Skip to content

Fuzzing the Rust crypto library orion with honggfuzz-rs

License

Notifications You must be signed in to change notification settings

orion-rs/orion-fuzz

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

These are fuzzing targets for fuzzing orion.

Fuzzing is done using honggfuzz-rs.

Getting started

To start fuzzing, you must install the same version of honggfuzz as the one specified in the Cargo.toml:

cargo install --force honggfuzz --vers 0.5.56

By default, the master branch of orion is used for fuzzing. If another version needs to be fuzzed, specify the version in the Cargo.toml accordingly.

Some fuzzing targets use sodiumoxide to cross-verify results. Any target that uses sodiumoxide requires libsodium to be installed on the system as well.

Fuzzing with sanitizers

To fuzz with ASan (with ODR violation detection turned off):

RUSTFLAGS="-Z sanitizer=address" ASAN_OPTIONS="detect_odr_violation=0" cargo +nightly hfuzz run aead

To fuzz with LeakSanitizer:

RUSTFLAGS="-Z sanitizer=leak" cargo +nightly hfuzz run aead

Some of the targets do some heavy processing, so specifying the timeout can be required:

RUSTFLAGS="-Z sanitizer=address" ASAN_OPTIONS="detect_odr_violation=0" HFUZZ_RUN_ARGS="-t 30" cargo +nightly hfuzz run aead

where -t 30 is in seconds.

All the above examples run the aead target. This can be any fuzzing target in src/ that is not util.

Corpus minimization

HFUZZ_RUN_ARGS="--minimize" cargo hfuzz run aead

About

Fuzzing the Rust crypto library orion with honggfuzz-rs

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages