Files
android/libwvdrmengine/oemcrypto/odk/test/fuzzing
Bharath Chandra Elluru 7664781685 Merging changes from http://cl/312740650 to change buganizer component
id to which odk fuzz scripts log any bugs.

Bug: b/157252243
Cricticque cl: http://cl/312740650

Test: This is a configuration change to change buganizer component Id.
No functionality testing involved.
Change-Id: I17e76c015b7fc264281aa32eae975165ec8e6bed

Change-Id: If0b8954c606f9359b45bccd5276703138d4e02f5
2020-05-21 14:36:50 -07:00
..

ODK Fuzzing

Objective

  • Run fuzzing on ODK and KDO serialize and deserialize APIs using google supported fuzzer engines to find security vulnerabilities. Any issues found by clusterfuzz will be reported to odk fuzz buganizer.

Run fuzz target on local machine

  • In order to run fuzz target locally and see code coverage, save binary input to be tested against fuzz target into a temporary corpus directory and execute following commands

    $ blaze build --config=asan-fuzzer //your:target
    $ blaze-bin/your/target FULL_CORPUS_DIR