aboutsummaryrefslogtreecommitdiffhomepage
path: root/projects/openssl
Commit message (Collapse)AuthorAge
* Remove Cc's for members that left (#1785)Gravatar Kurt Roeckx2018-09-04
|
* [openssl] Exclude perl scripts (#943)Gravatar Kurt Roeckx2017-11-01
| | | Fixes: #941
* [openssl] Use OIDs as the dictionary for the ASN1 and X509 fuzzers (#939)Gravatar Kurt Roeckx2017-11-01
|
* Remove Steve from the auto-CC list (#912)Gravatar Kurt Roeckx2017-10-24
|
* Link final openssl targets with CXX instead of clang++, as afl/honggfuzz ↵Gravatar robertswiecki2017-05-30
| | | | might be using custom compilers (#634)
* Add missing space.Gravatar Abhishek Arya2017-05-10
|
* openssl: add msan support (#593)Gravatar Kurt Roeckx2017-05-10
| | | | | | | | * openssl: add msan support * Remove unneeded quotes, see boringssl/build.sh * Minor spacing issue.
* Use apt-get update && apt-get install, per best practices: (#561)Gravatar Devin Jeanpierre2017-05-01
| | | | | | | | | | | | | | | | | | | https://docs.docker.com/engine/userguide/eng-image/dockerfile_best-practices/ I ran into this because I was getting errors locally, like: E: Failed to fetch http://archive.ubuntu.com/ubuntu/pool/main/d/dpkg/libdpkg-perl_1.18.4ubuntu1.1_all.deb 404 Not Found [IP: 91.189.88.149 80] It turns out you get these if you don't update, and the official best practices are to `run apt-get update && apt-get install`. In fact, running _any_ apt-get install command without the apt-get update && before it can result in unfortunate caching artifacts -- see "cache busting". (P.S. thanks to Peng on Freenode for helping me, I'm bad at Ubuntu.) So: sed -re \ 's/RUN apt-get ((-y )?(install|build-dep))/RUN apt-get update \&\& apt-get \1/' -i \ projects/**/Dockerfile I also manually fixed the cases that already ran apt-get update in their Dockerfile: dlplibs/Dockerfile grpc/Dockerfile libreoffice/Dockerfile
* oss-fuzz/BASE_IMAGE -> oss-fuzz-base/BASE_IMAGEGravatar Oliver Chang2017-03-22
|
* [infra] ossfuzz/IMAGE -> gcr.io/oss-fuzz/IMAGEGravatar Oliver Chang2017-03-15
|
* Update project.yamlGravatar Abhishek Arya2017-02-02
|
* OpenSSL: List of people who should have access to the bugs (#294)Gravatar Kurt Roeckx2017-01-18
|
* Update project.yamlGravatar Kostya Serebryany2017-01-16
|
* [infra] updating usages of base-libfuzzer (#142)Gravatar Mike Aizatsky2017-01-03
|
* openssl: call configure with --debug (#214)Gravatar Kurt Roeckx2016-12-24
| | | Otherwise NDEBUG is set, and the asserts don't trigger.
* [openssl] use clang++ for linking #195 (#198)Gravatar Mike Aizatsky2016-12-16
|
* [openssl] adding ubsan runtime to libraries for undefined sanitizerGravatar Mike Aizatsky2016-12-16
| | | | Fixes #195.
* Disable ubsan again (#197)Gravatar Kurt Roeckx2016-12-16
| | | It has link errors for some unknown reason.
* [openssl] forgot to copy options file in #190Gravatar Mike Aizatsky2016-12-15
|
* Openssl update (#190)Gravatar Kurt Roeckx2016-12-15
| | | | | | | | | | | | | * Openssl: Enable more configure options This enables all the options that are off by default but that we still want to test. * openssl: Enable undefined sanitizer. * openssl: Add the security security contact as auto Cc * openssl: bignum: limit to 2048 bytes
* Use libFuzzingEngine instead of libfuzzer (#155)Gravatar Kurt Roeckx2016-12-08
| | | Fixes: #153
* Update project.yaml (#130)Gravatar inferno-chromium2016-12-03
|
* OpenSSL: Use -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION (#126)Gravatar Kurt Roeckx2016-12-02
| | | | | This should make the server fuzzer more reproducible. Depends on https://github.com/openssl/openssl/pull/2023
* [infra] making shallow git clones. fixes #42Gravatar Mike Aizatsky2016-11-29
|
* [infra] target.yaml -> project.yamlGravatar Mike Aizatsky2016-11-29
|
* [infra] renaming targets/ to projects/Gravatar Mike Aizatsky2016-11-29