asn1.cpp |
Here we use an uninitialized ofstream so the fuzzer doesn't spend time
on actual output formatting, no memory is allocated, etc.
|
1046 |
barrett.cpp |
|
1359 |
bn_cmp.cpp |
|
1614 |
bn_sqr.cpp |
|
436 |
cert.cpp |
|
421 |
crl.cpp |
|
349 |
divide.cpp |
|
1150 |
ecc_bp256.cpp |
|
337 |
ecc_helper.h |
|
2245 |
ecc_p256.cpp |
|
329 |
ecc_p384.cpp |
|
329 |
ecc_p521.cpp |
|
335 |
fuzzers.h |
This disables the mlock pool, as overwrites within the pool are
opaque to ASan or other instrumentation.
|
4297 |
gcd.cpp |
|
1098 |
invert.cpp |
|
2466 |
ipv4.cpp |
|
719 |
mem_pool.cpp |
|
4749 |
mode_padding.cpp |
TLS v1.0 and up require all the padding bytes be the same value
and allows up to 255 bytes.
|
3746 |
mp_comba_mul.cpp |
|
1830 |
mp_comba_sqr.cpp |
|
2372 |
mp_fuzzers.h |
|
1671 |
mp_redc.cpp |
|
2223 |
mp_redc_crandall.cpp |
|
1153 |
oaep.cpp |
|
1502 |
ocsp.cpp |
|
301 |
os2ecp.cpp |
|
1219 |
pkcs1.cpp |
|
1812 |
pkcs8.cpp |
This avoids OOMs in OSS-Fuzz caused by storing precomputations
for thousands of curves randomly generated by the fuzzer.
TODO(Botan4) we can remove this call once support for explicit curves
is removed
|
737 |
pow_mod.cpp |
|
1719 |
ressol.cpp |
|
1300 |
tls_13_handshake_layer.cpp |
|
894 |
tls_client.cpp |
|
3849 |
tls_client_hello.cpp |
|
397 |
tls_server.cpp |
signature_schemes |
6633 |
uri.cpp |
|
437 |
x509_dn.cpp |
|
765 |
x509_path.cpp |
|
745 |