| /third_party/skia/third_party/externals/dawn/docs/ |
| D | fuzzing.md | 1 # Fuzzing Dawn 9 …er. This fuzzer supports error injection by using the first bytes of the fuzzing input as a Vulkan… 13 … the efficiency of fuzzing. Dawn's fuzzers use interesting testcases discovered in previous fuzzin…
|
| /third_party/skia/third_party/externals/swiftshader/third_party/SPIRV-Tools/source/fuzz/ |
| D | fuzzer.h | 50 // Status of the fuzzing session. 54 // fuzzing session. 81 // value is equal to 0. Because fuzzing cannot stop mid way through a fuzzer 82 // pass, fuzzing will stop after the fuzzer pass that exceeds 157 // We use this to determine whether we can continue fuzzing incrementally 163 // mutated as fuzzing proceeds. 170 // Provides probabilities that control the fuzzing process. 173 // The sequence of transformations that have been applied during fuzzing. It 178 // in the fuzzing.
|
| /third_party/skia/third_party/externals/spirv-tools/source/fuzz/ |
| D | fuzzer.h | 50 // Status of the fuzzing session. 54 // fuzzing session. 81 // value is equal to 0. Because fuzzing cannot stop mid way through a fuzzer 82 // pass, fuzzing will stop after the fuzzer pass that exceeds 157 // We use this to determine whether we can continue fuzzing incrementally 163 // mutated as fuzzing proceeds. 170 // Provides probabilities that control the fuzzing process. 173 // The sequence of transformations that have been applied during fuzzing. It 178 // in the fuzzing.
|
| /third_party/spirv-tools/source/fuzz/ |
| D | fuzzer.h | 50 // Status of the fuzzing session. 54 // fuzzing session. 80 // value is equal to 0. Because fuzzing cannot stop mid way through a fuzzer 81 // pass, fuzzing will stop after the fuzzer pass that exceeds 156 // We use this to determine whether we can continue fuzzing incrementally 162 // mutated as fuzzing proceeds. 169 // Provides probabilities that control the fuzzing process. 172 // The sequence of transformations that have been applied during fuzzing. It 177 // in the fuzzing.
|
| /third_party/skia/site/docs/dev/testing/ |
| D | fuzz.md | 2 title: 'Fuzzing' 3 linkTitle: 'Fuzzing' 77 ## Fuzzing Defines 82 // Required for fuzzing with afl-fuzz to prevent OOMs from adding noise. 85 // Required for fuzzing with libfuzzer
|
| /third_party/cJSON/fuzzing/ |
| D | ossfuzz.sh | 11 $CXX $CXXFLAGS $SRC/cjson/fuzzing/cjson_read_fuzzer.c -I. \ 15 find $SRC/cjson/fuzzing/inputs -name "*" | \ 18 cp $SRC/cjson/fuzzing/json.dict $OUT/cjson_read_fuzzer.dict
|
| D | CMakeLists.txt | 1 option(ENABLE_FUZZING "Create executables and targets for fuzzing cJSON with afl." Off) 12 message(FATAL_ERROR "Enable sanitizers with -DENABLE_SANITIZERS=On to do fuzzing.")
|
| /third_party/harfbuzz/ |
| D | TESTING.md | 44 ninja -Cfuzzbuild test/fuzzing/hb-{shape,draw,subset,set}-fuzzer 45 fuzzbuild/test/fuzzing/hb-subset-fuzzer test/fuzzing/fonts
|
| /third_party/skia/third_party/externals/harfbuzz/ |
| D | TESTING.md | 44 ninja -Cfuzzbuild test/fuzzing/hb-{shape,draw,subset,set}-fuzzer 45 fuzzbuild/test/fuzzing/hb-subset-fuzzer test/fuzzing/fonts
|
| /third_party/lz4/ossfuzz/ |
| D | fuzz.h | 23 * This is the canonical flag to enable deterministic builds for fuzzing. 24 * Changes to zstd for fuzzing are gated behind this define. 25 * It is recommended to define this when building zstd for fuzzing.
|
| D | standaloneengine.c | 8 * Main procedure for standalone fuzzing engine. 11 * into memory and then call the fuzzing interface with the data. 43 printf("Read %zu bytes, fuzzing.. ", buffer_len); in main()
|
| /third_party/openssl/fuzz/ |
| D | README.md | 36 Configure for fuzzing: 60 Configure for fuzzing: 83 don't need to be build for fuzzing, there is no need to set CC or the call 98 connection setup. This results in the coverage of the fuzzing corpus changing 103 Since we want to maximize the coverage of the fuzzing corpus, the client and
|
| /third_party/harfbuzz/test/fuzzing/ |
| D | meson.build | 43 suite: ['fuzzing', 'slow'], 55 suite: ['fuzzing', 'slow'], 64 suite: ['fuzzing'],
|
| /third_party/skia/third_party/externals/harfbuzz/test/fuzzing/ |
| D | meson.build | 43 suite: ['fuzzing', 'slow'], 55 suite: ['fuzzing', 'slow'], 64 suite: ['fuzzing'],
|
| /third_party/libsnd/ossfuzz/ |
| D | standaloneengine.cc | 8 * Main procedure for standalone fuzzing engine. 11 * into memory and then call the fuzzing interface with the data. 48 printf("Read %zu bytes, fuzzing.. ", buffer_len); in main()
|
| /third_party/spirv-tools/tools/fuzz/ |
| D | fuzz.cpp | 111 provided if the tool is invoked in fuzzing mode; incompatible in PrintUsage() 128 format; it does not perform any fuzzing. in PrintUsage() 131 fuzzing. Aborts fuzzing early if an invalid binary is created. in PrintUsage() 136 the start of fuzzing, via randomly choosing enabled passes, and in PrintUsage() 138 recommended to run subsequently. Fuzzing then involves in PrintUsage() 146 --fuzzing-target= in PrintUsage() 149 to the semantics of some fuzzing target. Available targets: in PrintUsage() 154 (instead of fuzzing) in PrintUsage() 172 (instead of fuzzing) in PrintUsage() 277 } else if (0 == strncmp(cur_arg, "--fuzzing-target=", in ParseFlags() [all …]
|
| /third_party/harfbuzz/test/api/ |
| D | test-subset.c | 35 …hb_face_t *face = hb_test_open_font_file ("../fuzzing/fonts/oom-6ef8c96d3710262511bcc730dce9c00e72… in test_subset_32_tables() 57 …hb_face_t *face = hb_test_open_font_file ("../fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subs… in test_subset_no_inf_loop() 79 …hb_face_t *face = hb_test_open_font_file ("../fuzzing/fonts/crash-4b60576767ee4d9fe1cc10959d89baf7… in test_subset_crash()
|
| /third_party/flutter/skia/third_party/externals/harfbuzz/test/api/ |
| D | test-subset.c | 35 …hb_face_t *face = hb_test_open_font_file ("../fuzzing/fonts/oom-6ef8c96d3710262511bcc730dce9c00e72… in test_subset_32_tables() 57 …hb_face_t *face = hb_test_open_font_file ("../fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subs… in test_subset_no_inf_loop() 79 …hb_face_t *face = hb_test_open_font_file ("../fuzzing/fonts/crash-4b60576767ee4d9fe1cc10959d89baf7… in test_subset_crash()
|
| /third_party/skia/src/core/ |
| D | SkFuzzLogging.h | 13 // When SK_FUZZ_LOGGING is defined SkDebugfs relevant to image filter fuzzing 14 // will be enabled. This allows the filter fuzzing code to include fuzzer
|
| /third_party/flutter/skia/src/core/ |
| D | SkFuzzLogging.h | 13 // When SK_FUZZ_LOGGING is defined SkDebugfs relevant to image filter fuzzing 14 // will be enabled. This allows the filter fuzzing code to white list fuzzer
|
| /third_party/skia/third_party/externals/spirv-tools/tools/fuzz/ |
| D | fuzz.cpp | 111 provided if the tool is invoked in fuzzing mode; incompatible in PrintUsage() 128 format; it does not perform any fuzzing. in PrintUsage() 131 fuzzing. Aborts fuzzing early if an invalid binary is created. in PrintUsage() 136 the start of fuzzing, via randomly choosing enabled passes, and in PrintUsage() 138 recommended to run subsequently. Fuzzing then involves in PrintUsage() 146 --fuzzing-target= in PrintUsage() 149 to the semantics of some fuzzing target. Available targets: in PrintUsage() 154 (instead of fuzzing) in PrintUsage() 172 (instead of fuzzing) in PrintUsage() 277 } else if (0 == strncmp(cur_arg, "--fuzzing-target=", in ParseFlags() [all …]
|
| /third_party/skia/third_party/externals/swiftshader/third_party/SPIRV-Tools/tools/fuzz/ |
| D | fuzz.cpp | 111 provided if the tool is invoked in fuzzing mode; incompatible in PrintUsage() 128 format; it does not perform any fuzzing. in PrintUsage() 131 fuzzing. Aborts fuzzing early if an invalid binary is created. in PrintUsage() 136 the start of fuzzing, via randomly choosing enabled passes, and in PrintUsage() 138 recommended to run subsequently. Fuzzing then involves in PrintUsage() 146 --fuzzing-target= in PrintUsage() 149 to the semantics of some fuzzing target. Available targets: in PrintUsage() 154 (instead of fuzzing) in PrintUsage() 172 (instead of fuzzing) in PrintUsage() 277 } else if (0 == strncmp(cur_arg, "--fuzzing-target=", in ParseFlags() [all …]
|
| /third_party/skia/third_party/externals/tint/fuzzers/tint_spirv_tools_fuzzer/ |
| D | cli.h | 27 /// Default SPIR-V environment that will be used during fuzzing. 47 /// Shading language to target during fuzzing. 68 /// SPIR-V target environment for fuzzing. 84 /// The strategy to use during fuzzing in spirv-fuzz (see the doc for
|
| /third_party/flatbuffers/tests/fuzzer/ |
| D | readme.md | 4 > LibFuzzer is in-process, coverage-guided, evolutionary fuzzing engine. 5 …ibrary under test, and feeds fuzzed inputs to the library via a specific fuzzing entrypoint (aka “… 62 # Fuzzing control
|
| /third_party/skia/third_party/externals/harfbuzz/test/api/ |
| D | test-subset.c | 35 …hb_face_t *face = hb_test_open_font_file ("../fuzzing/fonts/oom-6ef8c96d3710262511bcc730dce9c00e72… in test_subset_32_tables() 57 …hb_face_t *face = hb_test_open_font_file ("../fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subs… in test_subset_no_inf_loop() 78 …hb_face_t *face = hb_test_open_font_file ("../fuzzing/fonts/crash-4b60576767ee4d9fe1cc10959d89baf7… in test_subset_crash()
|