Since this is very sensitive code which has often had security problems in many DNS implementations, it needs a decent amount of validation. This fuzzer ensures that the new code has the same output as the old code, and that it doesn't take longer than a second. The benchmark uses the fuzzer's copy of the old dns_name_fromwire() code to compare a number of scenarios: many compression pointers, many labels, long labels, random data, with/without downcasing.
12 lines
207 B
Plaintext
12 lines
207 B
Plaintext
/*.dSYM/
|
|
/*.out/
|
|
/dns_master_load
|
|
/dns_message_checksig
|
|
/dns_message_parse
|
|
/dns_name_fromtext_target
|
|
/dns_name_fromwire
|
|
/dns_rdata_fromtext
|
|
/dns_rdata_fromwire_text
|
|
/isc_lex_getmastertoken
|
|
/isc_lex_gettoken
|