Home
last modified time | relevance | path

Searched full:fuzzer (Results 1 – 25 of 1752) sorted by relevance

12345678910>>...71

/external/oss-fuzz/projects/llvm/
Dbuild.sh20 clang-fuzzer \
21 clang-format-fuzzer \
22 clang-objc-fuzzer \
23 clangd-fuzzer \
24 llvm-itanium-demangle-fuzzer \
25 llvm-microsoft-demangle-fuzzer \
26 llvm-dwarfdump-fuzzer \
27 llvm-isel-fuzzer \
28 llvm-special-case-list-fuzzer \
29 llvm-opt-fuzzer \
[all …]
/external/cronet/third_party/boringssl/src/fuzz/
DCMakeLists.txt1 macro(fuzzer name) macro
6 set_target_properties(${name} PROPERTIES LINK_FLAGS "-fsanitize=fuzzer-no-link")
7 target_link_libraries(${name} Fuzzer)
9 set_target_properties(${name} PROPERTIES LINK_FLAGS "-fsanitize=fuzzer")
19 fuzzer(arm_cpuinfo)
20 fuzzer(bn_div)
21 fuzzer(bn_mod_exp)
22 fuzzer(cert)
23 fuzzer(client ssl)
24 fuzzer(conf)
[all …]
/external/oss-fuzz/infra/cifuzz/test_data/
Dmsan_crash_fuzzer_bug_summary.txt3 #1 0x45a431 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-proje…
4fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_…
5fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::Si…
6 #4 0x44a4bc in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /s…
7 #5 0x474432 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10
11fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long)--fuzzer::Fuzzer::ReadAndExecu…
15fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_…
16fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::Si…
17 #4 0x44a4bc in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /s…
18 #5 0x474432 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10
[all …]
Dmsan_crash_fuzzer_output.txt10 #1 0x45a431 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-proje…
11fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_…
12fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::Si…
13 #4 0x44a4bc in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /s…
14 #5 0x474432 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10
18fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long)--fuzzer::Fuzzer::ReadAndExecu…
22fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_…
23fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::Si…
24 #4 0x44a4bc in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /s…
25 #5 0x474432 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10
[all …]
Dexample_crash_fuzzer_bug_summary.txt14 …#10 0x45a3b1 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-pro…
15 …459ad5 in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bo…
16 …#12 0x45be77 in fuzzer::Fuzzer::MutateAndTestOne() /src/llvm-project/compiler-rt/lib/fuzzer/Fuzzer…
17fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::Si…
18 …14 0x44ac88 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /…
19 #15 0x474ab2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:19:10
27 …459ad5 in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bo…
28 …#3 0x45be77 in fuzzer::Fuzzer::MutateAndTestOne() /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerL…
29fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::Si…
30 …#5 0x44ac88 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /…
[all …]
Dexample_crash_fuzzer_output.txt1 2020-02-05 17:50:20,470 - root - INFO - Fuzzer dex_fuzzer, detected error: INFO: Seed: 1337
38 …#10 0x45a3b1 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-pro…
39 …459ad5 in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bo…
40 …#12 0x45be77 in fuzzer::Fuzzer::MutateAndTestOne() /src/llvm-project/compiler-rt/lib/fuzzer/Fuzzer…
41fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::Si…
42 …14 0x44ac88 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /…
43 #15 0x474ab2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:19:10
51 …459ad5 in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bo…
52 …#3 0x45be77 in fuzzer::Fuzzer::MutateAndTestOne() /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerL…
53fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::Si…
[all …]
/external/oss-fuzz/projects/bignum-fuzzer/
Dbuild.sh42 cd $SRC/bignum-fuzzer/modules/openssl
46 cd $SRC/bignum-fuzzer/modules/go
50 #cd $SRC/bignum-fuzzer/modules/rust
54 cd $SRC/bignum-fuzzer/modules/cpp_boost
58 cd $SRC/bignum-fuzzer/modules/libgmp
62 cd $SRC/bignum-fuzzer/modules/libmpdec
67 # Build OpenSSL/Go fuzzer
68 cd $SRC/bignum-fuzzer
73 # Copy OpenSSL/Go fuzzer to the designated location
74 cp $SRC/bignum-fuzzer/fuzzer $OUT/fuzzer_openssl_go_no_negative_num_len_1200_all_operations
[all …]
/external/rust/crates/quiche/deps/boringssl/src/fuzz/
DCMakeLists.txt5 macro(fuzzer name) macro
10 set_target_properties(${name} PROPERTIES LINK_FLAGS "-fsanitize=fuzzer-no-link")
11 target_link_libraries(${name} Fuzzer)
13 set_target_properties(${name} PROPERTIES LINK_FLAGS "-fsanitize=fuzzer")
17 fuzzer(arm_cpuinfo)
18 fuzzer(bn_mod_exp)
19 fuzzer(bn_div)
20 fuzzer(privkey)
21 fuzzer(cert)
22 fuzzer(spki)
[all …]
/external/boringssl/src/ssl/test/runner/
Dfuzzer_mode.json3 "BadCBCPadding*": "Fuzzer mode has no CBC padding.",
5 "*BadFinished*": "Fuzzer mode ignores Finished checks.",
6 "TrailingMessageData-*Finished*": "Fuzzer mode ignores Finished checks.",
8 "DTLSIgnoreBadPackets*": "Fuzzer mode has no bad packets.",
9 "TLSFatalBadPackets": "Fuzzer mode has no bad packets.",
10 "*-BadRecord*": "Fuzzer mode has no bad packets.",
12 "BadRSAClientKeyExchange*": "Fuzzer mode does not notice a bad premaster secret.",
14 …"TrailingMessageData-TLS13-ServerHello-*": "Fuzzer mode will not read the peer's alert as a MAC er…
15 …"UnexpectedUnencryptedExtension-Client-TLS13": "Fuzzer mode will not read the peer's alert as a MA…
16 …"UnknownUnencryptedExtension-Client-TLS13": "Fuzzer mode will not read the peer's alert as a MAC e…
[all …]
/external/cronet/third_party/boringssl/src/ssl/test/runner/
Dfuzzer_mode.json3 "BadCBCPadding*": "Fuzzer mode has no CBC padding.",
5 "*BadFinished*": "Fuzzer mode ignores Finished checks.",
6 "TrailingMessageData-*Finished*": "Fuzzer mode ignores Finished checks.",
8 "DTLSIgnoreBadPackets*": "Fuzzer mode has no bad packets.",
9 "TLSFatalBadPackets": "Fuzzer mode has no bad packets.",
10 "*-BadRecord*": "Fuzzer mode has no bad packets.",
12 "BadRSAClientKeyExchange*": "Fuzzer mode does not notice a bad premaster secret.",
14 …"TrailingMessageData-TLS13-ServerHello-*": "Fuzzer mode will not read the peer's alert as a MAC er…
15 …"UnexpectedUnencryptedExtension-Client-TLS13": "Fuzzer mode will not read the peer's alert as a MA…
16 …"UnknownUnencryptedExtension-Client-TLS13": "Fuzzer mode will not read the peer's alert as a MAC e…
[all …]
/external/oss-fuzz/infra/base-images/base-runner/
Dbad_build_check68 local FUZZER=$1
69 local FUZZER_NAME=$(basename $FUZZER)
75 $FUZZER -seed=1337 -runs=$MIN_NUMBER_OF_RUNS &>$FUZZER_OUTPUT
78 echo "BAD BUILD: $FUZZER does not seem to have coverage instrumentation."
90 echo "BAD BUILD: $FUZZER seems to have only partial coverage instrumentation."
96 echo "BAD BUILD: fuzzing $FUZZER with afl-fuzz failed."
104 echo "BAD BUILD: fuzzing $FUZZER with honggfuzz failed."
109 $FUZZER &> $FUZZER_OUTPUT
113 echo "BAD BUILD: $FUZZER does not seem to be properly built in 'dataflow' config."
126 local FUZZER=$1
[all …]
/external/jazzer-api/src/main/java/com/code_intelligence/jazzer/api/
DFuzzedDataProvider.java24 * A convenience wrapper turning the raw fuzzer input bytes into Java primitive types.
27 * returned values depending deterministically on the fuzzer input for the current run.
31 * Consumes a {@code boolean} from the fuzzer input.
38 * Consumes a {@code boolean} array from the fuzzer input.
39 * <p>The array will usually have length {@code length}, but might be shorter if the fuzzer input
48 * Consumes a {@code byte} from the fuzzer input.
55 * Consumes a {@code byte} between {@code min} and {@code max} from the fuzzer input.
64 * Consumes a {@code byte} array from the fuzzer input.
65 * <p>The array will usually have length {@code length}, but might be shorter if the fuzzer input
74 * Consumes the remaining fuzzer input as a {@code byte} array.
[all …]
/external/harfbuzz_ng/test/fuzzing/
DMakefile.am19 # EXTRA_DIST hb-repacker-fuzzer.cc
23 hb-repacker-fuzzer.cc \
24 run-shape-fuzzer-tests.py \
25 run-subset-fuzzer-tests.py \
26 run-draw-fuzzer-tests.py \
27 run-repacker-fuzzer-tests.py \
35 hb-shape-fuzzer \
36 hb-subset-fuzzer \
37 hb-set-fuzzer \
38 hb-draw-fuzzer \
[all …]
/external/deqp-deps/SPIRV-Tools/source/fuzz/
Dfuzzer.h37 // running a number of randomized fuzzer passes.
38 class Fuzzer {
40 // Possible statuses that can result from running the fuzzer.
58 Fuzzer(std::unique_ptr<opt::IRContext> ir_context,
69 Fuzzer(const Fuzzer&) = delete;
70 Fuzzer(Fuzzer&&) = delete;
71 Fuzzer& operator=(const Fuzzer&) = delete;
72 Fuzzer& operator=(Fuzzer&&) = delete;
74 ~Fuzzer();
76 // Transforms |ir_context_| by running a number of randomized fuzzer passes.
[all …]
/external/angle/third_party/spirv-tools/src/source/fuzz/
Dfuzzer.h37 // running a number of randomized fuzzer passes.
38 class Fuzzer {
40 // Possible statuses that can result from running the fuzzer.
58 Fuzzer(std::unique_ptr<opt::IRContext> ir_context,
69 Fuzzer(const Fuzzer&) = delete;
70 Fuzzer(Fuzzer&&) = delete;
71 Fuzzer& operator=(const Fuzzer&) = delete;
72 Fuzzer& operator=(Fuzzer&&) = delete;
74 ~Fuzzer();
76 // Transforms |ir_context_| by running a number of randomized fuzzer passes.
[all …]
/external/swiftshader/third_party/SPIRV-Tools/source/fuzz/
Dfuzzer.h37 // running a number of randomized fuzzer passes.
38 class Fuzzer {
40 // Possible statuses that can result from running the fuzzer.
58 Fuzzer(std::unique_ptr<opt::IRContext> ir_context,
69 Fuzzer(const Fuzzer&) = delete;
70 Fuzzer(Fuzzer&&) = delete;
71 Fuzzer& operator=(const Fuzzer&) = delete;
72 Fuzzer& operator=(Fuzzer&&) = delete;
74 ~Fuzzer();
76 // Transforms |ir_context_| by running a number of randomized fuzzer passes.
[all …]
/external/selinux/scripts/
Doss-fuzz.sh12 # mode. To run secilc-fuzzer against a test case (named, say, CRASH) triggering an issue
16 # $ ./out/secilc-fuzzer CRASH
18 # To run the fuzzer against the corpus OSS-Fuzz has accumulated so far it should be
19 # downloaded, unpacked and passed to the fuzzer:
21 …m/selinux-backup.clusterfuzz-external.appspot.com/corpus/libFuzzer/selinux_secilc-fuzzer/public.zip
23 # $ ./out/secilc-fuzzer CORPUS/
32 …es-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=$SANITIZER -fsanitize=fuzzer-no-link"
43 export LIB_FUZZING_ENGINE=${LIB_FUZZING_ENGINE:--fsanitize=fuzzer}
52 ## secilc fuzzer ##
57 $CC $CFLAGS -c -o secilc-fuzzer.o libsepol/fuzz/secilc-fuzzer.c
[all …]
/external/oss-fuzz/projects/libwebp/
Dbuild.sh55 for fuzzer in "${webp_c_fuzzers[@]}"; do
56 $CC $CFLAGS -Isrc -I. tests/fuzzer/${fuzzer}.c -c -o tests/fuzzer/${fuzzer}.o
58 tests/fuzzer/${fuzzer}.o -o $OUT/${fuzzer} \
62 for fuzzer in "${webp_cxx_fuzzers[@]}"; do
64 tests/fuzzer/${fuzzer}.cc -o $OUT/${fuzzer} \
68 for fuzzer in "${webp_c_fuzzers[@]}" "${webp_cxx_fuzzers[@]}"; do
69 cp fuzz_seed_corpus.zip $OUT/${fuzzer}_seed_corpus.zip
70 cp tests/fuzzer/fuzz.dict $OUT/${fuzzer}.dict
/external/oss-fuzz/projects/skia/
DDockerfile35 …e_filter_deserialize_seed_corpus.zip https://storage.googleapis.com/skia-fuzzer/oss-fuzz/image_fil…
37 …data/region_set_path_seed_corpus.zip https://storage.googleapis.com/skia-fuzzer/oss-fuzz/region_se…
39 …textblob_deserialize_seed_corpus.zip https://storage.googleapis.com/skia-fuzzer/oss-fuzz/textblob_…
41 …ata/path_deserialize_seed_corpus.zip https://storage.googleapis.com/skia-fuzzer/oss-fuzz/path_dese…
43 RUN wget -O $SRC/skia_data/image_decode_seed_corpus.zip https://storage.googleapis.com/skia-fuzzer/…
45 …nimated_image_decode_seed_corpus.zip https://storage.googleapis.com/skia-fuzzer/oss-fuzz/animated_…
47 …a/api_draw_functions_seed_corpus.zip https://storage.googleapis.com/skia-fuzzer/oss-fuzz/api_draw_…
49 RUN wget -O $SRC/skia_data/api_gradients_seed_corpus.zip https://storage.googleapis.com/skia-fuzzer
51 …ata/api_image_filter_seed_corpus.zip https://storage.googleapis.com/skia-fuzzer/oss-fuzz/api_image…
53 …ata/api_path_measure_seed_corpus.zip https://storage.googleapis.com/skia-fuzzer/oss-fuzz/api_path_…
[all …]
/external/openthread/tests/fuzz/
DCMakeLists.txt52 add_executable(ot-cli-received-fuzzer
57 target_compile_options(ot-cli-received-fuzzer
62 target_include_directories(ot-cli-received-fuzzer
67 target_link_libraries(ot-cli-received-fuzzer
73 add_executable(ot-ip6-send-fuzzer
78 target_compile_options(ot-ip6-send-fuzzer
83 target_include_directories(ot-ip6-send-fuzzer
88 target_link_libraries(ot-ip6-send-fuzzer
93 add_executable(ot-radio-receive-done-fuzzer
98 target_compile_options(ot-radio-receive-done-fuzzer
[all …]
/external/skia/fuzz/
DREADME.md3 randomly, focusing on specific APIs). For example, we have a codec fuzzer which takes a mutated
4 png/jpeg or similar file and attempts to turn it into an `SkImage`. We also have a canvas fuzzer
9 that contains all fuzzers and is a convenient way to reproduce fuzzer-reported bugs. There are also
10 single fuzzer executables containing exactly one fuzzer, which are convenient to build with
28 When enabling a fuzzer in OSS-Fuzz, we typically need to follow these steps:
29 1. *Add a seed corpus to `gs://skia-fuzzer/oss-fuzz/` (in the
30 …[skia-public project](https://console.cloud.google.com/storage/browser/skia-fuzzer?project=skia-pu…
37 to build the desired fuzzer target and move it into $OUT. If there is a seed corpus, move
38 it into $OUT and make sure it is the same name as the fuzzer executable with `_seed_corpus.zip`
53 <https://oss-fuzz.com/fuzzer-stats> is useful to see metrics on how our fuzzers are running. It
[all …]
/external/pigweed/pw_allocator/
Dfuzzing.cc23 return fuzzer::InRange<size_t>(0, max_size); in ArbitrarySize()
27 return fuzzer::Map( in ArbitraryAlignment()
29 fuzzer::Arbitrary<size_t>()); in ArbitraryAlignment()
32 auto ArbitraryIndex() { return fuzzer::Arbitrary<size_t>(); } in ArbitraryIndex()
34 fuzzer::Domain<AllocationRequest> ArbitraryAllocationRequest(size_t max_size) { in ArbitraryAllocationRequest()
36 return fuzzer::StructOf<AllocationRequest>(fuzzer::Just(size), in ArbitraryAllocationRequest()
39 return fuzzer::FlatMap(from_size, ArbitrarySize(max_size)); in ArbitraryAllocationRequest()
42 fuzzer::Domain<DeallocationRequest> ArbitraryDeallocationRequest() { in ArbitraryDeallocationRequest()
43 return fuzzer::StructOf<DeallocationRequest>(ArbitraryIndex()); in ArbitraryDeallocationRequest()
46 fuzzer::Domain<ReallocationRequest> ArbitraryReallocationRequest( in ArbitraryReallocationRequest()
[all …]
/external/libsrtp2/fuzzer/
DMakefile.in1 # Makefile for libSRTP fuzzer
22 all : srtp-fuzzer
26 fuzzer.o: fuzzer.c fuzzer.h testmem.h
27 $(COMPILE) fuzzer.c -c -o fuzzer.o
30 srtp-fuzzer: fuzzer.o mt19937.o testmem.o
31 …$(COMPILECXX) -L. -L.. fuzzer.o mt19937.o testmem.o $(LIBFUZZER) $(CRYPTOLIB) $(LIBS) -o srtp-fuzz…
34 rm -rf srtp-fuzzer *.o
/external/libxml2/fuzz/
DMakefile.am49 # XML fuzzer
57 xml_LDFLAGS = $(AM_LDFLAGS) -fsanitize=fuzzer
67 # DTD validation fuzzer
75 valid_LDFLAGS = $(AM_LDFLAGS) -fsanitize=fuzzer
85 # XInclude fuzzer
93 xinclude_LDFLAGS = $(AM_LDFLAGS) -fsanitize=fuzzer
103 # HTML fuzzer
111 html_LDFLAGS = $(AM_LDFLAGS) -fsanitize=fuzzer
121 # Reader fuzzer
129 reader_LDFLAGS = $(AM_LDFLAGS) -fsanitize=fuzzer
[all …]
/external/llvm/lib/Fuzzer/
DFuzzerLoop.cpp1 //===- FuzzerLoop.cpp - Fuzzer's main loop --------------------------------===//
9 // Fuzzer's main loop.
34 namespace fuzzer { namespace
37 thread_local bool Fuzzer::IsMyThread;
52 // Only one Fuzzer per process.
53 static Fuzzer *F;
68 static void Prepare(const FuzzingOptions &Options, Fuzzer::Coverage *C) { in Prepare()
77 static bool RecordMax(const FuzzingOptions &Options, Fuzzer::Coverage *C) { in RecordMax()
146 Fuzzer::Fuzzer(UserCallback CB, MutationDispatcher &MD, FuzzingOptions Options) in Fuzzer() function in fuzzer::Fuzzer
158 void Fuzzer::LazyAllocateCurrentUnitData() { in LazyAllocateCurrentUnitData()
[all …]

12345678910>>...71