ERROR: You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ' active_time = 1513360735, active_ip = '54.92.201.232', act' at line 2
---
REPLACE INTO it_active SET active_id = , active_time = 1513360735, active_ip = '54.92.201.232', active_user_agent = 'CCBot/2.0 (http://commoncrawl.org/faq/)', active_session = 'tvn0e19ltgsuf5v6ifi0j1ovl5'
---
ERROR: You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ' view_date = NOW(), view_user_ag' at line 3
---
INSERT INTO en_articleviews SET view_ip = INET_ATON('54.92.201.232'), view_user_id = , view_date = NOW(), view_user_agent = 'CCBot/2.0 (http://commoncrawl.org/faq/)', view_referer = '', view_article_id = 201485
---
ERROR: You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ') ORDER BY comment_date ASC' at line 3
---
SELECT * FROM en_comments, it_users WHERE user_id = comment_author_id AND comment_topic = 201485 AND comment_type = 'articles' AND (comment_state = 1 OR comment_author_id = ) ORDER BY comment_date ASC
---
You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ') ORDER BY comment_date ASC' at line 3 wolfSSL is Integrating Testing with the tlsfuzzer . wolfSSL is Integrating Testing with the tlsfuzzer . - Article Marketing

Article Marketing

Free Articles, reviews and news releases

wolfSSL is Integrating Testing with the tlsfuzzer .

By: James Schmitt | Total views: 32 | Word Count: 297 | Date: Thu, 27 Jul 2017 - 4:58 PM

Fuzz testing is an important part of maintaining a secure code base here at wolfSSL. While we already have fuzzers in use ensuring that our library is as secure as possible, we recently decided to integrate 4 more fuzzers with our library to ensure that no potential bugs go undetected. This is one of many reasons that wolfSSL remains the best choice for an SSL/TLS library.

One of the new fuzzers being implemented into our system is the tlsfuzzer. This fuzzer was developed by Hubert Kario at Red Hat and was written purely in Python. Kario has developed over 60 unique scripts within the tlsfuzzer that run against the server of a given SSL/TLS library. These scripts attempt to find bugs and flaws in the system being tested against. After making a few slight modifications to our server, the tlsfuzzer scripts are now able to run against our server and provide us with detailed performance reports. The tlsfuzzer is an open source project available on Github.

Once the tlsfuzzer was successfully implemented with our system, we tested our server against each script and compared these results to other SSL/TLS libraries. Using these results, we know exactly where to make improvements and how to proceed with their implementations. We are excited to be taking further steps in improving the security of our library.

For further details regarding our process of testing the wolfSSL library to ensure code quality and security, please reference this blog page: https://wolfssl.com/wolfSSL/Blog/Entries/2016/2/12_Overview_of_Testing_in_wolfSSL.html (wolfssl.com)

For more information about wolfSSL visit the following web page: https://www.wolfssl.com/wolfSSL/Products-wolfssl.html

About the Author

James Schmitt is a software developer who regularly works with embedded systems. He often integrates a TLS library with his products to enhance security and protect his users.

Comments

No comments posted.

Add Comment

You do not have permission to comment. If you log in, you may be able to comment.
Copyright © 2017 en.article-marketing.eu - Tutti i diritti riservati - Powered by link UP Europe! P.IVA 09257531005
Associazione Culturale per l'uso didattico ed etico dell'informatica
Sede legale: Via Pietro Rovetti, 190 - 00177 - ROMA