Home
last modified time | relevance | path

Searched refs:fuzzing (Results 1 – 25 of 312) sorted by relevance

12345678910>>...13

/external/oss-fuzz/projects/pygments/
DDockerfile26 RUN git clone --depth 1 https://github.com/google/fuzzing
27 RUN cat fuzzing/dictionaries/aff.dict \
28 fuzzing/dictionaries/bash.dict \
29 fuzzing/dictionaries/creole.dict \
30 fuzzing/dictionaries/css.dict \
31 fuzzing/dictionaries/graphviz.dict \
32 fuzzing/dictionaries/fbs.dict \
33 fuzzing/dictionaries/html.dict \
34 fuzzing/dictionaries/jinja2.dict \
35 fuzzing/dictionaries/js.dict \
[all …]
/external/flac/oss-fuzz/
Dfuzz-decoder.cc9 template <> FLAC__MetadataType fuzzing::datasource::Base::Get<FLAC__MetadataType>(const uint64_t id… in Get()
39 fuzzing::datasource::Datasource& ds;
41 FuzzerStream(fuzzing::datasource::Datasource& dsrc) : in FuzzerStream()
71 fuzzing::memory::memory_test(&(frame->header), sizeof(frame->header)); in write_callback()
72 fuzzing::memory::memory_test(&(frame->footer), sizeof(frame->footer)); in write_callback()
79 fuzzing::memory::memory_test(buffer[i], bytesPerChannel); in write_callback()
92 fuzzing::memory::memory_test(status); in error_callback()
96 fuzzing::memory::memory_test(metadata->type); in metadata_callback()
97 fuzzing::memory::memory_test(metadata->is_last); in metadata_callback()
98 fuzzing::memory::memory_test(metadata->length); in metadata_callback()
[all …]
Dfuzz-encoder.cc21 FuzzerStream(fuzzing::datasource::Datasource&) : in FuzzerStream()
25 fuzzing::memory::memory_test(buffer, bytes); in write_callback()
40 fuzzing::datasource::Datasource ds(data, size); in LLVMFuzzerTestOneInput()
62 fuzzing::memory::memory_test(res); in LLVMFuzzerTestOneInput()
66 fuzzing::memory::memory_test(res); in LLVMFuzzerTestOneInput()
70 fuzzing::memory::memory_test(res); in LLVMFuzzerTestOneInput()
74 fuzzing::memory::memory_test(res); in LLVMFuzzerTestOneInput()
78 fuzzing::memory::memory_test(res); in LLVMFuzzerTestOneInput()
82 fuzzing::memory::memory_test(res); in LLVMFuzzerTestOneInput()
86 fuzzing::memory::memory_test(res); in LLVMFuzzerTestOneInput()
[all …]
DMakefile.am24 fuzzing/Readme.md \
25 fuzzing/datasource/datasource.hpp \
26 fuzzing/datasource/id.hpp \
27 fuzzing/exception.hpp \
28 fuzzing/memory.hpp \
29 fuzzing/types.hpp
/external/libcxx/fuzzing/
Dfuzz_test.cpp109 {"sort", fuzzing::sort},
110 {"stable_sort", fuzzing::stable_sort},
111 {"partition", fuzzing::partition},
112 {"partition_copy", fuzzing::partition_copy},
113 {"stable_partition", fuzzing::stable_partition},
114 {"unique", fuzzing::unique},
115 {"unique_copy", fuzzing::unique_copy},
116 {"nth_element", fuzzing::nth_element},
117 {"partial_sort", fuzzing::partial_sort},
118 {"partial_sort_copy", fuzzing::partial_sort_copy},
[all …]
/external/oss-fuzz/projects/lotus/
Dbuild.sh26 mkdir fuzzing
27 cp ../fuzzing-lotus/fuzz/fuzz.go fuzzing/
28 compile_go_fuzzer github.com/filecoin-project/lotus/fuzzing FuzzBlockMsg fuzz_block_msg || true
29 …compile_go_fuzzer github.com/filecoin-project/lotus/fuzzing FuzzBlockMsgStructural fuzz_block_msg_…
30 …compile_go_fuzzer github.com/filecoin-project/lotus/fuzzing FuzzBlockHeader fuzz_block_header || t…
31 …compile_go_fuzzer github.com/filecoin-project/lotus/fuzzing FuzzNodesForHeight fuzz_nodes_for_heig…
39 cd ../fuzzing-lotus/fuzz
41 go mod init github.com/filecoin-project/fuzzing-lotus/fuzz
43 compile_go_fuzzer github.com/filecoin-project/fuzzing-lotus/fuzz FuzzBlockMsg fuzz_block_msg
44 compile_go_fuzzer github.com/filecoin-project/fuzzing-lotus/fuzz FuzzBlockMsgStructural fuzz_block_…
[all …]
/external/oss-fuzz/projects/quic-go/
Dbuild.sh23 compile_go_fuzzer github.com/marten-seemann/qpack/fuzzing Fuzz qpack_fuzzer
29 compile_go_fuzzer github.com/lucas-clemente/quic-go/fuzzing/frames Fuzz frame_fuzzer
30 compile_go_fuzzer github.com/lucas-clemente/quic-go/fuzzing/header Fuzz header_fuzzer
31 compile_go_fuzzer github.com/lucas-clemente/quic-go/fuzzing/transportparameters Fuzz transportparam…
32 compile_go_fuzzer github.com/lucas-clemente/quic-go/fuzzing/tokens Fuzz token_fuzzer
33 compile_go_fuzzer github.com/lucas-clemente/quic-go/fuzzing/handshake Fuzz handshake_fuzzer
40 go generate ./fuzzing/...
42 zip --quiet -r $OUT/header_fuzzer_seed_corpus.zip fuzzing/header/corpus
43 zip --quiet -r $OUT/frame_fuzzer_seed_corpus.zip fuzzing/frames/corpus
44 zip --quiet -r $OUT/transportparameter_fuzzer_seed_corpus.zip fuzzing/transportparameters/corpus
[all …]
/external/tpm2-tss/doc/
Dfuzzing.md6 Building fuzz tests can be enabled using the `--with-fuzzing=` option. For which
14 libFuzzer tests can be built natively or using the docker `fuzzing` target.
18 Build the fuzz tests by setting `--with-fuzzing=libfuzzer` and statically
19 linking to the fuzzing TCTI.
29 --with-fuzzing=libfuzzer \
30 --enable-tcti-fuzzing \
47 Build the fuzz targets and check that they work by building the `fuzzing` docker
51 docker build --target fuzzing -t tpm2-tss:fuzzing .
58 docker run --rm -ti tpm2-tss:fuzzing \
71 as seen under the `fuzzing` target of the `Dockerfile` in this repo, only
[all …]
/external/oss-fuzz/projects/pillow/
DDockerfile18 RUN git clone --depth 1 https://github.com/google/fuzzing
19 RUN cat fuzzing/dictionaries/bmp.dict \
20 fuzzing/dictionaries/dds.dict \
21 fuzzing/dictionaries/gif.dict \
22 fuzzing/dictionaries/icns.dict \
23 fuzzing/dictionaries/jpeg.dict \
24 fuzzing/dictionaries/jpeg2000.dict \
25 fuzzing/dictionaries/pbm.dict \
26 fuzzing/dictionaries/png.dict \
27 fuzzing/dictionaries/psd.dict \
[all …]
/external/oss-fuzz/docs/
Dindex.md15 vulnerabilities and stability bugs by deploying [guided in-process fuzzing of
22 [guided in-process fuzzing of Chrome components]: https://security.googleblog.com/2016/08/guided-in…
26 combining modern fuzzing techniques with scalable, distributed execution.
31 We support the [libFuzzer], [AFL++], and [Honggfuzz] fuzzing engines in
42 languages supported by [LLVM] may work too. OSS-Fuzz supports fuzzing x86_64
47 ## Learn more about fuzzing
50 project. To learn more about fuzzing in general, we recommend reading [libFuzzer
51 tutorial] and the other docs in [google/fuzzing] repository. These and some
54 [google/fuzzing]: https://github.com/google/fuzzing/tree/master/docs
55 [libFuzzer tutorial]: https://github.com/google/fuzzing/blob/master/tutorial/libFuzzerTutorial.md
Dfaq.md15 ## Where can I learn more about fuzzing?
17 We recommend reading [libFuzzer tutorial] and the other docs in [google/fuzzing]
21 [google/fuzzing]: https://github.com/google/fuzzing/tree/master/docs
22 [libFuzzer tutorial]: https://github.com/google/fuzzing/blob/master/tutorial/libFuzzerTutorial.md
58 on. ClusterFuzz is an open-source fuzzing infrastructure that you can deploy in
74 Our [ClusterFuzz]({{ site.baseurl }}/further-reading/clusterfuzz) fuzzing
97 since they significantly reduce the efficiency of fuzzing.
99 Remember that fuzzing is executed with AddressSanitizer or other
141 fuzzing engine(s) are not able to go deeper based on the existing seeds.
143 - There is some crypto/crc stuff in the code that will prevent any fuzzing
[all …]
/external/oss-fuzz/docs/reference/
Dglossary.md11 For general fuzzing terms, see the [glossary] from [google/fuzzing] project.
13 [glossary]: https://github.com/google/fuzzing/blob/master/docs/glossary.md
14 [google/fuzzing]: https://github.com/google/fuzzing
24 A scalable fuzzing infrastructure that is used for OSS-Fuzz backend.
34 [general definition](https://github.com/google/fuzzing/blob/master/docs/glossary.md#fuzz-target),
45 [project](#project), is run with a specific [fuzzing engine], in a specific
67 [fuzz targets]: https://github.com/google/fuzzing/blob/master/docs/glossary.md#fuzz-target
68 [fuzzing engine]: https://github.com/google/fuzzing/blob/master/docs/glossary.md#fuzzing-engine
69 [sanitizer]: https://github.com/google/fuzzing/blob/master/docs/glossary.md#sanitizer
70 [test input]: https://github.com/google/fuzzing/blob/master/docs/glossary.md#test-input
[all …]
Duseful_links.md26 * 2016-12-01 - Announcing OSS-Fuzz: Continuous fuzzing for open source software
27 ([Open Source](https://opensource.googleblog.com/2016/12/announcing-oss-fuzz-continuous-fuzzing.htm…
28 [Testing](https://testing.googleblog.com/2016/12/announcing-oss-fuzz-continuous-fuzzing.html),
29 [Security](https://security.googleblog.com/2016/12/announcing-oss-fuzz-continuous-fuzzing.html))
36 …nships for Open Source Software](https://security.googleblog.com/2020/10/fuzzing-internships-for-o…
44 …uzzer](https://github.com/google/fuzzer-test-suite/blob/master/tutorial/structure-aware-fuzzing.md)
/external/oss-fuzz/projects/powerdns/
Dbuild.sh44 cp ../regression-tests/zones/* ../fuzzing/corpus/zones/
47 zip -j "${OUT}/fuzz_target_dnsdistcache_seed_corpus.zip" ../fuzzing/corpus/raw-dns-packets/*
48 zip -j "${OUT}/fuzz_target_moadnsparser_seed_corpus.zip" ../fuzzing/corpus/raw-dns-packets/*
49 zip -j "${OUT}/fuzz_target_packetcache_seed_corpus.zip" ../fuzzing/corpus/raw-dns-packets/*
50 zip -j "${OUT}/fuzz_target_zoneparsertng_seed_corpus.zip" ../fuzzing/corpus/zones/*
/external/oss-fuzz/
DREADME.md6 vulnerabilities and stability bugs by deploying [guided in-process fuzzing of
13 [guided in-process fuzzing of Chrome components]: https://security.googleblog.com/2016/08/guided-in…
17 combining modern fuzzing techniques with scalable, distributed execution.
22 We support the [libFuzzer], [AFL++], and [Honggfuzz] fuzzing engines in
33 supported by [LLVM] may work too. OSS-Fuzz supports fuzzing x86_64 and i386
54 * 2016-12-01 - [Announcing OSS-Fuzz: Continuous fuzzing for open source software]
60 …S-Fuzz: Continuous fuzzing for open source software]: https://opensource.googleblog.com/2016/12/an…
63 [Fuzzing internships for Open Source Software]: https://security.googleblog.com/2020/10/fuzzing-int…
/external/tensorflow/tensorflow/security/fuzzing/
Dtf_fuzzing.bzl3 # TensorFlow fuzzing can be done in open source too.
8 # - dictionaries/${FUZZ}.dict : fuzzing dictionary for the fuzzer
13 # across multiple fuzzers (for example fuzzing ops), we can store it in other
15 # on a case by case basis, for now the ops fuzzing harness resides under
16 # tensorflow/core/kernels/fuzzing.
19 # mutators to do structure aware fuzzing) or any other type of content that is
22 # tf_cc_fuzz_target is a cc_test modified to include fuzzing support.
60 deps: An optional list of dependencies for the code you're fuzzing.
76 deps = deps, # TODO(mihaimaruseac): fuzzing lib?
78 tags = tags, # TODO(mihaimaruseac): fuzzing tags?
[all …]
/external/oss-fuzz/projects/json-sanitizer/
DDockerfile21 RUN git clone --depth 1 https://github.com/google/fuzzing
22 RUN cat fuzzing/dictionaries/json.dict \
23 fuzzing/dictionaries/html.dict \
24 fuzzing/dictionaries/xml.dict \
26 RUN cp fuzzing/dictionaries/json.dict $SRC/IdempotenceFuzzer.dict
27 RUN cp fuzzing/dictionaries/json.dict $SRC/ValidJsonFuzzer.dict
/external/oss-fuzz/projects/spidermonkey-ufi/
Dbuild.sh31 rm ../../tools/fuzzing/libfuzzer/patches/*.patch
32 touch ../../tools/fuzzing/libfuzzer/patches/dummy.patch
35 (cd ../../tools/fuzzing/libfuzzer && ./clone_libfuzzer.sh HEAD)
45 --enable-fuzzing \
/external/oss-fuzz/projects/unbound/
Dbuild.sh87 wget --directory-prefix $OUT https://github.com/jsha/unbound/raw/fuzzing-corpora/testdata/parse_pac…
88 wget --directory-prefix $OUT https://github.com/luisx41/fuzzing-corpus/raw/master/projects/unbound/…
89 wget --directory-prefix $OUT https://github.com/luisx41/fuzzing-corpus/raw/master/projects/unbound/…
90 wget --directory-prefix $OUT https://github.com/luisx41/fuzzing-corpus/raw/master/projects/unbound/…
91 wget --directory-prefix $OUT https://github.com/luisx41/fuzzing-corpus/raw/master/projects/unbound/…
/external/oss-fuzz/projects/harfbuzz/
Dbuild.sh38 ninja -v -j$(nproc) -C $build test/fuzzing/hb-{shape,draw,subset,set}-fuzzer
39 mv $build/test/fuzzing/hb-{shape,draw,subset,set}-fuzzer $OUT/
48 test/fuzzing/fonts \
56 zip $OUT/hb-set-fuzzer_seed_corpus.zip ./test/fuzzing/sets/*
/external/bc/
D.gitignore37 tests/fuzzing/bc_outputs1/*
38 tests/fuzzing/bc_outputs2/*
39 tests/fuzzing/bc_outputs3/*
40 tests/fuzzing/dc_outputs/*
/external/oss-fuzz/projects/glib/
Dbuild.sh31 find $BUILD/fuzzing -maxdepth 1 -executable -type f -exec cp "{}" $OUT \;
33 find fuzzing -type f -name "*.dict" -exec cp "{}" $OUT \;
35 for CORPUS in $(find fuzzing -type f -name "*.corpus"); do
/external/oss-fuzz/projects/opensc/
Dbuild.sh20 ./configure --disable-optimization --disable-shared --disable-pcsc --enable-ctapi --enable-fuzzing
23 fuzzerFiles=$(find $SRC/opensc/src/tests/fuzzing/ -name "fuzz_*.c")
29 … zip -j $OUT/${fuzzerName}_seed_corpus.zip $SRC/opensc/src/tests/fuzzing/corpus/${fuzzerName}/*
/external/tpm2-tss/
DMakefile-fuzz.am11 # tcti library used for fuzzing
13 libtss2_tcti_fuzzing = test/fuzz/tcti/libtss2-tcti-fuzzing.la
19 test/fuzz/tcti/tcti-fuzzing.c test/fuzz/tcti/tcti-fuzzing.h \
/external/oss-fuzz/projects/example/my-api-repo/
DREADME.md3 …[ideal](https://google.github.io/oss-fuzz/advanced-topics/ideal-integration/) support for fuzzing.
9 …t.cpp): is a unit test for `DoStuff()`. Unit tests are not necessary for fuzzing but are generally…
12fuzzing dictionary file](https://google.github.io/oss-fuzz/getting-started/new-project-guide#dicti…
15 …* accepts external fuzzing engine via `$LIB_FUZZING_ENGINE`, by default uses [standalone_fuzz_targ…
18 …it to execute a fuzz target on given files w/o having to link in libFuzzer or other fuzzing engine.

12345678910>>...13