-
Notifications
You must be signed in to change notification settings - Fork 122
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fuzzing PKCS7 encrypted inputs #2027
Conversation
Codecov ReportAll modified and coverable lines are covered by tests ✅
Additional details and impacted files@@ Coverage Diff @@
## main #2027 +/- ##
==========================================
- Coverage 78.79% 78.77% -0.03%
==========================================
Files 598 598
Lines 103722 103724 +2
Branches 14743 14742 -1
==========================================
- Hits 81727 81705 -22
- Misses 21342 21367 +25
+ Partials 653 652 -1 ☔ View full report in Codecov by Sentry. |
6cdbc3d
to
b6d417e
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
note to other reviewers -- i had trouble with the "files changed" tab. i found it easier to review fuzz/pkcs7_decrypt.cc
in the "commits" tab.
67cc3f1
to
6e202ba
Compare
Issues:
Addresses: CryptoAlg-2786
Description of changes:
Add fuzz testing around processing of PKCS7 encrypted inputs.
Call-outs:
I created an initial fuzz corpus by serializing the test cases from PKCS7Test.TestEnvelope into files.
I completed a several iterations of: running the fuzz test for awhile, then minimizing the corpora, then repeat.
Build
Fuzzing:
Minimize:
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license and the ISC license.