mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2024-12-12 17:08:20 -05:00
5f11739d58
Update the fizzing test tools to use the new set_key() prototype, i.e., add the new key_flag argument, to get rid of compiler warnings. Signed-off-by: Jouni Malinen <j@w1.fi> |
||
---|---|---|
.. | ||
ap-mgmt | ||
asn1 | ||
eap-aka-peer | ||
eap-mschapv2-peer | ||
eap-sim-peer | ||
eapol-key-auth | ||
eapol-key-supp | ||
eapol-supp | ||
json | ||
p2p | ||
tls-client | ||
tls-server | ||
wnm | ||
x509 | ||
build-test.sh | ||
fuzzer-common.c | ||
fuzzer-common.h | ||
README | ||
rules.include |
hostap.git fuzz testing ----------------------- These tools can be used for fuzz testing of various components used within wpa_supplicant and hostapd. Each directory contains a fuzzing tool that focuses on one input handler. Each tool can be compiled either to work with the libFuzzer or as a separate tool that reads the input from a file specified on the command line, e.g., for American fuzzy lop (afl-fuzz). Example test corpus is included in */corpus directory. Example fuzzing with libFuzzer cd @TOOL@ make clean make LIBFUZZER=y ./@TOOL@ corpus Example fuzzing with afl-fuzz cd @TOOL@ make clean CC=afl-gcc make afl-fuzz -i corpus -o findings -- $PWD/@TOOL@ @@