Files
oemcrypto_core_message/oemcrypto/odk/test/fuzzing
Aaron Vaage 565237f8e6 Update Partner Repo
This update brings the partner repo up-to-date with commit
ae93405f980295f9a783bd04e2132a2370720107 in the internal repo.
2021-01-12 14:49:16 -08:00
..
2021-01-12 14:49:16 -08:00
2020-07-23 14:42:42 -07:00
2021-01-12 14:49:16 -08:00
2021-01-12 14:49:16 -08:00
2021-01-12 14:49:16 -08:00
2020-07-23 14:42:42 -07:00
2020-07-23 14:42:42 -07:00
2020-07-23 14:42:42 -07:00
2020-07-23 14:42:42 -07:00
2020-07-23 14:42:42 -07:00
2020-07-23 14:42:42 -07:00

ODK Fuzzing

Objective

  • Run fuzzing on ODK and KDO serialize and deserialize APIs using google supported fuzzer engines to find security vulnerabilities. Any issues found by clusterfuzz will be reported to odk fuzz buganizer.

Run fuzz target on local machine

  • In order to run fuzz target locally and see code coverage, save binary input to be tested against fuzz target into a temporary corpus directory and execute following commands

    $ blaze build --config=asan-fuzzer //your:target
    $ blaze-bin/your/target FULL_CORPUS_DIR