From aa4d426b4d3527d7e166df1a05058c9a4a0f6683 Mon Sep 17 00:00:00 2001 From: Wojtek Kosior Date: Fri, 30 Apr 2021 00:33:56 +0200 Subject: initial/final commit --- openssl-1.1.0h/fuzz/test-corpus.c | 46 +++++++++++++++++++++++++++++++++++++++ 1 file changed, 46 insertions(+) create mode 100644 openssl-1.1.0h/fuzz/test-corpus.c (limited to 'openssl-1.1.0h/fuzz/test-corpus.c') diff --git a/openssl-1.1.0h/fuzz/test-corpus.c b/openssl-1.1.0h/fuzz/test-corpus.c new file mode 100644 index 0000000..c553697 --- /dev/null +++ b/openssl-1.1.0h/fuzz/test-corpus.c @@ -0,0 +1,46 @@ +/* + * Copyright 2016 The OpenSSL Project Authors. All Rights Reserved. + * + * Licensed under the OpenSSL licenses, (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * https://www.openssl.org/source/license.html + * or in the file LICENSE in the source distribution. + */ + +/* + * Given a list of files, run each of them through the fuzzer. Note that + * failure will be indicated by some kind of crash. Switching on things like + * asan improves the test. + */ + +#include +#include +#include +#include +#include "fuzzer.h" + +int main(int argc, char **argv) { + int n; + + FuzzerInitialize(&argc, &argv); + + for (n = 1; n < argc; ++n) { + struct stat st; + FILE *f; + unsigned char *buf; + size_t s; + + stat(argv[n], &st); + f = fopen(argv[n], "rb"); + if (f == NULL) + continue; + buf = malloc(st.st_size); + s = fread(buf, 1, st.st_size, f); + OPENSSL_assert(s == (size_t)st.st_size); + FuzzerTestOneInput(buf, s); + free(buf); + fclose(f); + } + return 0; +} -- cgit v1.2.3