{"schema":"libjg2-1",
"vpath":"/git/",
"avatar":"/git/avatar/",
"alang":"",
"gen_ut":1756322032,
"reponame":"openssl",
"desc":"OpenSSL",
"owner": { "name": "Andy Green", "email": "andy@warmcat.com", "md5": "c50933ca2aa61e0fe2c43d46bb6b59cb" },"url":"https://warmcat.com/repo/openssl",
"f":3,
"items": [
{ "schema":"libjg2-1",
"oid":{ "oid": "a15cfae6561e9f68e6fd505f718e04fd9adae86a", "alias": []},"tree": [
{ "name": "corpora","mode": "16384", "size":0},
{ "name": "README.md","mode": "33188", "size":2049},
{ "name": "asn1.c","mode": "33188", "size":2147},
{ "name": "asn1parse.c","mode": "33188", "size":772},
{ "name": "bignum.c","mode": "33188", "size":2384},
{ "name": "bndiv.c","mode": "33188", "size":2998},
{ "name": "build.info","mode": "33188", "size":1362},
{ "name": "cms.c","mode": "33188", "size":716},
{ "name": "conf.c","mode": "33188", "size":768},
{ "name": "ct.c","mode": "33188", "size":628},
{ "name": "driver.c","mode": "33188", "size":1147},
{ "name": "fuzzer.h","mode": "33188", "size":473},
{ "name": "helper.py","mode": "33261", "size":1357},
{ "name": "server.c","mode": "33188", "size":14611}],"s":{"c":1756322032,"u": 1908}}
,{"schema":"libjg2-1",
"cid":"59f15e3a9e72448b9ac05185f17ea4c8",
"oid":{ "oid": "a15cfae6561e9f68e6fd505f718e04fd9adae86a", "alias": []},"blobname": "fuzz/README.md", "blob": "# I Can Haz Fuzz?\n\nLibFuzzer\n\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\n\nOr, how to fuzz OpenSSL with [libfuzzer](llvm.org/docs/LibFuzzer.html).\n\nStarting from a vanilla+OpenSSH server Ubuntu install.\n\nUse Chrome's handy recent build of clang. Older versions may also work.\n\n $ sudo apt-get install git\n $ mkdir git-work\n $ git clone https://chromium.googlesource.com/chromium/src/tools/clang\n $ clang/scripts/update.py\n\nYou may want to git pull and re-run the update from time to time.\n\nUpdate your path:\n\n $ PATH\u003d~/third_party/llvm-build/Release+Asserts/bin/:$PATH\n\nGet and build libFuzzer (there is a git mirror at\nhttps://github.com/llvm-mirror/llvm/tree/master/lib/Fuzzer if you prefer):\n\n $ cd\n $ sudo apt-get install subversion\n $ mkdir svn-work\n $ cd svn-work\n $ svn co http://llvm.org/svn/llvm-project/llvm/trunk/lib/Fuzzer\n $ cd Fuzzer\n $ clang++ -c -g -O2 -std\u003dc++11 *.cpp\n $ ar r libFuzzer.a *.o\n $ ranlib libFuzzer.a\n\nConfigure for fuzzing:\n\n $ CC\u003dclang ./config enable-fuzz-libfuzzer \u005c\n --with-fuzzer-include\u003d../../svn-work/Fuzzer \u005c\n --with-fuzzer-lib\u003d../../svn-work/Fuzzer/libFuzzer \u005c\n enable-asan enable-ubsan no-shared\n $ sudo apt-get install make\n $ LDCMD\u003dclang++ make -j\n $ fuzz/helper.py \u003cfuzzer\u003e \u003carguments\u003e\n\nWhere `\u003cfuzzer\u003e` is one of the executables in `fuzz/`. Most fuzzers do not\nneed any command line arguments, but, for example, `asn1` needs the name of a\ndata type.\n\nIf you get a crash, you should find a corresponding input file in\n`fuzz/corpora/\u003cfuzzer\u003e-crash/`. You can reproduce the crash with\n\n $ fuzz/\u003cfuzzer\u003e \u003ccrashfile\u003e\n\nAFL\n\u003d\u003d\u003d\n\nConfigure for fuzzing:\n\n $ sudo apt-get install afl-clang\n $ CC\u003dafl-clang-fast ./config enable-fuzz-afl no-shared\n $ make\n\nRun one of the fuzzers:\n\n $ afl-fuzz fuzz/\u003cfuzzer\u003e -i fuzz/corpora/\u003cfuzzer\u003e -o fuzz/corpora/\u003cfuzzer\u003e/out \u003cfuzzer\u003e \u003carguments\u003e\n\nWhere `\u003cfuzzer\u003e` is one of the executables in `fuzz/`. Most fuzzers do not\nneed any command line arguments, but, for example, `asn1` needs the name of a\ndata type.\n","s":{"c":1756322032,"u": 269}}
],"g": 4367,"chitpc": 0,"ehitpc": 0,"indexed":0
,
"ab": 1, "si": 0, "db":0, "di":1, "sat":0, "lfc": "0000"}