Skip to content

Conversation

@vah13
Copy link

@vah13 vah13 commented Oct 10, 2025

Add 8 standalone libFuzzer-based fuzzers for testing Telegram's
encryption and protocol implementation.

Fuzzers:

  • 5 MTProto protocol layer fuzzers (v0, v1, vD, TL, AES-CTR)
  • 3 private message encryption fuzzers (AES-IGE, key derivation, auth keys)

Standalone design (no tdesktop dependencies), OSS-Fuzz ready. Tested: 1000+ runs per fuzzer, no crashes, 17k-326k exec/sec.

Add 8 standalone libFuzzer-based fuzzers for testing Telegram's
  encryption and protocol implementation.

Fuzzers:
  - 5 MTProto protocol layer fuzzers (v0, v1, vD, TL, AES-CTR)
  - 3 private message encryption fuzzers (AES-IGE, key derivation, auth keys)

Standalone design (no tdesktop dependencies), OSS-Fuzz ready.
Tested: 1000+ runs per fuzzer, no crashes, 17k-326k exec/sec.
@CLAassistant
Copy link

CLAassistant commented Oct 10, 2025

CLA assistant check
All committers have signed the CLA.

@ilya-fedin
Copy link
Contributor

There's a Telegram/build/docker folder for Dockerfiles, oss-fuzz folder has to go there

architectures:
- x86_64

help_url: "https://github.com/telegramdesktop/tdesktop/tree/ossFuzz/fuzzing"
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

ossFuzz/fuzzing? Such path doesn't seem to exist in this PR

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants