Closed Bug 1338620 Opened 4 years ago Closed 4 years ago

Derive tls-client fuzzer configuration from input data

Categories

(NSS :: Libraries, defect)

defect
Not set
normal

Tracking

(Not tracked)

RESOLVED FIXED

People

(Reporter: ttaubert, Assigned: ttaubert)

Details

Kostya proposed, instead of prepending a bitmap to the fuzzing corpus, computing a bitmap out of the fuzzing corpus. That way we can support different connection options and keep compatibility with other TLS fuzzers from OpenSSL or BoringSSL.
https://hg.mozilla.org/projects/nss/rev/9296c4353e76
Status: ASSIGNED → RESOLVED
Closed: 4 years ago
Resolution: --- → FIXED
Target Milestone: --- → 3.30
You need to log in before you can comment on or make changes to this bug.