summaryrefslogtreecommitdiff
path: root/Cryptlib/opensslconf-diff.patch
diff options
context:
space:
mode:
authorPeter Jones <pjones@redhat.com>2023-06-28 15:15:14 -0400
committerPeter Jones <pjones@redhat.com>2023-06-29 14:35:50 -0400
commit1578b55a70bd2204cb0ad6db18ae4c003494df81 (patch)
tree8de1ff62d5faca751175f571de252f1fd1f6386c /Cryptlib/opensslconf-diff.patch
parent61e989446849205d3e9eef2544f6d9bd87142933 (diff)
downloadefi-boot-shim-1578b55a70bd2204cb0ad6db18ae4c003494df81.tar.gz
efi-boot-shim-1578b55a70bd2204cb0ad6db18ae4c003494df81.zip
Add libFuzzer support for csv.c
shim takes several forms of input from several sources that are not necessarily trustworthy. As such, we need to take measures to validate that we don't have unacceptable results from bad inputs. One such measure is "fuzzing" the inputs which parse untrusted data by running them with randomized or partially randomized input. This change adds such testing using clang's "libFuzzer" to our CSV parser. I've run this on 24-cores at 4GHz for half an hour, and so far each fuzzer has converged on 79% coverage. I expect the 21% that's not getting covered are the EFI API mock interfaces we're building in from test.c and similar. So far no errors have been found, which is what was expected since this particular API is being manually fuzzed with ~8kB of /dev/urandom on every build since 2021-02-23. Signed-off-by: Peter Jones <pjones@redhat.com>
Diffstat (limited to 'Cryptlib/opensslconf-diff.patch')
0 files changed, 0 insertions, 0 deletions