84d2a36da0
Signed-off-by: Rameshkumar Sundaram <quic_ramess@quicinc.com> Co-developed-by: Adil Saeed Musthafa <quic_adilm@quicinc.com> Signed-off-by: Adil Saeed Musthafa <quic_adilm@quicinc.com> Signed-off-by: Aditya Kumar Singh <quic_adisi@quicinc.com> |
||
---|---|---|
.. | ||
ap-mgmt | ||
asn1 | ||
dpp-uri | ||
eap-aka-peer | ||
eap-mschapv2-peer | ||
eap-sim-peer | ||
eapol-key-auth | ||
eapol-key-supp | ||
eapol-supp | ||
json | ||
p2p | ||
pasn-init | ||
pasn-resp | ||
sae | ||
tls-client | ||
tls-server | ||
wnm | ||
x509 | ||
build-test.sh | ||
fuzzer-common.c | ||
fuzzer-common.h | ||
README | ||
rules.include |
hostap.git fuzz testing ----------------------- These tools can be used for fuzz testing of various components used within wpa_supplicant and hostapd. Each directory contains a fuzzing tool that focuses on one input handler. Each tool can be compiled either to work with the libFuzzer or as a separate tool that reads the input from a file specified on the command line, e.g., for American fuzzy lop (afl-fuzz). Example test corpus is included in */corpus directory. Example fuzzing with libFuzzer cd @TOOL@ make clean make LIBFUZZER=y ./@TOOL@ corpus Example fuzzing with afl-fuzz cd @TOOL@ make clean CC=afl-gcc make afl-fuzz -i corpus -o findings -- $PWD/@TOOL@ @@