6 Or, how to fuzz OpenSSL with [libfuzzer](http://llvm.org/docs/LibFuzzer.html).
8 Starting from a vanilla+OpenSSH server Ubuntu install.
10 Use Chrome's handy recent build of clang. Older versions may also work.
12 $ sudo apt-get install git
14 $ git clone https://chromium.googlesource.com/chromium/src/tools/clang
15 $ clang/scripts/update.py
17 You may want to git pull and re-run the update from time to time.
21 $ PATH=~/third_party/llvm-build/Release+Asserts/bin/:$PATH
23 Get and build libFuzzer (there is a git mirror at
24 https://github.com/llvm-mirror/llvm/tree/master/lib/Fuzzer if you prefer):
27 $ sudo apt-get install subversion
30 $ svn co http://llvm.org/svn/llvm-project/llvm/trunk/lib/Fuzzer
32 $ clang++ -c -g -O2 -std=c++11 *.cpp
33 $ ar r libFuzzer.a *.o
36 Configure for fuzzing:
38 $ CC=clang ./config enable-fuzz-libfuzzer \
39 --with-fuzzer-include=../../svn-work/Fuzzer \
40 --with-fuzzer-lib=../../svn-work/Fuzzer/libFuzzer \
41 -DPEDANTIC enable-asan enable-ubsan no-shared
42 $ sudo apt-get install make
43 $ LDCMD=clang++ make -j
44 $ fuzz/helper.py $FUZZER
46 Where $FUZZER is one of the executables in `fuzz/`.
48 If you get a crash, you should find a corresponding input file in
49 `fuzz/corpora/$FUZZER-crash/`. You can reproduce the crash with
51 $ fuzz/$FUZZER <crashfile>
56 Configure for fuzzing:
58 $ sudo apt-get install afl-clang
59 $ CC=afl-clang-fast ./config enable-fuzz-afl no-shared
62 Run one of the fuzzers:
64 $ afl-fuzz -i fuzz/corpora/$FUZZER -o fuzz/corpora/$FUZZER/out fuzz/$FUZZER
66 Where $FUZZER is one of the executables in `fuzz/`.