<feed xmlns='http://www.w3.org/2005/Atom'>
<title>samba.git/lib/fuzzing/wscript_build, branch talloc-2.3.1</title>
<subtitle>Unnamed repository; edit this file 'description' to name the repository.</subtitle>
<link rel='alternate' type='text/html' href='https://git.exis.tech/samba.git/'/>
<entry>
<title>Add fuzzing binary for ldb_parse_tree</title>
<updated>2019-10-18T07:31:45+00:00</updated>
<author>
<name>Michael Hanselmann</name>
<email>public@hansmi.ch</email>
</author>
<published>2019-04-11T22:46:49+00:00</published>
<link rel='alternate' type='text/html' href='https://git.exis.tech/samba.git/commit/?id=c4e902be7226e596d7bbba8baf4389eeab0ca8b6'/>
<id>c4e902be7226e596d7bbba8baf4389eeab0ca8b6</id>
<content type='text'>
Signed-off-by: Michael Hanselmann &lt;public@hansmi.ch&gt;
Reviewed-by: Andrew Bartlett &lt;abartlet@samba.org&gt;
Reviewed-by: Uri Simchoni &lt;uri@samba.org&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Signed-off-by: Michael Hanselmann &lt;public@hansmi.ch&gt;
Reviewed-by: Andrew Bartlett &lt;abartlet@samba.org&gt;
Reviewed-by: Uri Simchoni &lt;uri@samba.org&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Add fuzzing binary for ldap_decode</title>
<updated>2019-10-18T07:31:45+00:00</updated>
<author>
<name>Michael Hanselmann</name>
<email>public@hansmi.ch</email>
</author>
<published>2019-04-09T23:20:36+00:00</published>
<link rel='alternate' type='text/html' href='https://git.exis.tech/samba.git/commit/?id=de7c78335de63f95f97f946aec287b7bb87f6b47'/>
<id>de7c78335de63f95f97f946aec287b7bb87f6b47</id>
<content type='text'>
Signed-off-by: Michael Hanselmann &lt;public@hansmi.ch&gt;
Reviewed-by: Andrew Bartlett &lt;abartlet@samba.org&gt;
Reviewed-by: Uri Simchoni &lt;uri@samba.org&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Signed-off-by: Michael Hanselmann &lt;public@hansmi.ch&gt;
Reviewed-by: Andrew Bartlett &lt;abartlet@samba.org&gt;
Reviewed-by: Uri Simchoni &lt;uri@samba.org&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Add fuzzing binary for lzxpress</title>
<updated>2019-10-18T07:31:45+00:00</updated>
<author>
<name>Michael Hanselmann</name>
<email>public@hansmi.ch</email>
</author>
<published>2019-04-09T22:36:03+00:00</published>
<link rel='alternate' type='text/html' href='https://git.exis.tech/samba.git/commit/?id=f9c39237adfaf1ea223e5c810d019f433af95cf0'/>
<id>f9c39237adfaf1ea223e5c810d019f433af95cf0</id>
<content type='text'>
Signed-off-by: Michael Hanselmann &lt;public@hansmi.ch&gt;
Reviewed-by: Andrew Bartlett &lt;abartlet@samba.org&gt;
Reviewed-by: Uri Simchoni &lt;uri@samba.org&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Signed-off-by: Michael Hanselmann &lt;public@hansmi.ch&gt;
Reviewed-by: Andrew Bartlett &lt;abartlet@samba.org&gt;
Reviewed-by: Uri Simchoni &lt;uri@samba.org&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Add fuzzing binary for regfio</title>
<updated>2019-10-18T07:31:45+00:00</updated>
<author>
<name>Michael Hanselmann</name>
<email>public@hansmi.ch</email>
</author>
<published>2019-04-04T00:26:26+00:00</published>
<link rel='alternate' type='text/html' href='https://git.exis.tech/samba.git/commit/?id=a42a5a42f79cc886d752de1645638e24c600c4d0'/>
<id>a42a5a42f79cc886d752de1645638e24c600c4d0</id>
<content type='text'>
Checksums are better ignored during fuzzing, hence a flag is added to
the regfio parser to disable checksums.

Signed-off-by: Michael Hanselmann &lt;public@hansmi.ch&gt;
Reviewed-by: Andrew Bartlett &lt;abartlet@samba.org&gt;
Reviewed-by: Uri Simchoni &lt;uri@samba.org&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Checksums are better ignored during fuzzing, hence a flag is added to
the regfio parser to disable checksums.

Signed-off-by: Michael Hanselmann &lt;public@hansmi.ch&gt;
Reviewed-by: Andrew Bartlett &lt;abartlet@samba.org&gt;
Reviewed-by: Uri Simchoni &lt;uri@samba.org&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Add fuzzing binary for reg_parse</title>
<updated>2019-10-18T07:31:45+00:00</updated>
<author>
<name>Michael Hanselmann</name>
<email>public@hansmi.ch</email>
</author>
<published>2019-04-04T22:50:09+00:00</published>
<link rel='alternate' type='text/html' href='https://git.exis.tech/samba.git/commit/?id=e477a94ffd3795d7d8aa83e899e9b0f2f9860a79'/>
<id>e477a94ffd3795d7d8aa83e899e9b0f2f9860a79</id>
<content type='text'>
A temporary file is used to store the fuzzing input.

Signed-off-by: Michael Hanselmann &lt;public@hansmi.ch&gt;
Reviewed-by: Andrew Bartlett &lt;abartlet@samba.org&gt;
Reviewed-by: Uri Simchoni &lt;uri@samba.org&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
A temporary file is used to store the fuzzing input.

Signed-off-by: Michael Hanselmann &lt;public@hansmi.ch&gt;
Reviewed-by: Andrew Bartlett &lt;abartlet@samba.org&gt;
Reviewed-by: Uri Simchoni &lt;uri@samba.org&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Add fuzzing binary for oLschema2ldif</title>
<updated>2019-08-07T06:07:28+00:00</updated>
<author>
<name>Michael Hanselmann</name>
<email>public@hansmi.ch</email>
</author>
<published>2019-04-03T23:10:11+00:00</published>
<link rel='alternate' type='text/html' href='https://git.exis.tech/samba.git/commit/?id=39e2f6d59fa2e839c8ef40934790b34dbdfc8f29'/>
<id>39e2f6d59fa2e839c8ef40934790b34dbdfc8f29</id>
<content type='text'>
Use the oLschema2ldif library functions introduced in commit
0c7c44a284a26790081c000f5b8f4ed32f9f21d7 to implement a fuzzing utility.

Signed-off-by: Michael Hanselmann &lt;public@hansmi.ch&gt;
Reviewed-by: Andrew Bartlett &lt;abartlet@samba.org&gt;
Reviewed-by: Douglas Bagnall &lt;douglas.bagnall@catalyst.net.nz&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Use the oLschema2ldif library functions introduced in commit
0c7c44a284a26790081c000f5b8f4ed32f9f21d7 to implement a fuzzing utility.

Signed-off-by: Michael Hanselmann &lt;public@hansmi.ch&gt;
Reviewed-by: Andrew Bartlett &lt;abartlet@samba.org&gt;
Reviewed-by: Douglas Bagnall &lt;douglas.bagnall@catalyst.net.nz&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Add fuzzing binary for tiniparser</title>
<updated>2019-08-07T06:07:28+00:00</updated>
<author>
<name>Michael Hanselmann</name>
<email>public@hansmi.ch</email>
</author>
<published>2019-04-03T23:03:58+00:00</published>
<link rel='alternate' type='text/html' href='https://git.exis.tech/samba.git/commit/?id=404278d9472c28fedc200d385667a0d2cc1c992d'/>
<id>404278d9472c28fedc200d385667a0d2cc1c992d</id>
<content type='text'>
The "tiniparser_load" function is made into a wrapper for the newly
added "tiniparser_load_stream" function which accepts a FILE pointer.
This way no actual files have to be opened for fuzzing (memfd_create(2)
isn't readily available on all systems yet).

Signed-off-by: Michael Hanselmann &lt;public@hansmi.ch&gt;
Reviewed-by: Andrew Bartlett &lt;abartlet@samba.org&gt;
Reviewed-by: Douglas Bagnall &lt;douglas.bagnall@catalyst.net.nz&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The "tiniparser_load" function is made into a wrapper for the newly
added "tiniparser_load_stream" function which accepts a FILE pointer.
This way no actual files have to be opened for fuzzing (memfd_create(2)
isn't readily available on all systems yet).

Signed-off-by: Michael Hanselmann &lt;public@hansmi.ch&gt;
Reviewed-by: Andrew Bartlett &lt;abartlet@samba.org&gt;
Reviewed-by: Douglas Bagnall &lt;douglas.bagnall@catalyst.net.nz&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Add fuzzing support to build system</title>
<updated>2019-08-07T06:07:28+00:00</updated>
<author>
<name>Michael Hanselmann</name>
<email>public@hansmi.ch</email>
</author>
<published>2019-04-03T22:23:07+00:00</published>
<link rel='alternate' type='text/html' href='https://git.exis.tech/samba.git/commit/?id=dd5f8732d8b2ac6cd86e5d7dc8a9498d2b951a43'/>
<id>dd5f8732d8b2ac6cd86e5d7dc8a9498d2b951a43</id>
<content type='text'>
LibFuzzer, Honggfuzz and other programs implement simple interfaces for
fuzzing appropriately prepared code. Samba contains quite a lot of
parsing code, often a good target for fuzzing.

With this change the build system is amended to support building fuzzing
binaries (added in later changes).

Signed-off-by: Michael Hanselmann &lt;public@hansmi.ch&gt;
Reviewed-by: Andrew Bartlett &lt;abartlet@samba.org&gt;
Reviewed-by: Douglas Bagnall &lt;douglas.bagnall@catalyst.net.nz&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
LibFuzzer, Honggfuzz and other programs implement simple interfaces for
fuzzing appropriately prepared code. Samba contains quite a lot of
parsing code, often a good target for fuzzing.

With this change the build system is amended to support building fuzzing
binaries (added in later changes).

Signed-off-by: Michael Hanselmann &lt;public@hansmi.ch&gt;
Reviewed-by: Andrew Bartlett &lt;abartlet@samba.org&gt;
Reviewed-by: Douglas Bagnall &lt;douglas.bagnall@catalyst.net.nz&gt;
</pre>
</div>
</content>
</entry>
</feed>
