Update project.yamlGravatar inferno-chromium2016-12-10
|
* Update project.yamlGravatar inferno-chromium2016-12-09
|
* [In progress] Fuzzer for GNUTLS (#135)Gravatar Alex Gaynor2016-12-09
* First cut at gnutls. Doesn't actually find coverage. * link everything right * pipes are not sockets * send not write * these are not used * stick this here * this doesn't exit * remove jenkinsfile * move to the right dir * project file * update for more recent conventions * ugh, typo * new lib * docs take forever * name it client fuzzer * stick a cert store on there! * add a timeout, ugh * Shtudown the right side instead of using a timeout * Use boringssl's test corpus * simplify grabbing the tarballs * statically link things. pthread is still dynamically linked because I was not able to make it work * Added an x509 parser fuzzer * update for the lastest convention