diff options
author | Ivan Nardi <12729895+IvanNardi@users.noreply.github.com> | 2022-12-01 12:21:04 +0100 |
---|---|---|
committer | GitHub <noreply@github.com> | 2022-12-01 12:21:04 +0100 |
commit | 02e7e3c23b29002267a89ae74e51c2285bb27da1 (patch) | |
tree | e81044cad57a397a940f278ac53f6aec3be0fc92 /fuzz/corpus/fuzz_quic_get_crypto_data | |
parent | afb5c3e6bad82ebd265ab12254ac7c6e067a791b (diff) |
Add a new fuzzer for QUIC (#1800)
QUIC packets are encrypted/obfuscated; that means that we need to
decrypt them before parsing the real (TLS) message.
Fuzzing is not effective here, since a random buffer is hardly a valid
encrypted QUIC packet.
Add a new fuzzer, testing *decrypted* QUIC packets.
Add a basic corpus.
Fix a few bugs already found by this fuzzer.
Diffstat (limited to 'fuzz/corpus/fuzz_quic_get_crypto_data')
-rw-r--r-- | fuzz/corpus/fuzz_quic_get_crypto_data/q046.bin | bin | 0 -> 1324 bytes |
-rw-r--r-- | fuzz/corpus/fuzz_quic_get_crypto_data/q050.bin | bin | 0 -> 1319 bytes |
-rw-r--r-- | fuzz/corpus/fuzz_quic_get_crypto_data/v1_chaos_protection.bin | bin | 0 -> 1219 bytes |
-rw-r--r-- | fuzz/corpus/fuzz_quic_get_crypto_data/v1_chaos_protection_b.bin | bin | 0 -> 1219 bytes |
-rw-r--r-- | fuzz/corpus/fuzz_quic_get_crypto_data/v1_doq.bin | bin | 0 -> 1210 bytes |
-rw-r--r-- | fuzz/corpus/fuzz_quic_get_crypto_data/v1_only_first_fragment.bin | bin | 0 -> 1190 bytes |
-rw-r--r-- | fuzz/corpus/fuzz_quic_get_crypto_data/v1_only_second_fragment.bin | bin | 0 -> 1190 bytes |
-rw-r--r-- | fuzz/corpus/fuzz_quic_get_crypto_data/v2.bin | bin | 0 -> 1210 bytes |
8 files changed, 0 insertions, 0 deletions
diff --git a/fuzz/corpus/fuzz_quic_get_crypto_data/q046.bin b/fuzz/corpus/fuzz_quic_get_crypto_data/q046.bin Binary files differnew file mode 100644 index 000000000..679ef8245 --- /dev/null +++ b/fuzz/corpus/fuzz_quic_get_crypto_data/q046.bin diff --git a/fuzz/corpus/fuzz_quic_get_crypto_data/q050.bin b/fuzz/corpus/fuzz_quic_get_crypto_data/q050.bin Binary files differnew file mode 100644 index 000000000..e91a15d41 --- /dev/null +++ b/fuzz/corpus/fuzz_quic_get_crypto_data/q050.bin diff --git a/fuzz/corpus/fuzz_quic_get_crypto_data/v1_chaos_protection.bin b/fuzz/corpus/fuzz_quic_get_crypto_data/v1_chaos_protection.bin Binary files differnew file mode 100644 index 000000000..6f7e2253e --- /dev/null +++ b/fuzz/corpus/fuzz_quic_get_crypto_data/v1_chaos_protection.bin diff --git a/fuzz/corpus/fuzz_quic_get_crypto_data/v1_chaos_protection_b.bin b/fuzz/corpus/fuzz_quic_get_crypto_data/v1_chaos_protection_b.bin Binary files differnew file mode 100644 index 000000000..258979432 --- /dev/null +++ b/fuzz/corpus/fuzz_quic_get_crypto_data/v1_chaos_protection_b.bin diff --git a/fuzz/corpus/fuzz_quic_get_crypto_data/v1_doq.bin b/fuzz/corpus/fuzz_quic_get_crypto_data/v1_doq.bin Binary files differnew file mode 100644 index 000000000..e1c7d9cbb --- /dev/null +++ b/fuzz/corpus/fuzz_quic_get_crypto_data/v1_doq.bin diff --git a/fuzz/corpus/fuzz_quic_get_crypto_data/v1_only_first_fragment.bin b/fuzz/corpus/fuzz_quic_get_crypto_data/v1_only_first_fragment.bin Binary files differnew file mode 100644 index 000000000..d865a5578 --- /dev/null +++ b/fuzz/corpus/fuzz_quic_get_crypto_data/v1_only_first_fragment.bin diff --git a/fuzz/corpus/fuzz_quic_get_crypto_data/v1_only_second_fragment.bin b/fuzz/corpus/fuzz_quic_get_crypto_data/v1_only_second_fragment.bin Binary files differnew file mode 100644 index 000000000..59aa1fd6e --- /dev/null +++ b/fuzz/corpus/fuzz_quic_get_crypto_data/v1_only_second_fragment.bin diff --git a/fuzz/corpus/fuzz_quic_get_crypto_data/v2.bin b/fuzz/corpus/fuzz_quic_get_crypto_data/v2.bin Binary files differnew file mode 100644 index 000000000..86e5d2bc4 --- /dev/null +++ b/fuzz/corpus/fuzz_quic_get_crypto_data/v2.bin |