| /external/oss-fuzz/infra/triage-party/ |
| D | oss-fuzz.yaml | 2 name: oss-fuzz 4 - https://github.com/google/oss-fuzz 7 - id: Fuzzing Issues 11 Status of issues across oss-fuzz repos 14 - fuzz-issue-updated-support 16 - fuzz-bugs 17 - fuzz-priority 19 - fuzz-many-reactions 20 - fuzz-many-commenters 21 - fuzz-issue-zombies [all …]
|
| /external/oss-fuzz/docs/advanced-topics/ |
| D | bug_fixing_guidance.md | 1 --- 5 permalink: /advanced-topics/bug-fixing-guidance 6 --- 12 OSS-Fuzz. 14 - TOC 18 In general the severity of an issue reported by OSS-Fuzz must be determined 20 the fuzzers OSS-Fuzz makes an effort into determining the severity of the bug 26 These are the top priority of solving. A label is attached to these on 27 the OSS-Fuzz testcase page and you can also search up all of these on monorail 28 using the search pattern `-Bug=security`. [all …]
|
| /external/grpc-grpc/src/core/lib/config/ |
| D | config_vars.yaml | 7 # http://www.apache.org/licenses/LICENSE-2.0 23 # Optionally, a force-load-on-access: true flag can be added to force checking 27 # Optionally, fuzz: true can be added to enable fuzzers to explore variations 28 # in this config var with their regular fuzzing work - or fuzz: FunctionName 29 … that the config space be explored, but FunctionName should be called to pre-format/validate the v… 32 - name: experiments 36 prefixed with a '-' to disable them. 39 fuzz: ValidateExperimentsStringForFuzzing 40 - name: client_channel_backup_poll_interval_ms 50 - name: dns_resolver [all …]
|
| /external/rust/crates/grpcio-sys/grpc/src/core/lib/config/ |
| D | config_vars.yaml | 7 # http://www.apache.org/licenses/LICENSE-2.0 23 # Optionally, a force-load-on-access: true flag can be added to force checking 27 # Optionally, fuzz: true can be added to enable fuzzers to explore variations 28 # in this config var with their regular fuzzing work - or fuzz: FunctionName 29 … that the config space be explored, but FunctionName should be called to pre-format/validate the v… 32 - name: experiments 36 prefixed with a '-' to disable them. 38 fuzz: ValidateExperimentsStringForFuzzing 39 - name: client_channel_backup_poll_interval_ms 49 - name: dns_resolver [all …]
|
| /external/cronet/testing/libfuzzer/ |
| D | README.md | 1 # Fuzz testing in Chromium 3 [go/chrome-fuzzing](https://goto.google.com/chrome-fuzzing) 5 [Fuzzing] is a testing technique that feeds auto-generated inputs to a piece 8 [go/fuzzing-success](http://go/fuzzing-success)). You can learn more about the 9 benefits of fuzzing at [go/why-fuzz](http://go/why-fuzz). 11 This documentation covers the in-process guided fuzzing approach employed by 13 out-of-process fuzzers, please refer to the [Blackbox fuzzing] page in the 20 In Chromium, you can easily create and submit fuzz targets. The targets are 24 You should fuzz any code which absorbs inputs from untrusted sources, such 26 it's an especially good idea to fuzz it. [all …]
|
| /external/angle/third_party/spirv-tools/src/source/fuzz/ |
| D | transformation_add_constant_composite.cpp | 7 // http://www.apache.org/licenses/LICENSE-2.0 15 #include "source/fuzz/transformation_add_constant_composite.h" 19 #include "source/fuzz/fuzzer_util.h" 22 namespace fuzz { namespace 25 spvtools::fuzz::protobufs::TransformationAddConstantComposite message) in TransformationAddConstantComposite() 47 ir_context->get_def_use_mgr()->GetDef(message_.type_id()); in IsApplicable() 52 // whether the given type really defines a composite and - in the case of a in IsApplicable() 53 // struct - whether its decorations are OK. in IsApplicable() 55 switch (composite_type_instruction->opcode()) { in IsApplicable() 62 composite_type_instruction->GetSingleWordInOperand(0)); in IsApplicable() [all …]
|
| /external/deqp-deps/SPIRV-Tools/source/fuzz/ |
| D | transformation_add_constant_composite.cpp | 7 // http://www.apache.org/licenses/LICENSE-2.0 15 #include "source/fuzz/transformation_add_constant_composite.h" 19 #include "source/fuzz/fuzzer_util.h" 22 namespace fuzz { namespace 25 spvtools::fuzz::protobufs::TransformationAddConstantComposite message) in TransformationAddConstantComposite() 47 ir_context->get_def_use_mgr()->GetDef(message_.type_id()); in IsApplicable() 52 // whether the given type really defines a composite and - in the case of a in IsApplicable() 53 // struct - whether its decorations are OK. in IsApplicable() 55 switch (composite_type_instruction->opcode()) { in IsApplicable() 62 composite_type_instruction->GetSingleWordInOperand(0)); in IsApplicable() [all …]
|
| /external/swiftshader/third_party/SPIRV-Tools/source/fuzz/ |
| D | transformation_add_constant_composite.cpp | 7 // http://www.apache.org/licenses/LICENSE-2.0 15 #include "source/fuzz/transformation_add_constant_composite.h" 19 #include "source/fuzz/fuzzer_util.h" 22 namespace fuzz { namespace 25 spvtools::fuzz::protobufs::TransformationAddConstantComposite message) in TransformationAddConstantComposite() 47 ir_context->get_def_use_mgr()->GetDef(message_.type_id()); in IsApplicable() 52 // whether the given type really defines a composite and - in the case of a in IsApplicable() 53 // struct - whether its decorations are OK. in IsApplicable() 55 switch (composite_type_instruction->opcode()) { in IsApplicable() 62 composite_type_instruction->GetSingleWordInOperand(0)); in IsApplicable() [all …]
|
| /external/openthread/tests/unit/ |
| D | test_spinel_buffer.cpp | 43 // This module implements unit-test for Spinel::Buffer class. 73 kNumPrios = 2, // Number of priority levels. 88 for (uint8_t priority = 0; priority < kNumPrios; priority++) in ClearTagHistory() local 90 sTagHistoryHead[priority] = sTagHistoryTail[priority]; in ClearTagHistory() 94 void AddTagToHistory(Spinel::Buffer::FrameTag aTag, Spinel::Buffer::Priority aPriority) in AddTagToHistory() 96 uint8_t priority = static_cast<uint8_t>(aPriority); in AddTagToHistory() local 98 sTagHistoryArray[priority][sTagHistoryTail[priority]] = aTag; in AddTagToHistory() 100 if (++sTagHistoryTail[priority] == kTagArraySize) in AddTagToHistory() 102 sTagHistoryTail[priority] = 0; in AddTagToHistory() 105 VerifyOrQuit(sTagHistoryTail[priority] != sTagHistoryHead[priority], in AddTagToHistory() [all …]
|
| /external/AFLplusplus/docs/ |
| D | env_variables.md | 14 Starting with AFL++ 3.0, there is only one compiler: afl-cc. 18 - Pass the --afl-MODE command-line option to the compiler. Only this option 19 accepts further AFL-specific command-line options. 20 - Use a symlink to afl-cc: afl-clang, afl-clang++, afl-clang-fast, 21 afl-clang-fast++, afl-clang-lto, afl-clang-lto++, afl-g++, afl-g++-fast, 22 afl-gcc, afl-gcc-fast. This option does not accept AFL-specific command-line 24 - Use the `AFL_CC_COMPILER` environment variable with `MODE`. To select 27 - `GCC` (afl-gcc/afl-g++) 28 - `GCC_PLUGIN` (afl-g*-fast) 29 - `LLVM` (afl-clang-fast*) [all …]
|
| /external/e2fsprogs/doc/RelNotes/ |
| D | v1.46.6.txt | 7 --------------- 12 Debugfs no longer prints a scary message when debugfs -c (which enables 30 ----- 32 Pre-v6.2 Linux kernels had long-standing bug in how the extended 33 attribute hash was calculated when there were non-ASCII characters in 42 Avoid triggering udev in dumpe2fs and "resize2fs -P" for file systems 43 with MMP enabled by opening the device read-only when reading the MMP 69 sure its exit status is non-zero if there is some failure. 74 Add additional bullet-proofing for very badly corrupted file systems. 76 bugs. (Addresses CVE-2022-1304) [all …]
|
| /external/webrtc/test/fuzzers/ |
| D | audio_processing_configs_fuzzer.cc | 4 * Use of this source code is governed by a BSD-style license 32 "WebRTC-Audio-Agc2ForceExtraSaturationMargin", 33 "WebRTC-Audio-Agc2ForceInitialSaturationMargin", 34 "WebRTC-Aec3MinErleDuringOnsetsKillSwitch", 35 "WebRTC-Aec3ShortHeadroomKillSwitch", 43 bool use_ts = fuzz_data->ReadOrDefaultValue(true); in CreateApm() 44 bool use_red = fuzz_data->ReadOrDefaultValue(true); in CreateApm() 45 bool use_hpf = fuzz_data->ReadOrDefaultValue(true); in CreateApm() 46 bool use_aec3 = fuzz_data->ReadOrDefaultValue(true); in CreateApm() 47 bool use_aec = fuzz_data->ReadOrDefaultValue(true); in CreateApm() [all …]
|
| /external/tcpdump/tests/ |
| D | TESTLIST | 1 # The options -# and -n are useless in TESTLIST. They are already set 6 # We cannot rely on, for example, "print-x.out" and 7 # "print-X.out" being different files - we might be running 8 # this on a case-insensitive file system, e.g. a Windows 9 # file system or a case-insensitive HFS+ file system on 12 # Therefore, for "X" and "XX", we have "print-capX.out" 13 # and "print-capXX.out". 15 print-x print-flags.pcap print-x.out -x 16 print-xx print-flags.pcap print-xx.out -xx 17 print-X print-flags.pcap print-capX.out -X [all …]
|
| /external/freetype/docs/oldlogs/ |
| D | ChangeLog.28 | 1 2017-09-16 Werner Lemberg <wl@gnu.org> 7 Tag sources with `VER-2-8-1'. 24 builds/wince/vc2005-ce/freetype.vcproj, 25 builds/wince/vc2005-ce/index.html, 26 builds/wince/vc2008-ce/freetype.vcproj, 27 builds/wince/vc2008-ce/index.html: s/2.8/2.8.1/, s/28/281/. 34 2017-09-13 suzuki toshiya <mpsuzuki@hiroshima-u.ac.jp> 38 __builtin_shuffle() was introduced in gcc-4.7. The lowest 41 * src/sfnt/pngshim.c (premultiply_data): Fix cpp-macro to 45 2017-09-13 suzuki toshiya <mpsuzuki@hiroshima-u.ac.jp> [all …]
|
| /external/grpc-grpc/test/core/transport/chttp2/ |
| D | hpack_sync_fuzzer.cc | 7 // http://www.apache.org/licenses/LICENSE-2.0 85 // Not an interesting case to fuzz in FuzzOneInput() 88 if (absl::EndsWith(header.literal_inc_idx().value(), "-bin")) { in FuzzOneInput() 99 if (absl::EndsWith(header.literal_not_idx().value(), "-bin")) { in FuzzOneInput() 121 ResourceQuota::Default()->memory_quota()->CreateMemoryAllocator( in FuzzOneInput() 122 "test-allocator"); in FuzzOneInput() 128 HPackParser::Priority::None, in FuzzOneInput() 133 encode_output.c_slice_at(i), i == (encode_output.Count() - 1), in FuzzOneInput() 148 const auto parser_size = parser.hpack_table()->test_only_table_size(); in FuzzOneInput() 150 const auto parser_elems = parser.hpack_table()->num_entries(); in FuzzOneInput()
|
| /external/webrtc/infra/config/ |
| D | config.star | 4 # Use of this source code is governed by a BSD-style license that can be 7 # https://chromium.googlesource.com/infra/luci/luci-go/+/main/lucicfg/doc/ 14 WEBRTC_GERRIT = "https://webrtc-review.googlesource.com/src" 15 WEBRTC_TROOPER_EMAIL = "webrtc-troopers-robots@google.com" 17 DEFAULT_CPU = "x86-64" 51 "metrics_project": "chromium-reclient-metrics", 74 "luci-analysis.cfg", 75 "commit-queue.cfg", 76 "cr-buildbucket.cfg", 77 "luci-logdog.cfg", [all …]
|
| /external/AFLplusplus/instrumentation/ |
| D | afl-llvm-common.cc | 20 #include "afl-llvm-common.h" 33 if (!BB->getName().empty()) { in getBBName() 35 name = strdup(BB->getName().str().c_str()); in getBBName() 45 BB->printAsOperand(OS, false); in getBBName() 57 // fuzzing campaign installations, e.g. oss-fuzz in isIgnoreFunction() 94 if (F->getName().startswith(ignoreListFunc)) { return true; } in isIgnoreFunction() 106 // that are part of user-written C++ functions like the ones including in isIgnoreFunction() 108 // mangled name of the user-written function in isIgnoreFunction() 111 // hexcoder: F->getName().contains() not avaiilable in llvm 3.8.0 in isIgnoreFunction() 112 if (StringRef::npos != F->getName().find(ignoreListFunc)) { return true; } in isIgnoreFunction() [all …]
|
| /external/AFLplusplus/src/ |
| D | afl-fuzz.c | 2 american fuzzy lop++ - fuzzer code 3 -------------------------------- 7 Now maintained by Marc Heuse <mh@mh-sec.de>, 12 Copyright 2019-2024 AFLplusplus Project. All rights reserved. 18 https://www.apache.org/licenses/LICENSE-2.0 26 #include "afl-fuzz.h" 50 s32 i, pid1 = 0, pid2 = 0, pgrp = -1; in at_exit() 124 "\n%s [ options ] -- /path/to/fuzzed_app [ ... ]\n\n" in usage() 127 " -i dir - input directory with test cases (or '-' to resume, " in usage() 130 " -o dir - output directory for fuzzer findings\n\n" in usage() [all …]
|
| /external/expat/expat/ |
| D | Changes | 12 !! in a timely manner or at all (loosely ordered by descending priority): !! 14 !! - <blink>fixing a complex non-public security issue</blink>, !! 15 !! - teaming up on researching and fixing future security reports and !! 16 !! ClusterFuzz findings with few-days-max response times in communication !! 19 !! - implementing and auto-testing XML 1.0r5 support !! 21 !! - smart ideas on fixing the Autotools CMake files generation issue !! 23 !! - the Windows binaries topic (needs requirements engineering first), !! 24 !! - pushing migration from `int` to `size_t` further !! 25 !! including edge-cases test coverage (needs discussion before anything). !! 27 !! For details, please reach out via e-mail to sebastian@pipping.org so we !! [all …]
|
| /external/oss-fuzz/projects/dnsmasq/ |
| D | fuzz_header.h | 5 http://www.apache.org/licenses/LICENSE-2.0 24 // during a fuzz run. 52 *size -= STR_SIZE; in get_null_terminated() 67 *size -= to_get; in gb_get_random_data() 93 *size-=1; in get_short() 102 *size -= 4; in get_int() 125 return -1; in fuzz_ioctl() 136 return -1; in fuzz_ioctl() 140 ifr->ifr_name[i] = (char)*syscall_data; in fuzz_ioctl() 142 syscall_size -= 1; in fuzz_ioctl() [all …]
|
| /external/toybox/android/linux/generated/ |
| D | help.h | 1 …-libc on a nommu system, you'll need to say \"y\" here\nunless you used the patch in the mcm-build… 9 … even when it has a built-in version of that command. This requires\n toybox symlinks to be … 13 #define HELP_toybox_zhelp "Compress help with gzip -9, deflating when displayed. This makes the\nbi… 15 …t --help argument in all commands, even ones with a NULL\noptstring. (Use TOYFLAG_NOHELP to disabl… 23 #define HELP_toybox_libcrypto "Use faster hash functions out of external -lcrypto library." 27 #define HELP_toybox_selinux "Include SELinux options in commands such as ls, and add\nSELinux-speci… 33 …--long | --help | --version | [COMMAND] [ARGUMENTS...]]\n\nWith no arguments, \"toybox\" shows ava… 41 …-D] [-F] [-R] [-n] [-v] FILE...\n\nRestores the default security contexts for the given files.\n\n… 43 …-p PRI] [-t TAG] [MESSAGE...]\n\nLogs message (or stdin) to logcat.\n\n-p Use the given priority i… 49 #define HELP_skeleton_alias "usage: skeleton_alias [-dq] [-b NUMBER]\n\nExample of a second command… [all …]
|
| /external/toybox/android/mac/generated/ |
| D | help.h | 1 …-libc on a nommu system, you'll need to say \"y\" here\nunless you used the patch in the mcm-build… 9 … even when it has a built-in version of that command. This requires\n toybox symlinks to be … 13 #define HELP_toybox_zhelp "Compress help with gzip -9, deflating when displayed. This makes the\nbi… 15 …t --help argument in all commands, even ones with a NULL\noptstring. (Use TOYFLAG_NOHELP to disabl… 23 #define HELP_toybox_libcrypto "Use faster hash functions out of external -lcrypto library." 27 #define HELP_toybox_selinux "Include SELinux options in commands such as ls, and add\nSELinux-speci… 33 …--long | --help | --version | [COMMAND] [ARGUMENTS...]]\n\nWith no arguments, \"toybox\" shows ava… 41 …-D] [-F] [-R] [-n] [-v] FILE...\n\nRestores the default security contexts for the given files.\n\n… 43 …-p PRI] [-t TAG] [MESSAGE...]\n\nLogs message (or stdin) to logcat.\n\n-p Use the given priority i… 49 #define HELP_skeleton_alias "usage: skeleton_alias [-dq] [-b NUMBER]\n\nExample of a second command… [all …]
|
| /external/toybox/android/device/generated/ |
| D | help.h | 1 …-libc on a nommu system, you'll need to say \"y\" here\nunless you used the patch in the mcm-build… 9 … even when it has a built-in version of that command. This requires\n toybox symlinks to be … 13 #define HELP_toybox_zhelp "Compress help with gzip -9, deflating when displayed. This makes the\nbi… 15 …t --help argument in all commands, even ones with a NULL\noptstring. (Use TOYFLAG_NOHELP to disabl… 23 #define HELP_toybox_libcrypto "Use faster hash functions out of external -lcrypto library." 27 #define HELP_toybox_selinux "Include SELinux options in commands such as ls, and add\nSELinux-speci… 33 …--long | --help | --version | [COMMAND] [ARGUMENTS...]]\n\nWith no arguments, \"toybox\" shows ava… 41 …-D] [-F] [-R] [-n] [-v] FILE...\n\nRestores the default security contexts for the given files.\n\n… 43 …-p PRI] [-t TAG] [MESSAGE...]\n\nLogs message (or stdin) to logcat.\n\n-p Use the given priority i… 49 #define HELP_skeleton_alias "usage: skeleton_alias [-dq] [-b NUMBER]\n\nExample of a second command… [all …]
|
| /external/snakeyaml/src/changes/ |
| D | changes.xml | 2 xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 3 …apache.org/changes/1.0.0 http://maven.apache.org/plugins/maven-changes-plugin/xsd/changes-1.0.0.xs… 8 <release version="1.32" date="2022-09-12" description="Maintenance"> 18 …: https://stackoverflow.com/questions/49712148/maven-plugin-for-auto-formatting-code-to-match-goog… 19 … Format: https://raw.githubusercontent.com/google/styleguide/gh-pages/eclipse-java-google-style.xml 20 Activation: ./mvnw clean install site -Preformat 23 … Support unescaped unicode characters for double-quoted scalars (thanks to Florian Waltenberger) 26 <release version="1.31" date="2022-08-27" description="Maintenance"> 31 Fix false positive CVE-2020-13936 (thanks to Gaétan Collaud) 38 to avoid possible attack when RE takes too many resources (detected by OSS-Fuzz) [all …]
|
| /external/grpc-grpc/doc/ |
| D | interop-test-descriptions.md | 6 and the [gRPC over HTTP/2 v2 protocol](./PROTOCOL-HTTP2.md). 9 ------ 12 provided the test case it is expected to run as a command-line parameter. Names 16 * --server_host=HOSTNAME 18 * --server_host_override=HOSTNAME 20 :authority header. If unspecified, the value of --server_host will be 22 * --server_port=PORT 24 * --test_case=TESTCASE 26 * --use_tls=BOOLEAN 28 * --use_test_ca=BOOLEAN [all …]
|