summaryrefslogtreecommitdiffstats
path: root/fuzz/Makefile.am
diff options
context:
space:
mode:
Diffstat (limited to 'fuzz/Makefile.am')
-rw-r--r--fuzz/Makefile.am126
1 files changed, 126 insertions, 0 deletions
diff --git a/fuzz/Makefile.am b/fuzz/Makefile.am
new file mode 100644
index 0000000..34a8919
--- /dev/null
+++ b/fuzz/Makefile.am
@@ -0,0 +1,126 @@
+AM_CFLAGS = $(WERROR_CFLAGS) $(WARN_CFLAGS) -Wno-unused-parameter -Wno-pedantic
+AM_CPPFLAGS = -I$(top_srcdir)/lib/includes -I$(top_builddir)/lib/includes -I$(srcdir) \
+ -DSRCDIR=\"$(abs_srcdir)\" -DTEST_RUN
+
+LDADD = ../gl/libgnu.la ../lib/libgnutls.la \
+ $(LIBOBJS) $(GETADDRINFO_LIB) $(HOSTENT_LIB) $(INET_NTOP_LIB)\
+ $(LIBSOCKET) $(LIB_CLOCK_GETTIME) $(LIB_NANOSLEEP) $(LIB_POLL) $(LIB_PTHREAD)\
+ $(LIB_SELECT) $(LIBTHREAD) $(SERVENT_LIB) \
+ $(LIBS)
+
+FUZZERS = \
+ gnutls_x509_verify_fuzzer$(EXEEXT) \
+ gnutls_base64_decoder_fuzzer$(EXEEXT) \
+ gnutls_base64_encoder_fuzzer$(EXEEXT) \
+ gnutls_client_fuzzer$(EXEEXT) \
+ gnutls_client_rawpk_fuzzer$(EXEEXT) \
+ gnutls_dn_parser_fuzzer$(EXEEXT) \
+ gnutls_idna_parser_fuzzer$(EXEEXT) \
+ gnutls_ocsp_req_parser_fuzzer$(EXEEXT) \
+ gnutls_ocsp_resp_parser_fuzzer$(EXEEXT) \
+ gnutls_pkcs12_key_parser_fuzzer$(EXEEXT) \
+ gnutls_pkcs7_parser_fuzzer$(EXEEXT) \
+ gnutls_pkcs8_key_parser_fuzzer$(EXEEXT) \
+ gnutls_private_key_parser_fuzzer$(EXEEXT) \
+ gnutls_psk_client_fuzzer$(EXEEXT) \
+ gnutls_psk_server_fuzzer$(EXEEXT) \
+ gnutls_reverse_idna_parser_fuzzer$(EXEEXT) \
+ gnutls_server_fuzzer$(EXEEXT) \
+ gnutls_server_rawpk_fuzzer$(EXEEXT) \
+ gnutls_srp_client_fuzzer$(EXEEXT) \
+ gnutls_srp_server_fuzzer$(EXEEXT) \
+ gnutls_set_trust_file_fuzzer$(EXEEXT) \
+ gnutls_x509_crl_parser_fuzzer$(EXEEXT) \
+ gnutls_x509_crq_parser_fuzzer$(EXEEXT) \
+ gnutls_x509_parser_fuzzer$(EXEEXT) \
+ gnutls_ext_raw_parse_fuzzer$(EXEEXT) \
+ gnutls_handshake_client_fuzzer$(EXEEXT) \
+ gnutls_handshake_server_fuzzer$(EXEEXT)
+
+check_PROGRAMS = $(FUZZERS)
+
+COMMON_SOURCES = main.c fuzzer.h
+gnutls_x509_verify_fuzzer_SOURCES = gnutls_x509_verify_fuzzer.c $(COMMON_SOURCES)
+gnutls_base64_decoder_fuzzer_SOURCES = gnutls_base64_decoder_fuzzer.c $(COMMON_SOURCES)
+gnutls_base64_encoder_fuzzer_SOURCES = gnutls_base64_encoder_fuzzer.c $(COMMON_SOURCES)
+gnutls_client_fuzzer_SOURCES = gnutls_client_fuzzer.c $(COMMON_SOURCES) mem.h certs.h
+gnutls_client_rawpk_fuzzer_SOURCES = gnutls_client_rawpk_fuzzer.c $(COMMON_SOURCES) mem.h certs.h
+gnutls_handshake_client_fuzzer_SOURCES = gnutls_handshake_client_fuzzer.c $(COMMON_SOURCES) handshake.h
+gnutls_dn_parser_fuzzer_SOURCES = gnutls_dn_parser_fuzzer.c $(COMMON_SOURCES)
+gnutls_idna_parser_fuzzer_SOURCES = gnutls_idna_parser_fuzzer.c $(COMMON_SOURCES)
+gnutls_ocsp_req_parser_fuzzer_SOURCES = gnutls_ocsp_req_parser_fuzzer.c $(COMMON_SOURCES)
+gnutls_ocsp_resp_parser_fuzzer_SOURCES = gnutls_ocsp_resp_parser_fuzzer.c $(COMMON_SOURCES)
+gnutls_pkcs12_key_parser_fuzzer_SOURCES = gnutls_pkcs12_key_parser_fuzzer.c $(COMMON_SOURCES)
+gnutls_pkcs7_parser_fuzzer_SOURCES = gnutls_pkcs7_parser_fuzzer.c $(COMMON_SOURCES)
+gnutls_pkcs8_key_parser_fuzzer_SOURCES = gnutls_pkcs8_key_parser_fuzzer.c $(COMMON_SOURCES)
+gnutls_private_key_parser_fuzzer_SOURCES = gnutls_private_key_parser_fuzzer.c $(COMMON_SOURCES)
+gnutls_psk_client_fuzzer_SOURCES = gnutls_psk_client_fuzzer.c $(COMMON_SOURCES) mem.h psk.h
+gnutls_psk_server_fuzzer_SOURCES = gnutls_psk_server_fuzzer.c $(COMMON_SOURCES) mem.h psk.h
+gnutls_reverse_idna_parser_fuzzer_SOURCES = gnutls_reverse_idna_parser_fuzzer.c $(COMMON_SOURCES)
+gnutls_server_fuzzer_SOURCES = gnutls_server_fuzzer.c $(COMMON_SOURCES) mem.h certs.h
+gnutls_server_rawpk_fuzzer_SOURCES = gnutls_server_rawpk_fuzzer.c $(COMMON_SOURCES) mem.h certs.h
+gnutls_handshake_server_fuzzer_SOURCES = gnutls_handshake_server_fuzzer.c $(COMMON_SOURCES) handshake.h certs.h
+gnutls_srp_client_fuzzer_SOURCES = gnutls_srp_client_fuzzer.c $(COMMON_SOURCES) mem.h srp.h
+gnutls_srp_server_fuzzer_SOURCES = gnutls_srp_server_fuzzer.c $(COMMON_SOURCES) mem.h srp.h
+gnutls_set_trust_file_fuzzer_SOURCES = gnutls_set_trust_file_fuzzer.c $(COMMON_SOURCES)
+gnutls_x509_crl_parser_fuzzer_SOURCES = gnutls_x509_crq_parser_fuzzer.c $(COMMON_SOURCES)
+gnutls_x509_crq_parser_fuzzer_SOURCES = gnutls_x509_crq_parser_fuzzer.c $(COMMON_SOURCES)
+gnutls_x509_parser_fuzzer_SOURCES = gnutls_x509_parser_fuzzer.c $(COMMON_SOURCES)
+gnutls_ext_raw_parse_fuzzer_SOURCES = gnutls_ext_raw_parse_fuzzer.c $(COMMON_SOURCES)
+
+gnutls_set_trust_file_fuzzer_LDADD = $(LDADD) $(LIBDL)
+
+
+#EXTRA_DIST = $(wildcard *.options) $(wildcard *.dict) \
+# $(wildcard *.in) $(wildcard *.repro)
+
+# We don't include the fuzz corpora into the tarball.
+# Testing the corpora during dev cycles and in the CI is enough.
+dist-hook:
+ find . -name '*.options' -exec cp -v '{}' $(distdir) ';'
+ find . -name '*.dict' -exec cp -v '{}' $(distdir) ';'
+# find . -name '*.in' -exec cp -vr '{}' $(distdir) ';'
+ find . -name '*.repro' -exec cp -vr '{}' $(distdir) ';'
+
+TESTS = $(FUZZERS)
+
+clean-local:
+ rm -rf *.gc?? *.log lcov
+
+oss-fuzz:
+ if test "$$OUT" != ""; then \
+ for ccfile in *_fuzzer.c; do \
+ fuzzer=$$(basename $$ccfile .c); \
+ XLIBS="-lhogweed -lnettle -ltasn1 -lgmp -lidn2 -lunistring"; \
+ $$CC $$CFLAGS -I$(top_srcdir)/lib/includes/ -I$(top_srcdir) \
+ -c "$${fuzzer}.c" -o "$${fuzzer}.o" ; \
+ $$CXX $$CXXFLAGS "$${fuzzer}.o" -o "$${fuzzer}" \
+ $$LDFLAGS ../lib/.libs/libgnutls.a $${LIB_FUZZING_ENGINE} \
+ -Wl,-z,muldefs \
+ -Wl,-Bstatic \
+ $${XLIBS} \
+ -Wl,-Bdynamic || exit $?; \
+ done; \
+ fi
+
+.PHONY: oss-fuzz
+
+CFLAGS ?=
+LDFLAGS ?=
+LCOV_INFO = coverage.info
+
+coverage-prepare: clean
+ rm -rf $(LCOV_INFO) ../*/*.gc?? ../*/.libs/*.gc?? lcov/
+ lcov --zerocounters --directory ../lib/
+ $(MAKE) -C .. clean
+ $(MAKE) -C ../gl
+ $(MAKE) -C ../lib CFLAGS="$(CFLAGS) --coverage" LDFLAGS="$(LDFLAGS) --coverage"
+
+coverage:
+ lcov --capture --initial --directory ../lib/ --output-file $(LCOV_INFO)
+ $(MAKE) check CFLAGS="$(CFLAGS) --coverage" LDFLAGS="$(LDFLAGS) --coverage"
+ lcov --capture --directory ../lib/ --output-file $(LCOV_INFO)
+ lcov --remove $(LCOV_INFO) '/usr/include/*' '*/gl/*' -o $(LCOV_INFO)
+ genhtml --prefix . --ignore-errors source $(LCOV_INFO) --legend --title "gnutls-fuzz" --output-directory=lcov
+ @echo
+ @echo "You can now view the coverage report with 'xdg-open lcov/index.html'"