Fuzz Testing

Fuzz testing is

An automated software testing technique that involves providing invalid, unexpected, or random data as inputs to a program.

This fuzz/ directory contains the fuzz tests for openpgp.js. To generate and run fuzz tests, we use the Jazzer.js library.

Running a fuzzer

This directory contains fuzz targets like for example createMessageBinary.

You can run this fuzz target:

TARGET=createMessageBinary npm run fuzz

Notice, that TARGET is the name of your test file, the fuzz target module.

You should see the fuzzer that looks similar to this:

#128	pulse  corp: 1/1b lim: 4 exec/s: 64 rss: 173Mb
#256	pulse  corp: 1/1b lim: 6 exec/s: 51 rss: 173Mb
#512	pulse  corp: 1/1b lim: 8 exec/s: 46 rss: 174Mb
#1024	pulse  corp: 1/1b lim: 14 exec/s: 40 rss: 178Mb
#2048	pulse  corp: 1/1b lim: 21 exec/s: 40 rss: 179Mb

It will continue to generate random inputs forever, until it finds a bug or is terminated. The testcases for bugs it finds can be seen in the form of crash-*, timeout-* or oom-* at test/fuzz/reports.

The fuzz target module

All functions that need to be fuzz-tested are here, at the test/fuzz/ directory.

A fuzz target module needs to export a function called fuzz, which takes a Buffer parameter and executes the actual code under test.

Jazzer.js provides the wrapper class FuzzedDataProvider, which allows reading primitive types from the Buffer.

See further details in Fuzzing using fuzz targets and the CLI or Advanced Fuzzing Settings

Run limitations

You can edit the npm command and pass the -max_total_time flag to the internal fuzzing engine to stop the fuzzing run after 10 seconds.

jazzer test/fuzz/$TARGET -- -max_total_time=10

Or you can limit the number of runs:

jazzer test/fuzz/$TARGET -- -runs=4000000