Home
last modified time | relevance | path

Searched full:fuzzing (Results 1 – 25 of 905) sorted by relevance

12345678910>>...37

/external/oss-fuzz/projects/pygments/
DDockerfile26 RUN git clone --depth 1 https://github.com/google/fuzzing
27 RUN cat fuzzing/dictionaries/aff.dict \
28 fuzzing/dictionaries/bash.dict \
29 fuzzing/dictionaries/creole.dict \
30 fuzzing/dictionaries/css.dict \
31 fuzzing/dictionaries/graphviz.dict \
32 fuzzing/dictionaries/fbs.dict \
33 fuzzing/dictionaries/html.dict \
34 fuzzing/dictionaries/jinja2.dict \
35 fuzzing/dictionaries/js.dict \
[all …]
/external/bc/tests/fuzzing/
Dbc_afl.yaml10 - rm -rf tests/fuzzing/bc_outputs1/
11 - rm -rf tests/fuzzing/bc_outputs2/
12 - rm -rf tests/fuzzing/dc_outputs/
28 …- afl-fuzz -i tests/fuzzing/bc_inputs1 -o tests/fuzzing/bc_outputs1 -p exploit -D -M bc11 bin/bc -…
44 …- afl-fuzz -i tests/fuzzing/bc_inputs1 -o tests/fuzzing/bc_outputs1 -p coe -S bc12 bin/bc -lqc -e …
60 …- afl-fuzz -i tests/fuzzing/bc_inputs1 -o tests/fuzzing/bc_outputs1 -p fast -S bc13 bin/bc -lqc -e…
76 …- afl-fuzz -i tests/fuzzing/bc_inputs1 -o tests/fuzzing/bc_outputs1 -p explore -S bc14 bin/bc -lqc…
92 …- afl-fuzz -i tests/fuzzing/bc_inputs1 -o tests/fuzzing/bc_outputs1 -p exploit -D -S bc15 bin/bc -…
108 …- afl-fuzz -i tests/fuzzing/bc_inputs2 -o tests/fuzzing/bc_outputs2 -p exploit -D -M bc21 bin/bc -…
124 …- afl-fuzz -i tests/fuzzing/bc_inputs2 -o tests/fuzzing/bc_outputs2 -p coe -S bc22 bin/bc -lqc -e …
[all …]
Dbc_afl_continue.yaml26 …- afl-fuzz -i- -o tests/fuzzing/bc_outputs1 -p exploit -D -M bc11 bin/bc -lqc -e "seed = 128093714…
42 …- afl-fuzz -i- -o tests/fuzzing/bc_outputs1 -p coe -S bc12 bin/bc -lqc -e "seed = 1280937142.20981…
58 …- afl-fuzz -i- -o tests/fuzzing/bc_outputs1 -p fast -S bc13 bin/bc -lqc -e "seed = 1280937142.2098…
74 …- afl-fuzz -i- -o tests/fuzzing/bc_outputs1 -p explore -S bc14 bin/bc -lqc -e "seed = 1280937142.2…
90 …- afl-fuzz -i- -o tests/fuzzing/bc_outputs1 -p exploit -D -S bc15 bin/bc -lqC -e "seed = 128093714…
106 …- afl-fuzz -i- -o tests/fuzzing/bc_outputs2 -p exploit -D -M bc21 bin/bc -lqc -e "seed = 128093714…
122 …- afl-fuzz -i- -o tests/fuzzing/bc_outputs2 -p coe -S bc22 bin/bc -lqc -e "seed = 1280937142.20981…
138 …- afl-fuzz -i- -o tests/fuzzing/bc_outputs2 -p fast -S bc23 bin/bc -lqc -e "seed = 1280937142.2098…
154 …- afl-fuzz -i- -o tests/fuzzing/bc_outputs2 -p explore -S bc24 bin/bc -lqc -e "seed = 1280937142.2…
170 …- afl-fuzz -i- -o tests/fuzzing/bc_outputs2 -p exploit -D -S bc25 bin/bc -lqC -e "seed = 128093714…
[all …]
/external/AFLplusplus/docs/
DREADME.md11 ## Fuzzing targets with the source code available
13 You can find a quickstart for fuzzing targets with the source code available in
14 the [README.md of the repository](../README.md#quick-start-fuzzing-with-afl).
16 For in-depth information on the steps of the fuzzing process, see
20 ![Fuzzing process overview](https://raw.githubusercontent.com/AFLplusplus/AFLplusplus/dev/docs/reso…
31 ### Preparing the fuzzing campaign
35 …he fuzzing campaign](https://raw.githubusercontent.com/AFLplusplus/AFLplusplus/dev/docs/resources/…
37 ### Fuzzing the target
41 ![Fuzzing the target](https://raw.githubusercontent.com/AFLplusplus/AFLplusplus/dev/docs/resources/…
43 ### Managing the fuzzing campaign
[all …]
Dtutorials.md7 …ps://securitylab.github.com/research/fuzzing-challenges-solutions-1](https://securitylab.github.co…
8 * [https://securitylab.github.com/research/fuzzing-software-2](https://securitylab.github.com/resea…
9 … [https://securitylab.github.com/research/fuzzing-sockets-FTP](https://securitylab.github.com/rese…
10 …https://securitylab.github.com/research/fuzzing-sockets-FreeRDP](https://securitylab.github.com/re…
11 * [https://securitylab.github.com/research/fuzzing-apache-1](https://securitylab.github.com/researc…
12 * [https://mmmds.pl/fuzzing-map-parser-part-1-teeworlds/](https://mmmds.pl/fuzzing-map-parser-part-…
19 If you are interested in fuzzing structured data (where you define what the
33 * [[Fuzzing with AFLplusplus] Installing AFLPlusplus and fuzzing a simple C program](https://www.yo…
34 * [[Fuzzing with AFLplusplus] How to fuzz a binary with no source code on Linux in persistent mode]…
35 * [Blackbox Fuzzing #1: Start Binary-Only Fuzzing using AFL++ QEMU mode](https://www.youtube.com/wa…
[all …]
Dbest_practices.md7 * [Fuzzing a target with source code available](#fuzzing-a-target-with-source-code-available)
8 * [Fuzzing a target with dlopen() instrumented libraries](#fuzzing-a-target-with-dlopen-instrumente…
9 * [Fuzzing a binary-only target](#fuzzing-a-binary-only-target)
10 * [Fuzzing a GUI program](#fuzzing-a-gui-program)
11 * [Fuzzing a network service](#fuzzing-a-network-service)
20 ### Fuzzing a target with source code available
25 ### Fuzzing a target with dlopen instrumented libraries
27 If a source code based fuzzing target loads instrumented libraries with
45 ### Fuzzing a binary-only target
50 ### Fuzzing a GUI program
[all …]
Dfuzzing_in_depth.md1 # Fuzzing with AFL++
7 Fuzzing source code is a three-step process:
11 2. Prepare the fuzzing by selecting and optimizing the input corpus for the
13 3. Perform the fuzzing of the target by randomly mutating input and assessing if
19 tasks, fuzzing may put a strain on your hardware and on the OS. In particular:
23 automatically throttled. That said, especially when fuzzing on less suitable
30 that you shouldn't be fuzzing on systems where the prospect of data loss is
33 - Fuzzing involves billions of reads and writes to the filesystem. On modern
132 AFL++ which then tries to put these values into the fuzzing data at different
195 It is possible to use sanitizers when instrumenting targets for fuzzing, which
[all …]
/external/cronet/testing/libfuzzer/
DREADME.md3 [go/chrome-fuzzing](https://goto.google.com/chrome-fuzzing)
5 [Fuzzing] is a testing technique that feeds auto-generated inputs to a piece
8 [go/fuzzing-success](http://go/fuzzing-success)). You can learn more about the
9 benefits of fuzzing at [go/why-fuzz](http://go/why-fuzz).
11 This documentation covers the in-process guided fuzzing approach employed by
12 different fuzzing engines, such as [libFuzzer] or [AFL]. To learn more about
13 out-of-process fuzzers, please refer to the [Blackbox fuzzing] page in the
21 automatically discovered by buildbots, built with different fuzzing engines,
22 then uploaded to the distributed [ClusterFuzz] fuzzing system to run at scale.
39 * [Fuzzing mojo interfaces] using automatically generated libprotobuf-mutator fuzzers.
[all …]
/external/cronet/testing/libfuzzer/fuzzers/command_buffer_lpm_fuzzer/
Dcmd_buf_lpm_fuzz.cc47 namespace gpu::cmdbuf::fuzzing { namespace
85 // Use SwiftShader so fuzzing can work without a physical GPU. in GfxInit()
97 // fuzzing, but it's a starting point. in GfxInit()
133 Data structures of particular interest to fuzzing include: in GfxInit()
197 gpu::SyncToken CmdBufFuzz::SyncTokenFromProto(fuzzing::SyncToken token_proto) { in SyncTokenFromProto()
207 gpu::cmdbuf::fuzzing::CommandBufferNamespaceIds::MAX_VALID); in SyncTokenFromProto()
216 /* Fuzzing happens here. */
217 void CmdBufFuzz::RunCommandBuffer(fuzzing::CmdBufSession session) { in RunCommandBuffer()
228 case fuzzing::Action::kCmdBufOp: { in RunCommandBuffer()
231 case fuzzing::InProcessCommandBufferOp::kGetLastState: { in RunCommandBuffer()
[all …]
/external/oss-fuzz/docs/clusterfuzzlite/
Drunning_clusterfuzzlite.md32 ### Code Review Fuzzing
34 TODO(metzman): Work on a generic name for CIFuzz/PR fuzzing.
36 One of the core ways for ClusterFuzzLite to be used is for fuzzing code that is
40 To use Code Review Fuzzing, set the configuration option `clusterfuzzlite-task`
44 Code Review Fuzzing.
46 If [Batch Fuzzing] is enabled, Code Review Fuzzing will report only newly
47 introduced bugs and use the corpus developed during batch fuzzing.
48 If [Code Coverage Reporting] is enabled, Code Review Fuzzing will try to only
51 ### Batch Fuzzing
53 ClusterFuzzLite can also run in a batch fuzzing mode where all fuzzers are run
[all …]
/external/flac/oss-fuzz/
Dreencoder.cc28 #include <fuzzing/datasource/datasource.hpp>
29 #include <fuzzing/memory.hpp>
42 // fuzzing::datasource::Datasource& ds;
44 FuzzerStream(fuzzing::datasource::Datasource&) : in FuzzerStream()
48 fuzzing::memory::memory_test(buffer, bytes); in write_callback()
56 fuzzing::datasource::Datasource& ds;
59 … FuzzerDecoder(fuzzing::datasource::Datasource& dsrc, FLAC::Encoder::FuzzerStream& encoder_arg) : in FuzzerDecoder()
98 fuzzing::memory::memory_test(&(frame->header), sizeof(frame->header)); in write_callback()
99 fuzzing::memory::memory_test(&(frame->footer), sizeof(frame->footer)); in write_callback()
106 fuzzing::memory::memory_test(buffer[i], bytesPerChannel); in write_callback()
[all …]
Dencoder.cc28 #include <fuzzing/datasource/datasource.hpp>
29 #include <fuzzing/memory.hpp>
38 // fuzzing::datasource::Datasource& ds;
40 FuzzerStream(fuzzing::datasource::Datasource&) : in FuzzerStream()
44 fuzzing::memory::memory_test(buffer, bytes); in write_callback()
59 fuzzing::datasource::Datasource ds(data, size); in LLVMFuzzerTestOneInput()
70 fuzzing::memory::memory_test(res); in LLVMFuzzerTestOneInput()
74 fuzzing::memory::memory_test(res); in LLVMFuzzerTestOneInput()
78 fuzzing::memory::memory_test(res); in LLVMFuzzerTestOneInput()
82 fuzzing::memory::memory_test(res); in LLVMFuzzerTestOneInput()
[all …]
Ddecoder.cc27 #include <fuzzing/datasource/datasource.hpp>
28 #include <fuzzing/memory.hpp>
34 template <> FLAC__MetadataType fuzzing::datasource::Base::Get<FLAC__MetadataType>(const uint64_t id… in Get()
64 fuzzing::datasource::Datasource& ds;
66 FuzzerStream(fuzzing::datasource::Datasource& dsrc) : in FuzzerStream()
96 fuzzing::memory::memory_test(&(frame->header), sizeof(frame->header)); in write_callback()
97 fuzzing::memory::memory_test(&(frame->footer), sizeof(frame->footer)); in write_callback()
104 fuzzing::memory::memory_test(buffer[i], bytesPerChannel); in write_callback()
117 fuzzing::memory::memory_test(status); in error_callback()
122 fuzzing::memory::memory_test(metadata->type); in metadata_callback()
[all …]
/external/libcxx/fuzzing/
Dfuzz_test.cpp11 // A simple program for running regressions on the fuzzing routines.
15 // clang++ -std=c++11 fuzz_test.cpp fuzzing.cpp
32 #include "fuzzing.h"
109 {"sort", fuzzing::sort},
110 {"stable_sort", fuzzing::stable_sort},
111 {"partition", fuzzing::partition},
112 {"partition_copy", fuzzing::partition_copy},
113 {"stable_partition", fuzzing::stable_partition},
114 {"unique", fuzzing::unique},
115 {"unique_copy", fuzzing::unique_copy},
[all …]
/external/tpm2-tss/doc/
Dfuzzing.md1 # Fuzzing chapter
6 Building fuzz tests can be enabled using the `--with-fuzzing=` option. For which
14 libFuzzer tests can be built natively or using the docker `fuzzing` target.
18 Build the fuzz tests by setting `--with-fuzzing=libfuzzer` and statically
19 linking to the fuzzing TCTI.
29 --with-fuzzing=libfuzzer \
30 --enable-tcti-fuzzing \
47 Build the fuzz targets and check that they work by building the `fuzzing` docker
51 docker build --target fuzzing -t tpm2-tss:fuzzing .
58 docker run --rm -ti tpm2-tss:fuzzing \
[all …]
/external/oss-fuzz/projects/lotus/
Dbuild.sh26 mkdir fuzzing
27 cp ../fuzzing-lotus/fuzz/fuzz.go fuzzing/
28 compile_go_fuzzer github.com/filecoin-project/lotus/fuzzing FuzzBlockMsg fuzz_block_msg || true
29 …compile_go_fuzzer github.com/filecoin-project/lotus/fuzzing FuzzBlockMsgStructural fuzz_block_msg_…
30 …compile_go_fuzzer github.com/filecoin-project/lotus/fuzzing FuzzBlockHeader fuzz_block_header || t…
31 …compile_go_fuzzer github.com/filecoin-project/lotus/fuzzing FuzzNodesForHeight fuzz_nodes_for_heig…
38 # Fuzzers from fuzzing-lotus
39 cd ../fuzzing-lotus/fuzz
41 go mod init github.com/filecoin-project/fuzzing-lotus/fuzz
43 compile_go_fuzzer github.com/filecoin-project/fuzzing-lotus/fuzz FuzzBlockMsg fuzz_block_msg
[all …]
/external/oss-fuzz/projects/powerdns/
Dbuild.sh27 # build fuzzing targets
40 # copy the fuzzing target binaries
44 cp ../regression-tests/zones/* ../fuzzing/corpus/zones/
47 if [ -d ../fuzzing/corpus/raw-dns-packets/ ]; then
48 zip -j "${OUT}/fuzz_target_dnsdistcache_seed_corpus.zip" ../fuzzing/corpus/raw-dns-packets/*
50 if [ -d ../fuzzing/corpus/txt-records/ ]; then
51 …zip -j "${OUT}/fuzz_target_dnslabeltext_parseRFC1035CharString_seed_corpus.zip" ../fuzzing/corpus/…
53 if [ -d ../fuzzing/corpus/raw-dns-packets/ ]; then
54 zip -j "${OUT}/fuzz_target_moadnsparser_seed_corpus.zip" ../fuzzing/corpus/raw-dns-packets/*
56 if [ -d ../fuzzing/corpus/raw-dns-packets/ ]; then
[all …]
/external/oss-fuzz/projects/quic-go/
Dbuild.sh23 compile_go_fuzzer github.com/marten-seemann/qpack/fuzzing Fuzz qpack_fuzzer
29 compile_go_fuzzer github.com/lucas-clemente/quic-go/fuzzing/frames Fuzz frame_fuzzer
30 compile_go_fuzzer github.com/lucas-clemente/quic-go/fuzzing/header Fuzz header_fuzzer
31 compile_go_fuzzer github.com/lucas-clemente/quic-go/fuzzing/transportparameters Fuzz transportparam…
32 compile_go_fuzzer github.com/lucas-clemente/quic-go/fuzzing/tokens Fuzz token_fuzzer
33 compile_go_fuzzer github.com/lucas-clemente/quic-go/fuzzing/handshake Fuzz handshake_fuzzer
40 go generate ./fuzzing/...
42 zip --quiet -r $OUT/header_fuzzer_seed_corpus.zip fuzzing/header/corpus
43 zip --quiet -r $OUT/frame_fuzzer_seed_corpus.zip fuzzing/frames/corpus
44 zip --quiet -r $OUT/transportparameter_fuzzer_seed_corpus.zip fuzzing/transportparameters/corpus
[all …]
/external/oss-fuzz/docs/reference/
Dglossary.md11 For general fuzzing terms, see the [glossary] from [google/fuzzing] project.
13 [glossary]: https://github.com/google/fuzzing/blob/master/docs/glossary.md
14 [google/fuzzing]: https://github.com/google/fuzzing
24 A scalable fuzzing infrastructure that is used for OSS-Fuzz backend.
34 [general definition](https://github.com/google/fuzzing/blob/master/docs/glossary.md#fuzz-target),
45 [project](#project), is run with a specific [fuzzing engine], in a specific
67 [fuzz targets]: https://github.com/google/fuzzing/blob/master/docs/glossary.md#fuzz-target
68 [fuzzing engine]: https://github.com/google/fuzzing/blob/master/docs/glossary.md#fuzzing-engine
69 [sanitizer]: https://github.com/google/fuzzing/blob/master/docs/glossary.md#sanitizer
70 [test input]: https://github.com/google/fuzzing/blob/master/docs/glossary.md#test-input
[all …]
/external/oss-fuzz/projects/sleuthkit/
Dbuildcorpus.sh23 # The Fuzzing Project: https://fuzzing-project.org/resources.html
33 ["ext"]="https://files.fuzzing-project.org/filesystems/ext2.img"
34fuzzing-project.org/filesystems/exfat.img https://files.fuzzing-project.org/filesystems/fat12.img …
35 ["hfs"]="https://files.fuzzing-project.org/filesystems/hfsplus.img"
36 ["iso9660"]="https://files.fuzzing-project.org/discimages/iso9660.iso"
37 ["ntfs"]="https://files.fuzzing-project.org/filesystems/ntfs.img"
42 ["dos"]="https://files.fuzzing-project.org/discimages/partition-dos"
43 ["gpt"]="https://files.fuzzing-project.org/discimages/partition-gpt"
44 ["mac"]="https://files.fuzzing-project.org/discimages/partition-mac"
/external/oss-fuzz/docs/
Dindex.md15 vulnerabilities and stability bugs by deploying [guided in-process fuzzing of
22 [guided in-process fuzzing of Chrome components]: https://security.googleblog.com/2016/08/guided-in…
26 combining modern fuzzing techniques with scalable, distributed execution.
31 We support the [libFuzzer], [AFL++], and [Honggfuzz] fuzzing engines in
42 languages supported by [LLVM] may work too. OSS-Fuzz supports fuzzing x86_64
47 ## Learn more about fuzzing
50 project. To learn more about fuzzing in general, we recommend reading [libFuzzer
51 tutorial] and the other docs in [google/fuzzing] repository. These and some
54 [google/fuzzing]: https://github.com/google/fuzzing/tree/master/docs
55 [libFuzzer tutorial]: https://github.com/google/fuzzing/blob/master/tutorial/libFuzzerTutorial.md
Dfaq.md15 ## Where can I learn more about fuzzing?
17 We recommend reading [libFuzzer tutorial] and the other docs in [google/fuzzing]
21 [google/fuzzing]: https://github.com/google/fuzzing/tree/master/docs
22 [libFuzzer tutorial]: https://github.com/google/fuzzing/blob/master/tutorial/libFuzzerTutorial.md
58 on. ClusterFuzz is an open-source fuzzing infrastructure that you can deploy in
74 Our [ClusterFuzz]({{ site.baseurl }}/further-reading/clusterfuzz) fuzzing
97 since they significantly reduce the efficiency of fuzzing.
99 Remember that fuzzing is executed with AddressSanitizer or other
141 fuzzing engine(s) are not able to go deeper based on the existing seeds.
143 - There is some crypto/crc stuff in the code that will prevent any fuzzing
[all …]
/external/oss-fuzz/
DREADME.md1 # OSS-Fuzz: Continuous Fuzzing for Open Source Software
6 vulnerabilities and stability bugs by deploying [guided in-process fuzzing of
13 [guided in-process fuzzing of Chrome components]: https://security.googleblog.com/2016/08/guided-in…
17 combining modern fuzzing techniques with scalable, distributed execution.
22 We support the [libFuzzer], [AFL++], and [Honggfuzz] fuzzing engines in
33 supported by [LLVM] may work too. OSS-Fuzz supports fuzzing x86_64 and i386
54 * 2016-12-01 - [Announcing OSS-Fuzz: Continuous fuzzing for open source software]
57 * 2020-10-09 - [Fuzzing internships for Open Source Software]
60 …S-Fuzz: Continuous fuzzing for open source software]: https://opensource.googleblog.com/2016/12/an…
63 [Fuzzing internships for Open Source Software]: https://security.googleblog.com/2020/10/fuzzing-int…
/external/tensorflow/tensorflow/security/fuzzing/
Dtf_fuzzing.bzl3 # TensorFlow fuzzing can be done in open source too.
8 # - dictionaries/${FUZZ}.dict : fuzzing dictionary for the fuzzer
13 # across multiple fuzzers (for example fuzzing ops), we can store it in other
15 # on a case by case basis, for now the ops fuzzing harness resides under
16 # tensorflow/core/kernels/fuzzing.
19 # mutators to do structure aware fuzzing) or any other type of content that is
22 # tf_cc_fuzz_target is a cc_test modified to include fuzzing support.
25 # Fuzzing specific arguments
60 deps: An optional list of dependencies for the code you're fuzzing.
83 # tf_py_fuzz_target is a py_test modified to include fuzzing support.
[all …]
/external/oss-fuzz/infra/build/functions/
Dupdate_build_status_test.py161 update_build_status.update_last_successful_build(project, 'fuzzing')
165 ndb.Key(LastSuccessfulBuild, 'test-project-fuzzing').get().build_id)
171 LastSuccessfulBuild(id='test-project-fuzzing',
172 build_tag='fuzzing',
177 update_build_status.update_last_successful_build(project, 'fuzzing')
197 LastSuccessfulBuild(id='test-project-fuzzing',
198 build_tag='fuzzing',
203 update_build_status.update_last_successful_build(project, 'fuzzing')
207 ndb.Key(LastSuccessfulBuild, 'test-project-fuzzing').get().build_id)
239 BuildsHistory(id='test-project-1-fuzzing',
[all …]

12345678910>>...37