Files
android/libwvdrmengine/oemcrypto/odk/test/fuzzing
Daniel Chapin 5558e492c9 Revert "Merge latest oemcrypto-v17 change"
This reverts commit 642965c678.

Reason for revert: Droidfood Blocking Bug: 217145027

Change-Id: I669b72fcd91c62e28883b5f55eb36af274d85806
(cherry picked from commit 8dbea15e5da05b371572297041454569dc166c90)
Merged-In:I669b72fcd91c62e28883b5f55eb36af274d85806
2022-02-01 05:20:54 +00:00
..
2021-04-12 14:10:08 -07:00
2021-04-12 14:10:08 -07:00
2021-04-12 14:10:08 -07:00

ODK Fuzzing

Objective

  • Run fuzzing on ODK and KDO serialize and deserialize APIs using google supported fuzzer engines to find security vulnerabilities. Any issues found by clusterfuzz will be reported to odk fuzz buganizer.

Run fuzz target on local machine

  • In order to run fuzz target locally and see code coverage, save binary input to be tested against fuzz target into a temporary corpus directory and execute following commands

    $ blaze build --config=asan-fuzzer //your:target
    $ blaze-bin/your/target FULL_CORPUS_DIR