-
-
Notifications
You must be signed in to change notification settings - Fork 390
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Use fuzzing for testing #15
Comments
Happy to lend a hand on this. Which specific decoding methods are high priority for this? |
Great, your help is much appreciated! Packet decoding by way of |
Naively we could just throw fuzzer data as UDP packets at the implementation, but that wouldn't get us very far because the fuzzer is spectacularly unlikely to make any progress through the cryptographic handshake, leaving the bulk of the implementation untested. A good solution for end-to-end testing might be to add a hook to inject arbitrary data into the plaintext of an arbitrary packet between arbitrary frames, then use that in a fuzzing target to perturb an otherwise valid scripted session like the lifecycle unit test. |
Now that we've gracefully encapsulated the stream logic into the |
A fuzzing effort has been made for |
Certainly! I'm going to go ahead and close this since we've got some fuzzing going now; we should open new issues for specific interfaces of interest. |
@djc, i am having compilation issue with: cargo fuzz check in one of my local dev with stable rust.
For Posterity, i am including quinn-proto as part of my fuzz target's Cargo.toml as |
Happy to review a PR with documentation improvements! |
Initially, can use this to test decoding routines. There's an example at https://github.com/djc/tokio-imap/tree/master/imap-proto/fuzz that might be useful in getting this off the ground.
The text was updated successfully, but these errors were encountered: