Derive tls-client fuzzer configuration from input data

RESOLVED FIXED in 3.30

Status

RESOLVED FIXED
2 years ago
2 years ago

People

(Reporter: ttaubert, Assigned: ttaubert)

Tracking

Firefox Tracking Flags

(Not tracked)

Details

(Assignee)

Description

2 years ago
Kostya proposed, instead of prepending a bitmap to the fuzzing corpus, computing a bitmap out of the fuzzing corpus. That way we can support different connection options and keep compatibility with other TLS fuzzers from OpenSSL or BoringSSL.
(Assignee)

Comment 2

2 years ago
https://hg.mozilla.org/projects/nss/rev/9296c4353e76
Status: ASSIGNED → RESOLVED
Last Resolved: 2 years ago
Resolution: --- → FIXED
Target Milestone: --- → 3.30
You need to log in before you can comment on or make changes to this bug.