/third_party/libxml2/fuzz/ |
D | Makefile.am | 26 .PHONY: tests corpus clean-corpus 28 corpus: seed/html.stamp seed/schema.stamp seed/xml.stamp seed/xpath.stamp target 30 tests: testFuzzer$(EXEEXT) corpus 34 clean-corpus: 55 @mkdir -p corpus/xml 60 corpus/xml seed/xml 73 @mkdir -p corpus/html 78 corpus/html seed/html 86 @mkdir -p corpus/regexp 91 corpus/regexp $(srcdir)/seed/regexp [all …]
|
/third_party/boringssl/src/fuzz/ |
D | refresh_ssl_corpora.sh | 94 local corpus="$2" 96 echo "Minimizing ${corpus}" 97 mv "$corpus" "${corpus}_old" 98 mkdir "$corpus" 99 "$fuzzer" -max_len=50000 -merge=1 "$corpus" "${corpus}_old" 100 rm -Rf "${corpus}_old"
|
/third_party/openssl/fuzz/ |
D | build.info | 78 SOURCE[asn1-test]=asn1.c test-corpus.c 82 SOURCE[asn1parse-test]=asn1parse.c test-corpus.c 86 SOURCE[bignum-test]=bignum.c test-corpus.c 90 SOURCE[bndiv-test]=bndiv.c test-corpus.c 94 SOURCE[client-test]=client.c test-corpus.c 98 SOURCE[cms-test]=cms.c test-corpus.c 102 SOURCE[conf-test]=conf.c test-corpus.c 106 SOURCE[crl-test]=crl.c test-corpus.c 110 SOURCE[ct-test]=ct.c test-corpus.c 114 SOURCE[server-test]=server.c test-corpus.c [all …]
|
D | README.md | 98 connection setup. This results in the coverage of the fuzzing corpus changing 103 Since we want to maximize the coverage of the fuzzing corpus, the client and 108 check of hashes, but the corpus has the correct hash in it for the random 116 Since the corpus depends on the default behaviour of the client and the server, 118 corpus will need to be updated in that case. 120 Updating the corpus 123 The client and server corpus is generated with multiple config options:
|
/third_party/boost/libs/beast/test/bench/parser/ |
D | bench_parser.cpp | 36 using corpus = std::vector<flat_buffer>; typedef in boost::beast::http::parser_test 38 corpus creq_; 39 corpus cres_; 42 corpus 45 corpus v; in build_corpus() 57 corpus 60 corpus v; in build_corpus() 103 testParser1(std::size_t repeat, corpus const& v) in testParser1() 118 testParser2(std::size_t repeat, corpus const& v) in testParser2()
|
/third_party/nghttp2/fuzz/ |
D | README.rst | 7 fuzz_target.cc contains an entry point of fuzzer. corpus directory 10 The file name of initial data under corpus is the lower-cased hex 13 corpus/h2spec contains input data which was recorded when we ran 16 corpus/nghttp contains input data which was recorded when we ran
|
/third_party/boost/boost/algorithm/searching/ |
D | boyer_moore_horspool.hpp | 170 boyer_moore_horspool_search ( CorpusRange &corpus, patIter pat_first, patIter pat_last ) in boyer_moore_horspool_search() argument 173 return bm (boost::begin (corpus), boost::end (corpus)); in boyer_moore_horspool_search() 178 boyer_moore_horspool_search ( CorpusRange &corpus, const PatternRange &pattern ) in boyer_moore_horspool_search() argument 182 return bmh (boost::begin (corpus), boost::end (corpus)); in boyer_moore_horspool_search()
|
D | knuth_morris_pratt.hpp | 232 knuth_morris_pratt_search ( CorpusRange &corpus, patIter pat_first, patIter pat_last ) in knuth_morris_pratt_search() argument 235 return kmp (boost::begin (corpus), boost::end (corpus)); in knuth_morris_pratt_search() 240 knuth_morris_pratt_search ( CorpusRange &corpus, const PatternRange &pattern ) in knuth_morris_pratt_search() argument 244 return kmp (boost::begin (corpus), boost::end (corpus)); in knuth_morris_pratt_search()
|
D | boyer_moore.hpp | 240 boyer_moore_search ( CorpusRange &corpus, patIter pat_first, patIter pat_last ) in boyer_moore_search() argument 243 return bm (boost::begin (corpus), boost::end (corpus)); in boyer_moore_search() 248 boyer_moore_search ( CorpusRange &corpus, const PatternRange &pattern ) in boyer_moore_search() argument 252 return bm (boost::begin (corpus), boost::end (corpus)); in boyer_moore_search()
|
/third_party/grpc/test/core/util/ |
D | grpc_fuzzer.bzl | 17 def grpc_fuzzer(name, corpus, srcs = [], deps = [], data = [], size = "large", **kwargs): 22 data = data + native.glob([corpus + "/**"]), 27 args = ["--directory=" + native.package_name() + "/" + corpus],
|
/third_party/json/test/thirdparty/Fuzzer/ |
D | FuzzerFlags.def | 18 "If 0, libFuzzer tries to guess a good value based on the corpus " 25 "If 1, always prefer smaller inputs during the corpus shuffle.") 38 "merged into the 1-st corpus. Only interesting units will be taken. " 39 "This flag can be used to minimize a corpus.") 54 FUZZER_FLAG_INT(shrink, 0, "Experimental. Try to shrink corpus elements.") 62 "Reload the main corpus every <N> seconds to get new units" 81 "If 1, print statistics on corpus elements at exit.") 106 " was added to the corpus. "
|
/third_party/grpc/test/core/compression/ |
D | BUILD | 49 corpus = "message_compress_corpus", 60 corpus = "message_decompress_corpus", 83 corpus = "stream_compression_corpus", 94 corpus = "stream_decompression_corpus",
|
/third_party/grpc/test/core/slice/ |
D | BUILD | 26 corpus = "b64_encode_corpus", 37 corpus = "b64_decode_corpus", 48 corpus = "percent_encode_corpus", 61 corpus = "percent_decode_corpus",
|
/third_party/boost/libs/algorithm/doc/ |
D | knuth_morris_pratt.qbk | 19 …he next match could begin, enabling the skipping of some elements of the corpus that have already … 29 …e sequence being searched for as the "pattern", and the sequence being searched in as the "corpus". 55 Each of the functions is passed two pairs of iterators. The first two define the corpus and the sec… 57 …corpus. If the pattern is empty, it returns at empty range at the start of the corpus (`corpus_fir… 82 The worst-case performance is ['O(2n)], where ['n] is the length of the corpus. The average time is… 92 … algorithm requires random-access iterators for both the pattern and the corpus. It should be poss…
|
D | boyer_moore.qbk | 25 …e sequence being searched for as the "pattern", and the sequence being searched in as the "corpus". 53 Each of the functions is passed two pairs of iterators. The first two define the corpus and the sec… 55 …corpus. If the pattern is empty, it returns at empty range at the start of the corpus (`corpus_fir… 81 …corpus is ['O(N)] (linear) time; that is, proportional to the length of the corpus being searched.… 91 * The Boyer-Moore algorithm requires random-access iterators for both the pattern and the corpus.
|
D | boyer_moore_horspool.qbk | 25 …e sequence being searched for as the "pattern", and the sequence being searched in as the "corpus". 51 Each of the functions is passed two pairs of iterators. The first two define the corpus and the sec… 53 …corpus. If the pattern is empty, it returns at empty range at the start of the corpus (`corpus_fir… 79 …], where ['m] is the length of the pattern and ['n] is the length of the corpus. The average time … 89 …oyer-Moore-Horspool algorithm requires random-access iterators for both the pattern and the corpus.
|
/third_party/grpc/tools/buildgen/plugins/ |
D | make_fuzzer_tests.py | 42 for corpus in new_target['corpus_dirs']: 43 for fn in sorted(glob.glob('%s/*' % corpus)):
|
/third_party/json/test/thirdparty/Fuzzer/test/ |
D | fuzzer-flags.test | 7 DASH_DASH: INFO: A corpus is not provided, starting from an empty corpus
|
D | merge.test | 11 CHECK1: MERGE-OUTER: 3 files, 3 in the initial corpus 23 CHECK2: MERGE-OUTER: 9 files, 3 in the initial corpus 28 CHECK3: MERGE-OUTER: 12 files, 6 in the initial corpus
|
/third_party/skia/third_party/externals/swiftshader/third_party/SPIRV-Tools/test/fuzzers/ |
D | BUILD.gn | 117 # Intentionally doesn't use the seed corpus, because it consumes 126 # Intentionally doesn't use the seed corpus, because it consumes 135 # Intentionally doesn't use the seed corpus, because it consumes
|
/third_party/skia/third_party/externals/dawn/docs/ |
D | fuzzing.md | 13 Using a seed corpus significantly improves the efficiency of fuzzing. Dawn's fuzzers use interestin… 15 … hashes the output files to produce unique names and uploads them to the fuzzer corpus directories. 18 Regenerating the seed corpus keeps it up to date when Dawn's API or wire protocol changes.
|
/third_party/skia/third_party/externals/spirv-tools/test/fuzzers/ |
D | BUILD.gn | 117 # Intentionally doesn't use the seed corpus, because it consumes 126 # Intentionally doesn't use the seed corpus, because it consumes 135 # Intentionally doesn't use the seed corpus, because it consumes
|
/third_party/boost/libs/regex/test/de_fuzz/ |
D | Jamfile.v2 | 12 -dict=dictionary.txt -workers=3 corpus -runs=5000 26 -dict=dictionary.txt -workers=3 corpus -runs=5000
|
/third_party/skia/fuzz/ |
D | README.md | 29 1. *Add a seed corpus to `gs://skia-fuzzer/oss-fuzz/` (in the 31 Make sure the corpus file is public-readable. It is easiest to add this permission via the web 35 to download the seed corpus to the build image. 37 to build the desired fuzzer target and move it into $OUT. If there is a seed corpus, move 55 what percent of fuzzing runs end in OOM/timeout/crash, the entire corpus of fuzzed inputs
|
/third_party/grpc/test/core/json/ |
D | BUILD | 26 corpus = "corpus",
|