Home
last modified time | relevance | path

Searched full:fuzzing (Results 1 – 25 of 278) sorted by relevance

12345678910>>...12

/third_party/skia/third_party/externals/dawn/docs/
Dfuzzing.md1 # Fuzzing Dawn
9 …er. This fuzzer supports error injection by using the first bytes of the fuzzing input as a Vulkan…
13 … the efficiency of fuzzing. Dawn's fuzzers use interesting testcases discovered in previous fuzzin…
/third_party/skia/third_party/externals/swiftshader/third_party/SPIRV-Tools/source/fuzz/
Dfuzzer.h50 // Status of the fuzzing session.
54 // fuzzing session.
81 // value is equal to 0. Because fuzzing cannot stop mid way through a fuzzer
82 // pass, fuzzing will stop after the fuzzer pass that exceeds
157 // We use this to determine whether we can continue fuzzing incrementally
163 // mutated as fuzzing proceeds.
170 // Provides probabilities that control the fuzzing process.
173 // The sequence of transformations that have been applied during fuzzing. It
178 // in the fuzzing.
/third_party/skia/third_party/externals/spirv-tools/source/fuzz/
Dfuzzer.h50 // Status of the fuzzing session.
54 // fuzzing session.
81 // value is equal to 0. Because fuzzing cannot stop mid way through a fuzzer
82 // pass, fuzzing will stop after the fuzzer pass that exceeds
157 // We use this to determine whether we can continue fuzzing incrementally
163 // mutated as fuzzing proceeds.
170 // Provides probabilities that control the fuzzing process.
173 // The sequence of transformations that have been applied during fuzzing. It
178 // in the fuzzing.
/third_party/spirv-tools/source/fuzz/
Dfuzzer.h50 // Status of the fuzzing session.
54 // fuzzing session.
80 // value is equal to 0. Because fuzzing cannot stop mid way through a fuzzer
81 // pass, fuzzing will stop after the fuzzer pass that exceeds
156 // We use this to determine whether we can continue fuzzing incrementally
162 // mutated as fuzzing proceeds.
169 // Provides probabilities that control the fuzzing process.
172 // The sequence of transformations that have been applied during fuzzing. It
177 // in the fuzzing.
/third_party/skia/site/docs/dev/testing/
Dfuzz.md2 title: 'Fuzzing'
3 linkTitle: 'Fuzzing'
77 ## Fuzzing Defines
82 // Required for fuzzing with afl-fuzz to prevent OOMs from adding noise.
85 // Required for fuzzing with libfuzzer
/third_party/cJSON/fuzzing/
Dossfuzz.sh11 $CXX $CXXFLAGS $SRC/cjson/fuzzing/cjson_read_fuzzer.c -I. \
15 find $SRC/cjson/fuzzing/inputs -name "*" | \
18 cp $SRC/cjson/fuzzing/json.dict $OUT/cjson_read_fuzzer.dict
DCMakeLists.txt1 option(ENABLE_FUZZING "Create executables and targets for fuzzing cJSON with afl." Off)
12 message(FATAL_ERROR "Enable sanitizers with -DENABLE_SANITIZERS=On to do fuzzing.")
/third_party/harfbuzz/
DTESTING.md44 ninja -Cfuzzbuild test/fuzzing/hb-{shape,draw,subset,set}-fuzzer
45 fuzzbuild/test/fuzzing/hb-subset-fuzzer test/fuzzing/fonts
/third_party/skia/third_party/externals/harfbuzz/
DTESTING.md44 ninja -Cfuzzbuild test/fuzzing/hb-{shape,draw,subset,set}-fuzzer
45 fuzzbuild/test/fuzzing/hb-subset-fuzzer test/fuzzing/fonts
/third_party/lz4/ossfuzz/
Dfuzz.h23 * This is the canonical flag to enable deterministic builds for fuzzing.
24 * Changes to zstd for fuzzing are gated behind this define.
25 * It is recommended to define this when building zstd for fuzzing.
Dstandaloneengine.c8 * Main procedure for standalone fuzzing engine.
11 * into memory and then call the fuzzing interface with the data.
43 printf("Read %zu bytes, fuzzing.. ", buffer_len); in main()
/third_party/openssl/fuzz/
DREADME.md36 Configure for fuzzing:
60 Configure for fuzzing:
83 don't need to be build for fuzzing, there is no need to set CC or the call
98 connection setup. This results in the coverage of the fuzzing corpus changing
103 Since we want to maximize the coverage of the fuzzing corpus, the client and
/third_party/harfbuzz/test/fuzzing/
Dmeson.build43 suite: ['fuzzing', 'slow'],
55 suite: ['fuzzing', 'slow'],
64 suite: ['fuzzing'],
/third_party/skia/third_party/externals/harfbuzz/test/fuzzing/
Dmeson.build43 suite: ['fuzzing', 'slow'],
55 suite: ['fuzzing', 'slow'],
64 suite: ['fuzzing'],
/third_party/libsnd/ossfuzz/
Dstandaloneengine.cc8 * Main procedure for standalone fuzzing engine.
11 * into memory and then call the fuzzing interface with the data.
48 printf("Read %zu bytes, fuzzing.. ", buffer_len); in main()
/third_party/spirv-tools/tools/fuzz/
Dfuzz.cpp111 provided if the tool is invoked in fuzzing mode; incompatible in PrintUsage()
128 format; it does not perform any fuzzing. in PrintUsage()
131 fuzzing. Aborts fuzzing early if an invalid binary is created. in PrintUsage()
136 the start of fuzzing, via randomly choosing enabled passes, and in PrintUsage()
138 recommended to run subsequently. Fuzzing then involves in PrintUsage()
146 --fuzzing-target= in PrintUsage()
149 to the semantics of some fuzzing target. Available targets: in PrintUsage()
154 (instead of fuzzing) in PrintUsage()
172 (instead of fuzzing) in PrintUsage()
277 } else if (0 == strncmp(cur_arg, "--fuzzing-target=", in ParseFlags()
[all …]
/third_party/harfbuzz/test/api/
Dtest-subset.c35 …hb_face_t *face = hb_test_open_font_file ("../fuzzing/fonts/oom-6ef8c96d3710262511bcc730dce9c00e72… in test_subset_32_tables()
57 …hb_face_t *face = hb_test_open_font_file ("../fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subs… in test_subset_no_inf_loop()
79 …hb_face_t *face = hb_test_open_font_file ("../fuzzing/fonts/crash-4b60576767ee4d9fe1cc10959d89baf7… in test_subset_crash()
/third_party/flutter/skia/third_party/externals/harfbuzz/test/api/
Dtest-subset.c35 …hb_face_t *face = hb_test_open_font_file ("../fuzzing/fonts/oom-6ef8c96d3710262511bcc730dce9c00e72… in test_subset_32_tables()
57 …hb_face_t *face = hb_test_open_font_file ("../fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subs… in test_subset_no_inf_loop()
79 …hb_face_t *face = hb_test_open_font_file ("../fuzzing/fonts/crash-4b60576767ee4d9fe1cc10959d89baf7… in test_subset_crash()
/third_party/skia/src/core/
DSkFuzzLogging.h13 // When SK_FUZZ_LOGGING is defined SkDebugfs relevant to image filter fuzzing
14 // will be enabled. This allows the filter fuzzing code to include fuzzer
/third_party/flutter/skia/src/core/
DSkFuzzLogging.h13 // When SK_FUZZ_LOGGING is defined SkDebugfs relevant to image filter fuzzing
14 // will be enabled. This allows the filter fuzzing code to white list fuzzer
/third_party/skia/third_party/externals/spirv-tools/tools/fuzz/
Dfuzz.cpp111 provided if the tool is invoked in fuzzing mode; incompatible in PrintUsage()
128 format; it does not perform any fuzzing. in PrintUsage()
131 fuzzing. Aborts fuzzing early if an invalid binary is created. in PrintUsage()
136 the start of fuzzing, via randomly choosing enabled passes, and in PrintUsage()
138 recommended to run subsequently. Fuzzing then involves in PrintUsage()
146 --fuzzing-target= in PrintUsage()
149 to the semantics of some fuzzing target. Available targets: in PrintUsage()
154 (instead of fuzzing) in PrintUsage()
172 (instead of fuzzing) in PrintUsage()
277 } else if (0 == strncmp(cur_arg, "--fuzzing-target=", in ParseFlags()
[all …]
/third_party/skia/third_party/externals/swiftshader/third_party/SPIRV-Tools/tools/fuzz/
Dfuzz.cpp111 provided if the tool is invoked in fuzzing mode; incompatible in PrintUsage()
128 format; it does not perform any fuzzing. in PrintUsage()
131 fuzzing. Aborts fuzzing early if an invalid binary is created. in PrintUsage()
136 the start of fuzzing, via randomly choosing enabled passes, and in PrintUsage()
138 recommended to run subsequently. Fuzzing then involves in PrintUsage()
146 --fuzzing-target= in PrintUsage()
149 to the semantics of some fuzzing target. Available targets: in PrintUsage()
154 (instead of fuzzing) in PrintUsage()
172 (instead of fuzzing) in PrintUsage()
277 } else if (0 == strncmp(cur_arg, "--fuzzing-target=", in ParseFlags()
[all …]
/third_party/skia/third_party/externals/tint/fuzzers/tint_spirv_tools_fuzzer/
Dcli.h27 /// Default SPIR-V environment that will be used during fuzzing.
47 /// Shading language to target during fuzzing.
68 /// SPIR-V target environment for fuzzing.
84 /// The strategy to use during fuzzing in spirv-fuzz (see the doc for
/third_party/flatbuffers/tests/fuzzer/
Dreadme.md4 > LibFuzzer is in-process, coverage-guided, evolutionary fuzzing engine.
5 …ibrary under test, and feeds fuzzed inputs to the library via a specific fuzzing entrypoint (aka “…
62 # Fuzzing control
/third_party/skia/third_party/externals/harfbuzz/test/api/
Dtest-subset.c35 …hb_face_t *face = hb_test_open_font_file ("../fuzzing/fonts/oom-6ef8c96d3710262511bcc730dce9c00e72… in test_subset_32_tables()
57 …hb_face_t *face = hb_test_open_font_file ("../fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subs… in test_subset_no_inf_loop()
78 …hb_face_t *face = hb_test_open_font_file ("../fuzzing/fonts/crash-4b60576767ee4d9fe1cc10959d89baf7… in test_subset_crash()

12345678910>>...12