Chromium Code Reviews| OLD | NEW |
|---|---|
| (Empty) | |
| 1 // Copyright 2017 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #include <stddef.h> | |
| 6 #include <stdint.h> | |
| 7 | |
| 8 #include "net/ntlm/ntlm_client.h" | |
| 9 #include "net/ntlm/ntlm_test_data.h" | |
| 10 | |
| 11 extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { | |
| 12 net::ntlm::NtlmClient client; | |
| 13 | |
| 14 // The challenge message is the input to the fuzzer. This data would | |
| 15 // normally come from the server. The returned Authenticate message is | |
| 16 // ignored. | |
| 17 client.GenerateAuthenticateMessage( | |
| 18 net::ntlm::test::kNtlmDomain, net::ntlm::test::kUser, | |
| 19 net::ntlm::test::kPassword, net::ntlm::test::kHostnameAscii, | |
| 20 net::ntlm::test::kClientChallenge, net::ntlm::Buffer(data, size)); | |
|
mmenke
2017/07/20 19:44:50
Is there any benefit to fuzzing any of the other f
zentaro
2017/08/02 15:01:41
Done.
| |
| 21 return 0; | |
| 22 } | |
|
asanka
2017/07/20 19:39:56
Given that the library is for explicit credentials
asanka
2017/07/20 19:42:24
If the server is allowed to disable Unicode, then
zentaro
2017/08/02 15:01:41
Done. I think using the fuzzed data provider cover
| |
| OLD | NEW |