Commit Graph

20 Commits

Author SHA1 Message Date
Guido Vranken 5ccca1f931
[cryptofuzz] Add Microsoft SymCrypt (#3826) 2020-05-15 14:22:52 -07:00
Volodia 1acee22547
cryptofuzz: fix libgcrypt cloning (#3737) 2020-04-29 12:15:07 -07:00
Guido Vranken 24cb3468e1
[cryptofuzz] Add libtomcrypt (#3713) 2020-04-25 20:19:27 -07:00
Guido Vranken 9e6fc1ed39
[cryptofuzz] Enable libsodium again (#3631) 2020-04-13 06:36:50 -07:00
Guido Vranken f669d3e9f6
[cryptofuzz] Fix NSS coverage (#3459) 2020-03-04 06:02:31 -08:00
Guido Vranken 43b0a9a0e4 [cryptofuzz] Remove OpenSSL 1.0.2 and 1.1.0 (#3156)
OpenSSL 1.1.0 has been end-of-life since 11 September 2019.
OpenSSL 1.0.2 will be end-of-life on 31 December 2019.

Per https://www.openssl.org/policies/releasestrat.html
2019-12-20 06:38:34 -08:00
Guido Vranken 40d7406c1f [cryptofuzz] Add NSS (#3089)
* [cryptofuzz] Add NSS

* [cryptofuzz] Add NSS CCs
2019-12-04 16:55:39 -08:00
Guido Vranken 16ddb85aaf [cryptofuzz] ARM mbed crypto (#3021) 2019-11-09 16:26:12 -08:00
Guido Vranken 82dcfabe3d [cryptofuzz] wolfCrypt (#3004) 2019-11-03 17:49:40 -08:00
Guido Vranken 5a2952267a [cryptofuzz] Add Botan (#2780) 2019-08-30 15:00:49 -07:00
Guido Vranken c09f8970da [cryptofuzz] Golang (#2643) 2019-07-31 15:40:12 -07:00
Guido Vranken f5f49fdc7f [cryptofuzz] Cityhash reference implementation (#2636) 2019-07-30 07:11:27 -07:00
Guido Vranken 6eab2634bf Cryptofuzz i386 (#2569)
* [cryptofuzz] Enable i386 builds

* [cryptofuzz] Enable i386 builds (update project.yaml)
2019-07-05 10:12:40 -07:00
Guido Vranken e5280acde4 [cryptofuzz] Add OpenSSL 1.0.2 and 1.1.0 targets (#2454) 2019-05-30 18:02:28 -07:00
Guido Vranken 1198743824 [cryptofuzz] EverCrypt: Don't explicitly allow AVX instructions (#2441)
* [cryptofuzz] EverCrypt: Don't explicitly allow AVX instructions

Recent crashes involving EverCrypt were found to be caused by
AVX instructions in the EverCrypt library. The Makefile explicitly
allowed the use of AVX instructions via hardcoded CFLAGS. The authors
have released a new version that should resolve this problem.

* [cryptofuzz, bignum-fuzzer] Revert to default OpenSSL build method

Reverts the workaround for OpenSSL broken build script, which is
now fixed.

* [cryptofuzz] Compile with -D_GLIBCXX_DEBUG (runtime C++ UB checks)
2019-05-19 07:59:05 -07:00
Guido Vranken a8d264b377 [cryptofuzz] Add EverCrypt (#2430) 2019-05-17 08:03:10 -07:00
Guido Vranken 3d4e351c0b [cryptofuzz] Add Crypto++ and libgcrypt (#2401) 2019-05-14 09:45:13 -07:00
Guido Vranken 955616ba12 [cryptofuzz] Add libsodium, Whirlpool reference impl, Veracrypt, Monero (#2378) 2019-05-03 17:41:16 -07:00
Guido Vranken 1ea634a278 Cryptofuzz fixes (#2337)
* [cryptofuzz] Use latest OpenSSL version

This is a workaround for an issue OpenSSL's build system is currently
having. I've appended || true to the build command so failure is not
signaled to the Docker process running the build script, and the build
is not aborted.

Multithreaded compiling has been removed temporarily to avoid a race
condition that causes the make procedure to abort before libcrypto.a
has been compiled.

* [cryptofuzz] Build against LIB_FUZZING_ENGINE_DEPRECATED to prevent crashes
2019-04-18 13:07:09 -07:00
Guido Vranken 7bdfb2b7d8 Cryptofuzz (differential crypto fuzzing) (#2273)
* Add cryptofuzz

* [cryptofuzz] Specify sanitizers

* [cryptofuzz] Actually disable assembly in second OpenSSL build

* [cryptofuzz] Add BoringSSL

* [cryptofuzz] Enable MemorySanitizer builds

* [cryptofuzz] Fix OpenSSL build

* [cryptofuzz] Add LibreSSL target

* [cryptofuzz] Don't build LibreSSL if MemorySanitizer is enabled

* [cryptofuzz] Adapt build script to latest cryptofuzz code

* [cryptofuzz] Force rebuild of OpenSSL

* [cryptofuzz] Comment and move to Dockerfile OpenSSL's commit lock

* [cryptofuzz] BoringSSL, LibreSSL: only build libcrypto.a for faster builds

* [cryptofuzz] Replace -lFuzzingEngine -> $LIB_FUZZING_ENGINE for compatibility with OSS-Fuzz' new build setup

* [cryptofuzz] Add README.md
2019-04-17 20:33:50 -07:00