boringssl/fuzz
David Benjamin bc5b2a2e22 Add a deterministic PRNG for fuzzing.
If running the stack through a fuzzer, we would like execution to be
completely deterministic. This is gated on a
BORINGSSL_UNSAFE_FUZZER_MODE #ifdef.

For now, this just uses the zero ChaCha20 key and a global counter. As
needed, we can extend this to a thread-local counter and a separate
ChaCha20 stream and counter per input length.

Change-Id: Ic6c9d8a25e70d68e5dc6804e2c234faf48e51395
Reviewed-on: https://boringssl-review.googlesource.com/7286
Reviewed-by: Adam Langley <agl@google.com>
2016-03-03 01:36:19 +00:00
..
cert_corpus Add four, basic fuzz tests. 2015-11-10 19:14:01 +00:00
client_corpus Add four, basic fuzz tests. 2015-11-10 19:14:01 +00:00
privkey_corpus Add four, basic fuzz tests. 2015-11-10 19:14:01 +00:00
server_corpus Update the fuzz tests for the server. 2015-12-22 16:35:07 -08:00
cert.cc Have fuzz/cert.cc also call X509_get_pubkey. 2016-02-18 00:10:15 +00:00
client.cc Add a deterministic PRNG for fuzzing. 2016-03-03 01:36:19 +00:00
CMakeLists.txt Add four, basic fuzz tests. 2015-11-10 19:14:01 +00:00
minimise_corpuses.sh Add four, basic fuzz tests. 2015-11-10 19:14:01 +00:00
privkey.cc Add four, basic fuzz tests. 2015-11-10 19:14:01 +00:00
server.cc Add a deterministic PRNG for fuzzing. 2016-03-03 01:36:19 +00:00