olm/fuzzing/fuzzers
Denis Kasak bdd73c5c32 Fix unpickling error handling. 2021-07-31 01:27:43 +00:00
..
include Move fuzzers under fuzzing/ dir. 2021-07-13 13:49:18 +02:00
README.rst Move fuzzers under fuzzing/ dir. 2021-07-13 13:49:18 +02:00
fuzz_decode_message.cpp Move fuzzers under fuzzing/ dir. 2021-07-13 13:49:18 +02:00
fuzz_decrypt.cpp Move fuzzers under fuzzing/ dir. 2021-07-13 13:49:18 +02:00
fuzz_group_decrypt.cpp Move fuzzers under fuzzing/ dir. 2021-07-13 13:49:18 +02:00
fuzz_unpickle_account.cpp Fix unpickling error handling. 2021-07-31 01:27:43 +00:00
fuzz_unpickle_megolm_outbound.c Move fuzzers under fuzzing/ dir. 2021-07-13 13:49:18 +02:00
fuzz_unpickle_session.cpp Move fuzzers under fuzzing/ dir. 2021-07-13 13:49:18 +02:00

README.rst

Fuzzers
=======

This directory contains a collection of fuzzing tools. Each tests a different
entry point to the code.

Usage notes:

1. Install AFL:

   .. code::

      apt-get install afl

2. Build the fuzzers:

   .. code::

      make fuzzers

3. Some of the tests (eg ``fuzz_decrypt`` and ``fuzz_group_decrypt``) require a
   session file. You can create one by pickling an Olm session.

4. Make some work directories:

   .. code::

      mkdir -p fuzzing/in fuzzing/out

5. Generate starting input:

   .. code::

      echo "Test" > fuzzing/in/test

6. Run the test under ``afl-fuzz``:

   .. code::

      afl-fuzz -i fuzzing/in -o fuzzing/out -- \
         ./build/fuzzers/fuzz_<fuzzing_tool> [<test args>]

7. To resume with the data produced by an earlier run:

   .. code::

       afl-fuzz -i- -o existing_output_dir [...etc...]

8. If it shows failures, pipe the failure case into
   ``./build/fuzzers/debug_<fuzzing_tool>``, fix, and repeat.