Searched +full:oss +full:- +full:fuzz +full:- +full:project +full:- +full:name (Results 1 – 25 of 45) sorted by relevance
12
| /third_party/skia/m133/fuzz/ |
| D | README.md | 8 These fuzzers are packaged in two different ways (see //BUILD.gn). There is a `fuzz` executable 9 that contains all fuzzers and is a convenient way to reproduce fuzzer-reported bugs. There are also 13 See [../site/dev/testing/fuzz.md] for more information on building and running fuzzers using the 14 `fuzz` executable. 17 We fuzz Skia using [OSS-Fuzz](https://github.com/google/oss-fuzz), which in turn uses fuzzing 18 engines such as libfuzzer, afl-fuzz, hong-fuzz, and others to fuzz Skia. OSS-Fuzz will automatically 19 [file and close bugs](https://bugs.chromium.org/p/oss-fuzz/issues/list?q=label:Proj-skia) when 22 There is a [Skia folder](https://github.com/google/oss-fuzz/tree/master/projects/skia) 23 in the OSS-Fuzz repo that we make changes to when we want to add/remove/change the fuzzers that 25 [This](https://google.github.io/oss-fuzz/getting-started/new-project-guide/#testing-locally) [all …]
|
| /third_party/skia/fuzz/ |
| D | README.md | 8 These fuzzers are packaged in two different ways (see //BUILD.gn). There is a `fuzz` executable 9 that contains all fuzzers and is a convenient way to reproduce fuzzer-reported bugs. There are also 13 See [../site/dev/testing/fuzz.md] for more information on building and running fuzzers using the 14 `fuzz` executable. 17 We fuzz Skia using [OSS-Fuzz](https://github.com/google/oss-fuzz), which in turn uses fuzzing 18 engines such as libfuzzer, afl-fuzz, hong-fuzz, and others to fuzz Skia. OSS-fuzz will automatically 19 [file and close bugs](https://bugs.chromium.org/p/oss-fuzz/issues/list?q=label:Proj-skia) when 22 There is a [Skia folder](https://github.com/google/oss-fuzz/tree/master/projects/skia) 23 in the OSS-Fuzz repo that we make changes to when we want to add/remove/change the fuzzers that 25 [This](https://google.github.io/oss-fuzz/getting-started/new-project-guide/#testing-locally) [all …]
|
| /third_party/pcre2/pcre2/.github/workflows/ |
| D | cifuzz.yml | 1 name: CIFuzz 5 runs-on: ubuntu-latest 7 - name: Build Fuzzers 9 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master 11 oss-fuzz-project-name: 'pcre2' 12 dry-run: false 13 - name: Run Fuzzers 14 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master 16 oss-fuzz-project-name: 'pcre2' 17 fuzz-seconds: 300 [all …]
|
| /third_party/nghttp2/.github/workflows/ |
| D | fuzz.yml | 1 name: CIFuzz 3 permissions: read-all 6 runs-on: ubuntu-latest 8 - name: LLVM workaround 10 # https://github.com/actions/runner-images/issues/9491#issuecomment-1989718917 12 # high-entropy ASLR in much newer kernels that GitHub runners are 15 - name: Build Fuzzers 16 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master 18 oss-fuzz-project-name: 'nghttp2' 19 dry-run: false [all …]
|
| /third_party/python/Modules/_xxtestfuzz/ |
| D | README.rst | 1 Fuzz Tests for CPython 4 These fuzz tests are designed to be included in Google's `oss-fuzz`_ project. 6 oss-fuzz works against a library exposing a function of the form 9 some toy values -- no fuzzing occurs in Python's test suite. 11 oss-fuzz will regularly pull from CPython, discover all the tests in 12 ``fuzz_tests.txt``, and run them -- so adding a new test here means it will 13 automatically be run in oss-fuzz, while also being smoke-tested as part of 16 Adding a new fuzz test 17 ---------------------- 19 Add the test name on a new line in ``fuzz_tests.txt``. [all …]
|
| /third_party/json/tests/ |
| D | fuzzing.md | 1 # Fuzz testing 3 Each parser of the library (JSON, BJData, BSON, CBOR, MessagePack, and UBJSON) can be fuzz tested. … 19 rm -fr corpus_$FORMAT 21 …find json_test_data-$TEST_DATA_VERSION -size -5k -name "*.$FORMAT" -exec cp "{}" "corpus_$FORMAT" … 23 rm -fr json_test_data-$TEST_DATA_VERSION 31 To use libFuzzer, you need to pass `-fsanitize=fuzzer` as `FUZZER_ENGINE`. In the `tests` directory… 34 make fuzzers FUZZER_ENGINE="-fsanitize=fuzzer" 37 This creates a fuzz tester binary for each parser that supports these 42 Clang via Homebrew calling `brew install llvm` and add `CXX=$(brew --prefix llvm)/bin/clang` to the… 45 make fuzzers FUZZER_ENGINE="-fsanitize=fuzzer" CXX=$(brew --prefix llvm)/bin/clang [all …]
|
| /third_party/icu/docs/processes/ |
| D | fuzzer_targets.md | 1 <!-- 4 --> 9 This documents describes how to develop a [fuzzer](https://opensource.google.com/projects/oss-fuzz) 15 [`source/test/fuzzer/`](https://github.com/unicode-org/icu/tree/main/icu4c/source/test/fuzzer) 17 targets by the OSS-Fuzz system. 31 fuzzer-controlled data of size `size` bytes. Part or all of this data is then passed into the 35 [`collator_rulebased_fuzzer.cpp`](https://github.com/unicode-org/icu/blob/main/icu4c/source/test/fu… 74 ICU fuzzer targets are built and executed by the OSS-Fuzz project. On side of ICU they are compiled 79 [`Makefile.in`](https://github.com/unicode-org/icu/blob/main/icu4c/source/test/fuzzer/Makefile.in). 86 Any fuzzer seed data for a fuzzer target goes into a file with name `<fuzzer_target>_seed_corpus.tx… [all …]
|
| /third_party/skia/m133/site/docs/dev/gardening/ |
| D | gpu.md | 2 --- 6 --- 18 <a name="what_is_a_gpu_gardener"></a> 20 ---------------------------- 24 …-related bugs from clients in various bug trackers. This means triaging and assigning bugs that ha… 37 <a name="tracking"></a> 39 -------------------------- 45 <a name="view_current_upcoming_rotations"></a> 47 ----------------------------------- 53 <a name="how_to_swap"></a> [all …]
|
| /third_party/skia/m133/third_party/externals/harfbuzz/ |
| D | README.md | 1 …thub.com/harfbuzz/harfbuzz/workflows/linux-ci/badge.svg)](https://github.com/harfbuzz/harfbuzz/wor… 3 [](https:… 5 [](http… 7 …](https://repology.org/proj… 19 [](https://xkcd.com/2347/) 35 `hb-view.exe`, `hb-shape.exe`, and all dependencies. 67 pull-requests. 71 <!--See past and upcoming [HarfBuzz Hackfests](https://freedesktop.org/wiki/Software/HarfBuzz/Hackf… 73 ## Name section in HarfBuzz 77 "glib" (also a nod to the GNOME project where HarfBuzz originates from). [all …]
|
| /third_party/nghttp2/ |
| D | OAT.xml | 1 <?xml version="1.0" encoding="UTF-8"?> 2 <!-- Copyright (c) 2021 Huawei Device Co., Ltd. 8 http://www.apache.org/licenses/LICENSE-2.0 16 …s is the configuration file template for OpenHarmony OSS Audit Tool, please copy it to your projec… 17 …All configurations in this file will be merged to OAT-Default.xml, if you have any questions or co… 20 …1.If the project don't have "LICENSE" in root dir, please define all the license files in this pro… 23 …1. policy: If the OAT-Default.xml policies do not meet your requirements, please add policies here. 24 …2. policyitem: The fields type, name, path, desc is required, and the fields rule, group, filefilt… 25 …<policyitem type="" name="" path="" desc="" rule="may" group="defaultGroup" filefilter="defaultPol… 32 … file exists in the specified path(projectroot means the root dir of the project), supported file … [all …]
|
| /third_party/skia/third_party/externals/freetype/docs/oldlogs/ |
| D | ChangeLog.28 | 1 2017-09-16 Werner Lemberg <wl@gnu.org> 7 Tag sources with `VER-2-8-1'. 24 builds/wince/vc2005-ce/freetype.vcproj, 25 builds/wince/vc2005-ce/index.html, 26 builds/wince/vc2008-ce/freetype.vcproj, 27 builds/wince/vc2008-ce/index.html: s/2.8/2.8.1/, s/28/281/. 34 2017-09-13 suzuki toshiya <mpsuzuki@hiroshima-u.ac.jp> 38 __builtin_shuffle() was introduced in gcc-4.7. The lowest 41 * src/sfnt/pngshim.c (premultiply_data): Fix cpp-macro to 45 2017-09-13 suzuki toshiya <mpsuzuki@hiroshima-u.ac.jp> [all …]
|
| D | ChangeLog.210 | 1 2021-07-18 Werner Lemberg <wl@gnu.org> 7 Tag sources with `VER-2-11-0'. 15 builds/wince/vc2005-ce/index.html, 16 builds/wince/vc2008-ce/index.html, docs/freetype-config.1: 26 * builds/toplevel.mk (dist): Ignore more git-related files. 28 2021-07-17 David Turner <david@freetype.org> 32 The code assumed that if `__SSE2__` is defined, then 64-bit integer 37 64-bit integer types are not available. 41 2021-07-16 Alex Richardson <Alexander.Richardson@cl.cam.ac.uk> 45 * tests/issue-1063/main.c (main): I am building with a build [all …]
|
| D | ChangeLog.29 | 1 2018-05-01 Werner Lemberg <wl@gnu.org> 7 Tag sources with `VER-2-9-1'. 24 builds/wince/vc2005-ce/freetype.vcproj, 25 builds/wince/vc2005-ce/index.html, 26 builds/wince/vc2008-ce/freetype.vcproj, 27 builds/wince/vc2008-ce/index.html: s/2.9/2.9.1/, s/29/291/. 36 2018-04-26 Werner Lemberg <wl@gnu.org> 44 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=8003 49 2018-04-24 Ben Wagner <bungeman@google.com> 56 2018-04-22 Werner Lemberg <wl@gnu.org> [all …]
|
| D | ChangeLog.27 | 1 2016-12-30 Werner Lemberg <wl@gnu.org> 7 Tag sources with `VER-2-7-1'. 23 builds/wince/vc2005-ce/freetype.vcproj, 24 builds/wince/vc2005-ce/index.html, 25 builds/wince/vc2008-ce/freetype.vcproj, 26 builds/wince/vc2008-ce/index.html: s/2.7/2.7.1/, s/27/271/. 33 2016-12-30 Werner Lemberg <wl@gnu.org> 40 2016-12-30 Werner Lemberg <wl@gnu.org> 50 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=353 58 2016-12-29 Werner Lemberg <wl@gnu.org> [all …]
|
| /third_party/cares/ |
| D | README.md | 1 # [](https://c-ares.org/) 3 …](https://cirrus-ci… 4 …tus/aevgc5914tm72pvs/branch/main?svg=true)](https://ci.appveyor.com/project/c-ares/c-ares/branch/m… 5 …us](https://coveralls.io/repos/github/c-ares/c-ares/badge.svg?branch=main)](https://coveralls.io/g… 7 …tps://oss-fuzz-build-logs.storage.googleapis.com/badges/c-ares.svg)](https://bugs.chromium.org/p/o… 8 …ud.io/api/project_badges/measure?project=c-ares_c-ares&metric=bugs)](https://sonarcloud.io/summary… 9 …Scan Status](https://scan.coverity.com/projects/c-ares/badge.svg)](https://scan.coverity.com/proje… 11 - [Overview](#overview) 12 - [Code](#code) 13 - [Communication](#communication) [all …]
|
| /third_party/skia/third_party/externals/swiftshader/third_party/llvm-10.0/llvm/include/llvm/FuzzMutate/ |
| D | FuzzerCLI.h | 1 //===-- FuzzerCLI.h - Common logic for CLIs of fuzzers ----------*- C++ -*-===// 3 // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. 5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 7 //===----------------------------------------------------------------------===// 9 // Common logic needed to implement LLVM's fuzz targets' CLIs - including LLVM 10 // concepts like cl::opt and libFuzzer concepts like -ignore_remaining_args=1. 12 //===----------------------------------------------------------------------===// 23 /// Parse cl::opts from a fuzz target commandline. 25 /// This handles all arguments after -ignore_remaining_args=1 as cl::opts. 28 /// Handle backend options that are encoded in the executable name. [all …]
|
| /third_party/libbpf/ |
| D | OAT.xml | 1 <?xml version="1.0" encoding="UTF-8"?> 2 <!-- Copyright (c) 2021 Huawei Device Co., Ltd. 8 http://www.apache.org/licenses/LICENSE-2.0 16 …s is the configuration file template for OpenHarmony OSS Audit Tool, please copy it to your projec… 17 …All configurations in this file will be merged to OAT-Default.xml, if you have any questions or co… 20 …1.If the project don't have "LICENSE" in root dir, please define all the license files in this pro… 23 …1. policy: If the OAT-Default.xml policies do not meet your requirements, please add policies here. 24 …2. policyitem: The fields type, name, path, desc is required, and the fields rule, group, filefilt… 25 …<policyitem type="" name="" path="" desc="" rule="may" group="defaultGroup" filefilter="defaultPol… 32 … file exists in the specified path(projectroot means the root dir of the project), supported file … [all …]
|
| D | README.md | 2 …<source media="(prefers-color-scheme: dark)" srcset="assets/libbpf-logo-sideways-darkbg.png" width… 3 <img src="assets/libbpf-logo-sideways.png" width="40%"> 10 [](https://… 19 Libbpf *authoritative source code* is developed as part of [bpf-next Linux source 20 tree](https://kernel.googlesource.com/pub/scm/linux/kernel/git/bpf/bpf-next) under 22 libbpf changes should be sent to [BPF mailing list](http://vger.kernel.org/vger-lists.html#bpf), 23 please don't open PRs here unless you are changing Github-specific parts of libbpf 24 (e.g., Github-specific Makefile). 32 Please check out [libbpf-bootstrap](https://github.com/libbpf/libbpf-bootstrap) 33 and [the companion blog post](https://nakryiko.com/posts/libbpf-bootstrap/) for [all …]
|
| /third_party/skia/m133/third_party/externals/libwebp/ |
| D | NEWS | 1 - 4/12/2024: version 1.4.0 4 - libwebpmux: WebPAnimEncoderSetChunk, WebPAnimEncoderGetChunk, 6 - libsharpyuv: SharpYuvOptionsInit, SharpYuvConvertWithOptions 7 - extras: SharpYuvEstimate420Risk 11 -DWEBP_ENABLE_NODISCARD=1 12 * improvements and corrections in webp-container-spec.txt and 13 webp-lossless-bitstream-spec.txt (#611) 16 - 9/13/2023: version 1.3.2 18 * security fix for lossless decoder (chromium: #1479274, CVE-2023-4863) 20 - 6/23/2023: version 1.3.1 [all …]
|
| /third_party/skia/m133/third_party/externals/expat/expat/ |
| D | Changes | 14 !! - <blink>fixing a complex non-public security issue</blink>, !! 15 !! - teaming up on researching and fixing future security reports and !! 16 !! ClusterFuzz findings with few-days-max response times in communication !! 19 !! - implementing and auto-testing XML 1.0r5 support !! 21 !! - smart ideas on fixing the Autotools CMake files generation issue !! 23 !! - the Windows binaries topic (needs requirements engineering first), !! 24 !! - pushing migration from `int` to `size_t` further !! 25 !! including edge-cases test coverage (needs discussion before anything). !! 27 !! For details, please reach out via e-mail to sebastian@pipping.org so we !! 30 !! THANK YOU! Sebastian Pipping -- Berlin, 2024-03-09 !! [all …]
|
| /third_party/skia/third_party/externals/expat/expat/ |
| D | Changes | 7 #616 #649 #650 CVE-2022-43680 -- Fix heap use-after-free after overeager 9 XML_ExternalEntityParserCreate in out-of-memory situations 13 #629 #640 CVE-2022-40674 -- Heap use-after-free vulnerability in 17 #531 #534 CVE-2021-45960 -- Fix issues with left shifts by >=29 places 27 (which needs argument "-n" when running xmlwf). 32 GCC Farm Project 47 #551 CVE-2022-23990 -- Fix unsigned integer overflow in function 52 #34 #466 #484 CVE-2013-0340/CWE-776 -- Protect against billion laughs attacks 53 (denial-of-service; flavors targeting CPU time or RAM or both, 61 - A new error code XML_ERROR_AMPLIFICATION_LIMIT_BREACH to [all …]
|
| /third_party/curl/docs/ |
| D | HISTORY.md | 1 <!-- 4 SPDX-License-Identifier: curl 5 --> 12 currency-exchange calculations available to Internet Relay Chat (IRC) 17 ---- 22 Daniel extended this existing command-line open-source tool. After a few minor 25 new maintainer of the project. 28 ---- 36 download support was added, the name of the project was changed and urlget 2.0 37 was released in August 1997. The http-only days were already passed. [all …]
|
| /third_party/json/ |
| D | README.md | 3 …ts/status/1acb366xfyg3qybk/branch/develop?svg=true)](https://ci.appveyor.com/project/nlohmann/json) 8 …tps://scan.coverity.com/projects/5550/badge.svg)](https://scan.coverity.com/projects/nlohmann-json) 9 [](http… 10 [](https://cirrus-ci.com/github/nlo… 11 …g Status](https://oss-fuzz-build-logs.storage.googleapis.com/badges/json.svg)](https://bugs.chromi… 12 [](https://wandbox.org/permlink/1mp1… 13 [](https://json.nlohmann.me) 14 [](https://raw.githubuserconten… 16 [](https://vcpkg.link/ports/nlohmann-… 17 …ging status](https://repology.org/badge/tiny-repos/nlohmann-json.svg)](https://repology.org/projec… [all …]
|
| /third_party/skia/third_party/externals/tint/ |
| D | CMakeLists.txt | 7 # http://www.apache.org/licenses/LICENSE-2.0 17 project(tint) 29 # TINT_IS_SUBPROJECT is 1 if added via add_subdirectory() from another project. 44 # option_if_not_defined(name description default) 46 # option(name description default) 47 # If a variable is not already defined with the given name, otherwise the 50 function (option_if_not_defined name description default) 51 if(NOT DEFINED ${name}) 52 option(${name} ${description} ${default}) 56 # set_if_not_defined(name value description) [all …]
|
| /third_party/spirv-tools/ |
| D | CMakeLists.txt | 1 # Copyright (c) 2015-2023 The Khronos Group Inc. 7 # http://www.apache.org/licenses/LICENSE-2.0 17 project(spirv-tools) 19 # Avoid a bug in CMake 3.22.1. By default it will set -std=c++11 for 20 # targets in test/*, when those tests need -std=c++17. 21 # https://github.com/KhronosGroup/SPIRV-Tools/issues/5340 32 set(SPIRV_TOOLS "SPIRV-Tools") 43 …message(FATAL_ERROR "SPIRV-Tools requires C++17 or later, but is configured for C++${CMAKE_CXX_STA… 52 add_definitions(-DSPIRV_LINUX) 55 add_definitions(-DSPIRV_EMSCRIPTEN) [all …]
|
12