OLD | NEW |
---|---|
(Empty) | |
1 // Copyright 2017 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include <stddef.h> | |
6 #include <stdint.h> | |
7 | |
8 #include "net/ntlm/ntlm_client.h" | |
9 #include "net/ntlm/ntlm_test_data.h" | |
10 | |
11 extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { | |
12 net::ntlm::NtlmClient client; | |
13 | |
14 // The challenge message is the input to the fuzzer. This data would | |
15 // normally come from the server. The returned Authenticate message is | |
16 // ignored. | |
17 client.GenerateAuthenticateMessage( | |
18 net::ntlm::test::kNtlmDomain, net::ntlm::test::kUser, | |
19 net::ntlm::test::kPassword, net::ntlm::test::kHostnameAscii, | |
20 net::ntlm::test::kClientChallenge, net::ntlm::Buffer(data, size)); | |
mmenke
2017/07/20 19:44:50
Is there any benefit to fuzzing any of the other f
zentaro
2017/08/02 15:01:41
Done.
| |
21 return 0; | |
22 } | |
asanka
2017/07/20 19:39:56
Given that the library is for explicit credentials
asanka
2017/07/20 19:42:24
If the server is allowed to disable Unicode, then
zentaro
2017/08/02 15:01:41
Done. I think using the fuzzed data provider cover
| |
OLD | NEW |