Commit Graph

7 Commits

Author SHA1 Message Date
Guido Vranken 1198743824 [cryptofuzz] EverCrypt: Don't explicitly allow AVX instructions (#2441)
* [cryptofuzz] EverCrypt: Don't explicitly allow AVX instructions

Recent crashes involving EverCrypt were found to be caused by
AVX instructions in the EverCrypt library. The Makefile explicitly
allowed the use of AVX instructions via hardcoded CFLAGS. The authors
have released a new version that should resolve this problem.

* [cryptofuzz, bignum-fuzzer] Revert to default OpenSSL build method

Reverts the workaround for OpenSSL broken build script, which is
now fixed.

* [cryptofuzz] Compile with -D_GLIBCXX_DEBUG (runtime C++ UB checks)
2019-05-19 07:59:05 -07:00
Guido Vranken a8d264b377 [cryptofuzz] Add EverCrypt (#2430) 2019-05-17 08:03:10 -07:00
Guido Vranken 3d4e351c0b [cryptofuzz] Add Crypto++ and libgcrypt (#2401) 2019-05-14 09:45:13 -07:00
Guido Vranken 955616ba12 [cryptofuzz] Add libsodium, Whirlpool reference impl, Veracrypt, Monero (#2378) 2019-05-03 17:41:16 -07:00
jonathanmetzman 7553ee876d
Migrate projects with trouble with exceptions to $LIB_FUZZING_ENGINE (#2359)
Migrate projects that broke libFuzzer with exceptions to $LIB_FUZZING_ENGINE.
Replace uses of -lFuzzingEngine with `$LIB_FUZZING_ENGINE`
2019-04-30 16:48:34 -04:00
Guido Vranken 1ea634a278 Cryptofuzz fixes (#2337)
* [cryptofuzz] Use latest OpenSSL version

This is a workaround for an issue OpenSSL's build system is currently
having. I've appended || true to the build command so failure is not
signaled to the Docker process running the build script, and the build
is not aborted.

Multithreaded compiling has been removed temporarily to avoid a race
condition that causes the make procedure to abort before libcrypto.a
has been compiled.

* [cryptofuzz] Build against LIB_FUZZING_ENGINE_DEPRECATED to prevent crashes
2019-04-18 13:07:09 -07:00
Guido Vranken 7bdfb2b7d8 Cryptofuzz (differential crypto fuzzing) (#2273)
* Add cryptofuzz

* [cryptofuzz] Specify sanitizers

* [cryptofuzz] Actually disable assembly in second OpenSSL build

* [cryptofuzz] Add BoringSSL

* [cryptofuzz] Enable MemorySanitizer builds

* [cryptofuzz] Fix OpenSSL build

* [cryptofuzz] Add LibreSSL target

* [cryptofuzz] Don't build LibreSSL if MemorySanitizer is enabled

* [cryptofuzz] Adapt build script to latest cryptofuzz code

* [cryptofuzz] Force rebuild of OpenSSL

* [cryptofuzz] Comment and move to Dockerfile OpenSSL's commit lock

* [cryptofuzz] BoringSSL, LibreSSL: only build libcrypto.a for faster builds

* [cryptofuzz] Replace -lFuzzingEngine -> $LIB_FUZZING_ENGINE for compatibility with OSS-Fuzz' new build setup

* [cryptofuzz] Add README.md
2019-04-17 20:33:50 -07:00