Commit Graph

4 Commits

Author SHA1 Message Date
Phil Turnbull 15fdde6938
krb5: Add gss_accept_sec_context fuzz harness (#9800)
`gss_accept_sec_context` is one of the main APIs used for server
applications and typically accepts untrusted data via the `input_token`
parameter.

@greghudson: fyi, here's the improvements to the fuzzing setup that we
discussed via email.
2023-02-28 09:14:37 -05:00
DavidKorczynski 1896aedfc3
krb5: refine set up (#9036)
Fixes: https://github.com/google/oss-fuzz/issues/9028

Signed-off-by: David Korczynski <david@adalogics.com>

Signed-off-by: David Korczynski <david@adalogics.com>
2022-11-22 13:48:54 +00:00
Arjun 9fc7c4ce43
[krb5] update (#8726)
- build fix
- remove Fuzz_rdreq, Crypto fail after some time [not reliable hanress]
- fix Fuzz_chpw.c harness [add null byte at end]
- fix Fuzz_json.c harness [add null byte at end]
- add krb5_decode_ticket harness
- some miner update
Signed-off-by: 0x34d <ajsinghyadav00@gmail.com>

Signed-off-by: 0x34d <ajsinghyadav00@gmail.com>
2022-10-09 10:29:44 -04:00
Arjun 179b15c946
[krb5] initial integration (#8452)
Hello @krb5 and Team @tlyu @greghudson @kaduk
Can you comment on ```krb5``` integration into ```oss-fuzz``` for
```security and fuzzing``` of krb5?
I and the ```oss-fuzz``` team would like to hear your thought on
integration.


Signed-off-by: 0x34d <ajsinghyadav00@gmail.com>

Signed-off-by: 0x34d <ajsinghyadav00@gmail.com>
2022-09-22 07:48:58 -04:00