Lines Matching full:fuzzer
12 # mode. To run secilc-fuzzer against a test case (named, say, CRASH) triggering an issue
16 # $ ./out/secilc-fuzzer CRASH
18 # To run the fuzzer against the corpus OSS-Fuzz has accumulated so far it should be
19 # downloaded, unpacked and passed to the fuzzer:
21 …m/selinux-backup.clusterfuzz-external.appspot.com/corpus/libFuzzer/selinux_secilc-fuzzer/public.zip
23 # $ ./out/secilc-fuzzer CORPUS/
32 …es-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=$SANITIZER -fsanitize=fuzzer-no-link"
43 export LIB_FUZZING_ENGINE=${LIB_FUZZING_ENGINE:--fsanitize=fuzzer}
52 ## secilc fuzzer ##
57 $CC $CFLAGS -c -o secilc-fuzzer.o libsepol/fuzz/secilc-fuzzer.c
59 $CXX $CXXFLAGS $LIB_FUZZING_ENGINE secilc-fuzzer.o "$DESTDIR/usr/lib/libsepol.a" -o "$OUT/secilc-fu…
63 ## binary policy fuzzer ##
68 $CC $CFLAGS -c -o binpolicy-fuzzer.o libsepol/fuzz/binpolicy-fuzzer.c
70 …CXX $CXXFLAGS $LIB_FUZZING_ENGINE binpolicy-fuzzer.o "$DESTDIR/usr/lib/libsepol.a" -o "$OUT/binpol…