-
Notifications
You must be signed in to change notification settings - Fork 484
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Adapt existing sig fuzz harness including more algorithms #1955
Adapt existing sig fuzz harness including more algorithms #1955
Conversation
28e5e81
to
5ab0312
Compare
The failing check doesn't appear to be related to this PR. I'm unsure but it kind of looks like a flaky performance check. |
It's seem like you found a rare case that the verify operation failed to verify the signature. Line 29 in 1d92135
|
Hmm ok. It doesn't look like the public/private keypair or the message is saved on failure here, so I guess it'll be a little difficult to reproduce. While this seems unrelated to the PR, I'll see if I can modify my fuzzer in such a way to trigger the bug in a way that's reproducible. |
Ok I've updated this fuzz harness (locally) such that it might be able to find this bug in a deterministic way. Is there a preference on stacking changes or just drip feeding in changes so that each PR is atomic i.e. doing one thing? |
Thank you @SWilson4, we're taking a look at this verification failure and will respond soon. |
I managed to reproduce this very rare verification error in CROSS-RSDPG-128-small. I'm still looking for the root cause but I can confirm that it seems totally unrelated to the new fuzzing harness. |
Thanks for taking a look! I'll open a separate issue to track the error, then. |
606269f
to
6e43a56
Compare
Signed-off-by: Nathaniel Brough <[email protected]>
6e43a56
to
6f71344
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM.
Thanks for the contribution @nathaniel-brough! |
Adapts existing fuzz-harness to support more algorithms.
This is a continuation of the effort described in #1215