/external/oss-fuzz/projects/pygments/ |
D | Dockerfile | 26 RUN git clone --depth 1 https://github.com/google/fuzzing 27 RUN cat fuzzing/dictionaries/aff.dict \ 28 fuzzing/dictionaries/bash.dict \ 29 fuzzing/dictionaries/creole.dict \ 30 fuzzing/dictionaries/css.dict \ 31 fuzzing/dictionaries/graphviz.dict \ 32 fuzzing/dictionaries/fbs.dict \ 33 fuzzing/dictionaries/html.dict \ 34 fuzzing/dictionaries/jinja2.dict \ 35 fuzzing/dictionaries/js.dict \ [all …]
|
/external/flac/oss-fuzz/ |
D | fuzz-decoder.cc | 9 template <> FLAC__MetadataType fuzzing::datasource::Base::Get<FLAC__MetadataType>(const uint64_t id… in Get() 39 fuzzing::datasource::Datasource& ds; 41 FuzzerStream(fuzzing::datasource::Datasource& dsrc) : in FuzzerStream() 71 fuzzing::memory::memory_test(&(frame->header), sizeof(frame->header)); in write_callback() 72 fuzzing::memory::memory_test(&(frame->footer), sizeof(frame->footer)); in write_callback() 79 fuzzing::memory::memory_test(buffer[i], bytesPerChannel); in write_callback() 92 fuzzing::memory::memory_test(status); in error_callback() 96 fuzzing::memory::memory_test(metadata->type); in metadata_callback() 97 fuzzing::memory::memory_test(metadata->is_last); in metadata_callback() 98 fuzzing::memory::memory_test(metadata->length); in metadata_callback() [all …]
|
D | fuzz-encoder.cc | 21 FuzzerStream(fuzzing::datasource::Datasource&) : in FuzzerStream() 25 fuzzing::memory::memory_test(buffer, bytes); in write_callback() 40 fuzzing::datasource::Datasource ds(data, size); in LLVMFuzzerTestOneInput() 62 fuzzing::memory::memory_test(res); in LLVMFuzzerTestOneInput() 66 fuzzing::memory::memory_test(res); in LLVMFuzzerTestOneInput() 70 fuzzing::memory::memory_test(res); in LLVMFuzzerTestOneInput() 74 fuzzing::memory::memory_test(res); in LLVMFuzzerTestOneInput() 78 fuzzing::memory::memory_test(res); in LLVMFuzzerTestOneInput() 82 fuzzing::memory::memory_test(res); in LLVMFuzzerTestOneInput() 86 fuzzing::memory::memory_test(res); in LLVMFuzzerTestOneInput() [all …]
|
D | Makefile.am | 24 fuzzing/Readme.md \ 25 fuzzing/datasource/datasource.hpp \ 26 fuzzing/datasource/id.hpp \ 27 fuzzing/exception.hpp \ 28 fuzzing/memory.hpp \ 29 fuzzing/types.hpp
|
/external/libcxx/fuzzing/ |
D | fuzz_test.cpp | 109 {"sort", fuzzing::sort}, 110 {"stable_sort", fuzzing::stable_sort}, 111 {"partition", fuzzing::partition}, 112 {"partition_copy", fuzzing::partition_copy}, 113 {"stable_partition", fuzzing::stable_partition}, 114 {"unique", fuzzing::unique}, 115 {"unique_copy", fuzzing::unique_copy}, 116 {"nth_element", fuzzing::nth_element}, 117 {"partial_sort", fuzzing::partial_sort}, 118 {"partial_sort_copy", fuzzing::partial_sort_copy}, [all …]
|
/external/oss-fuzz/projects/lotus/ |
D | build.sh | 26 mkdir fuzzing 27 cp ../fuzzing-lotus/fuzz/fuzz.go fuzzing/ 28 compile_go_fuzzer github.com/filecoin-project/lotus/fuzzing FuzzBlockMsg fuzz_block_msg || true 29 …compile_go_fuzzer github.com/filecoin-project/lotus/fuzzing FuzzBlockMsgStructural fuzz_block_msg_… 30 …compile_go_fuzzer github.com/filecoin-project/lotus/fuzzing FuzzBlockHeader fuzz_block_header || t… 31 …compile_go_fuzzer github.com/filecoin-project/lotus/fuzzing FuzzNodesForHeight fuzz_nodes_for_heig… 39 cd ../fuzzing-lotus/fuzz 41 go mod init github.com/filecoin-project/fuzzing-lotus/fuzz 43 compile_go_fuzzer github.com/filecoin-project/fuzzing-lotus/fuzz FuzzBlockMsg fuzz_block_msg 44 compile_go_fuzzer github.com/filecoin-project/fuzzing-lotus/fuzz FuzzBlockMsgStructural fuzz_block_… [all …]
|
/external/oss-fuzz/projects/quic-go/ |
D | build.sh | 23 compile_go_fuzzer github.com/marten-seemann/qpack/fuzzing Fuzz qpack_fuzzer 29 compile_go_fuzzer github.com/lucas-clemente/quic-go/fuzzing/frames Fuzz frame_fuzzer 30 compile_go_fuzzer github.com/lucas-clemente/quic-go/fuzzing/header Fuzz header_fuzzer 31 compile_go_fuzzer github.com/lucas-clemente/quic-go/fuzzing/transportparameters Fuzz transportparam… 32 compile_go_fuzzer github.com/lucas-clemente/quic-go/fuzzing/tokens Fuzz token_fuzzer 33 compile_go_fuzzer github.com/lucas-clemente/quic-go/fuzzing/handshake Fuzz handshake_fuzzer 40 go generate ./fuzzing/... 42 zip --quiet -r $OUT/header_fuzzer_seed_corpus.zip fuzzing/header/corpus 43 zip --quiet -r $OUT/frame_fuzzer_seed_corpus.zip fuzzing/frames/corpus 44 zip --quiet -r $OUT/transportparameter_fuzzer_seed_corpus.zip fuzzing/transportparameters/corpus [all …]
|
/external/tpm2-tss/doc/ |
D | fuzzing.md | 6 Building fuzz tests can be enabled using the `--with-fuzzing=` option. For which 14 libFuzzer tests can be built natively or using the docker `fuzzing` target. 18 Build the fuzz tests by setting `--with-fuzzing=libfuzzer` and statically 19 linking to the fuzzing TCTI. 29 --with-fuzzing=libfuzzer \ 30 --enable-tcti-fuzzing \ 47 Build the fuzz targets and check that they work by building the `fuzzing` docker 51 docker build --target fuzzing -t tpm2-tss:fuzzing . 58 docker run --rm -ti tpm2-tss:fuzzing \ 71 as seen under the `fuzzing` target of the `Dockerfile` in this repo, only [all …]
|
/external/oss-fuzz/projects/pillow/ |
D | Dockerfile | 18 RUN git clone --depth 1 https://github.com/google/fuzzing 19 RUN cat fuzzing/dictionaries/bmp.dict \ 20 fuzzing/dictionaries/dds.dict \ 21 fuzzing/dictionaries/gif.dict \ 22 fuzzing/dictionaries/icns.dict \ 23 fuzzing/dictionaries/jpeg.dict \ 24 fuzzing/dictionaries/jpeg2000.dict \ 25 fuzzing/dictionaries/pbm.dict \ 26 fuzzing/dictionaries/png.dict \ 27 fuzzing/dictionaries/psd.dict \ [all …]
|
/external/oss-fuzz/docs/ |
D | index.md | 15 vulnerabilities and stability bugs by deploying [guided in-process fuzzing of 22 [guided in-process fuzzing of Chrome components]: https://security.googleblog.com/2016/08/guided-in… 26 combining modern fuzzing techniques with scalable, distributed execution. 31 We support the [libFuzzer], [AFL++], and [Honggfuzz] fuzzing engines in 42 languages supported by [LLVM] may work too. OSS-Fuzz supports fuzzing x86_64 47 ## Learn more about fuzzing 50 project. To learn more about fuzzing in general, we recommend reading [libFuzzer 51 tutorial] and the other docs in [google/fuzzing] repository. These and some 54 [google/fuzzing]: https://github.com/google/fuzzing/tree/master/docs 55 [libFuzzer tutorial]: https://github.com/google/fuzzing/blob/master/tutorial/libFuzzerTutorial.md
|
D | faq.md | 15 ## Where can I learn more about fuzzing? 17 We recommend reading [libFuzzer tutorial] and the other docs in [google/fuzzing] 21 [google/fuzzing]: https://github.com/google/fuzzing/tree/master/docs 22 [libFuzzer tutorial]: https://github.com/google/fuzzing/blob/master/tutorial/libFuzzerTutorial.md 58 on. ClusterFuzz is an open-source fuzzing infrastructure that you can deploy in 74 Our [ClusterFuzz]({{ site.baseurl }}/further-reading/clusterfuzz) fuzzing 97 since they significantly reduce the efficiency of fuzzing. 99 Remember that fuzzing is executed with AddressSanitizer or other 141 fuzzing engine(s) are not able to go deeper based on the existing seeds. 143 - There is some crypto/crc stuff in the code that will prevent any fuzzing [all …]
|
/external/oss-fuzz/docs/reference/ |
D | glossary.md | 11 For general fuzzing terms, see the [glossary] from [google/fuzzing] project. 13 [glossary]: https://github.com/google/fuzzing/blob/master/docs/glossary.md 14 [google/fuzzing]: https://github.com/google/fuzzing 24 A scalable fuzzing infrastructure that is used for OSS-Fuzz backend. 34 [general definition](https://github.com/google/fuzzing/blob/master/docs/glossary.md#fuzz-target), 45 [project](#project), is run with a specific [fuzzing engine], in a specific 67 [fuzz targets]: https://github.com/google/fuzzing/blob/master/docs/glossary.md#fuzz-target 68 [fuzzing engine]: https://github.com/google/fuzzing/blob/master/docs/glossary.md#fuzzing-engine 69 [sanitizer]: https://github.com/google/fuzzing/blob/master/docs/glossary.md#sanitizer 70 [test input]: https://github.com/google/fuzzing/blob/master/docs/glossary.md#test-input [all …]
|
D | useful_links.md | 26 * 2016-12-01 - Announcing OSS-Fuzz: Continuous fuzzing for open source software 27 ([Open Source](https://opensource.googleblog.com/2016/12/announcing-oss-fuzz-continuous-fuzzing.htm… 28 [Testing](https://testing.googleblog.com/2016/12/announcing-oss-fuzz-continuous-fuzzing.html), 29 [Security](https://security.googleblog.com/2016/12/announcing-oss-fuzz-continuous-fuzzing.html)) 36 …nships for Open Source Software](https://security.googleblog.com/2020/10/fuzzing-internships-for-o… 44 …uzzer](https://github.com/google/fuzzer-test-suite/blob/master/tutorial/structure-aware-fuzzing.md)
|
/external/oss-fuzz/projects/powerdns/ |
D | build.sh | 44 cp ../regression-tests/zones/* ../fuzzing/corpus/zones/ 47 zip -j "${OUT}/fuzz_target_dnsdistcache_seed_corpus.zip" ../fuzzing/corpus/raw-dns-packets/* 48 zip -j "${OUT}/fuzz_target_moadnsparser_seed_corpus.zip" ../fuzzing/corpus/raw-dns-packets/* 49 zip -j "${OUT}/fuzz_target_packetcache_seed_corpus.zip" ../fuzzing/corpus/raw-dns-packets/* 50 zip -j "${OUT}/fuzz_target_zoneparsertng_seed_corpus.zip" ../fuzzing/corpus/zones/*
|
/external/oss-fuzz/ |
D | README.md | 6 vulnerabilities and stability bugs by deploying [guided in-process fuzzing of 13 [guided in-process fuzzing of Chrome components]: https://security.googleblog.com/2016/08/guided-in… 17 combining modern fuzzing techniques with scalable, distributed execution. 22 We support the [libFuzzer], [AFL++], and [Honggfuzz] fuzzing engines in 33 supported by [LLVM] may work too. OSS-Fuzz supports fuzzing x86_64 and i386 54 * 2016-12-01 - [Announcing OSS-Fuzz: Continuous fuzzing for open source software] 60 …S-Fuzz: Continuous fuzzing for open source software]: https://opensource.googleblog.com/2016/12/an… 63 [Fuzzing internships for Open Source Software]: https://security.googleblog.com/2020/10/fuzzing-int…
|
/external/tensorflow/tensorflow/security/fuzzing/ |
D | tf_fuzzing.bzl | 3 # TensorFlow fuzzing can be done in open source too. 8 # - dictionaries/${FUZZ}.dict : fuzzing dictionary for the fuzzer 13 # across multiple fuzzers (for example fuzzing ops), we can store it in other 15 # on a case by case basis, for now the ops fuzzing harness resides under 16 # tensorflow/core/kernels/fuzzing. 19 # mutators to do structure aware fuzzing) or any other type of content that is 22 # tf_cc_fuzz_target is a cc_test modified to include fuzzing support. 60 deps: An optional list of dependencies for the code you're fuzzing. 76 deps = deps, # TODO(mihaimaruseac): fuzzing lib? 78 tags = tags, # TODO(mihaimaruseac): fuzzing tags? [all …]
|
/external/oss-fuzz/projects/json-sanitizer/ |
D | Dockerfile | 21 RUN git clone --depth 1 https://github.com/google/fuzzing 22 RUN cat fuzzing/dictionaries/json.dict \ 23 fuzzing/dictionaries/html.dict \ 24 fuzzing/dictionaries/xml.dict \ 26 RUN cp fuzzing/dictionaries/json.dict $SRC/IdempotenceFuzzer.dict 27 RUN cp fuzzing/dictionaries/json.dict $SRC/ValidJsonFuzzer.dict
|
/external/oss-fuzz/projects/spidermonkey-ufi/ |
D | build.sh | 31 rm ../../tools/fuzzing/libfuzzer/patches/*.patch 32 touch ../../tools/fuzzing/libfuzzer/patches/dummy.patch 35 (cd ../../tools/fuzzing/libfuzzer && ./clone_libfuzzer.sh HEAD) 45 --enable-fuzzing \
|
/external/oss-fuzz/projects/unbound/ |
D | build.sh | 87 wget --directory-prefix $OUT https://github.com/jsha/unbound/raw/fuzzing-corpora/testdata/parse_pac… 88 wget --directory-prefix $OUT https://github.com/luisx41/fuzzing-corpus/raw/master/projects/unbound/… 89 wget --directory-prefix $OUT https://github.com/luisx41/fuzzing-corpus/raw/master/projects/unbound/… 90 wget --directory-prefix $OUT https://github.com/luisx41/fuzzing-corpus/raw/master/projects/unbound/… 91 wget --directory-prefix $OUT https://github.com/luisx41/fuzzing-corpus/raw/master/projects/unbound/…
|
/external/oss-fuzz/projects/harfbuzz/ |
D | build.sh | 38 ninja -v -j$(nproc) -C $build test/fuzzing/hb-{shape,draw,subset,set}-fuzzer 39 mv $build/test/fuzzing/hb-{shape,draw,subset,set}-fuzzer $OUT/ 48 test/fuzzing/fonts \ 56 zip $OUT/hb-set-fuzzer_seed_corpus.zip ./test/fuzzing/sets/*
|
/external/bc/ |
D | .gitignore | 37 tests/fuzzing/bc_outputs1/* 38 tests/fuzzing/bc_outputs2/* 39 tests/fuzzing/bc_outputs3/* 40 tests/fuzzing/dc_outputs/*
|
/external/oss-fuzz/projects/glib/ |
D | build.sh | 31 find $BUILD/fuzzing -maxdepth 1 -executable -type f -exec cp "{}" $OUT \; 33 find fuzzing -type f -name "*.dict" -exec cp "{}" $OUT \; 35 for CORPUS in $(find fuzzing -type f -name "*.corpus"); do
|
/external/oss-fuzz/projects/opensc/ |
D | build.sh | 20 ./configure --disable-optimization --disable-shared --disable-pcsc --enable-ctapi --enable-fuzzing … 23 fuzzerFiles=$(find $SRC/opensc/src/tests/fuzzing/ -name "fuzz_*.c") 29 … zip -j $OUT/${fuzzerName}_seed_corpus.zip $SRC/opensc/src/tests/fuzzing/corpus/${fuzzerName}/*
|
/external/tpm2-tss/ |
D | Makefile-fuzz.am | 11 # tcti library used for fuzzing 13 libtss2_tcti_fuzzing = test/fuzz/tcti/libtss2-tcti-fuzzing.la 19 test/fuzz/tcti/tcti-fuzzing.c test/fuzz/tcti/tcti-fuzzing.h \
|
/external/oss-fuzz/projects/example/my-api-repo/ |
D | README.md | 3 …[ideal](https://google.github.io/oss-fuzz/advanced-topics/ideal-integration/) support for fuzzing. 9 …t.cpp): is a unit test for `DoStuff()`. Unit tests are not necessary for fuzzing but are generally… 12 …fuzzing dictionary file](https://google.github.io/oss-fuzz/getting-started/new-project-guide#dicti… 15 …* accepts external fuzzing engine via `$LIB_FUZZING_ENGINE`, by default uses [standalone_fuzz_targ… 18 …it to execute a fuzz target on given files w/o having to link in libFuzzer or other fuzzing engine.
|