Closed Bug 1338620 Opened 4 years ago Closed 4 years ago
Derive tls-client fuzzer configuration from input data
Kostya proposed, instead of prepending a bitmap to the fuzzing corpus, computing a bitmap out of the fuzzing corpus. That way we can support different connection options and keep compatibility with other TLS fuzzers from OpenSSL or BoringSSL.
Status: ASSIGNED → RESOLVED
Closed: 4 years ago
Resolution: --- → FIXED
Target Milestone: --- → 3.30
You need to log in before you can comment on or make changes to this bug.