Home
last modified time | relevance | path

Searched +full:jazzer +full:- (Results 1 – 25 of 449) sorted by relevance

12345678910>>...18

/external/jazzer-api/src/main/java/com/code_intelligence/jazzer/
DBUILD.bazel10 main_class = "com.code_intelligence.jazzer.Jazzer",
17 "//deploy:jazzer-api",
22 name = "jazzer",
23 out = "jazzer.jar",
26 "com/code_intelligence/jazzer/**",
28 "META-INF/MANIFEST.MF",
29 "win32-x86/**",
30 "win32-x86-64/**",
43 jars = [":jazzer"],
45 deps = ["//deploy:jazzer-api"],
[all …]
DJazzer.java8 * http://www.apache.org/licenses/LICENSE-2.0
17 package com.code_intelligence.jazzer;
19 import static com.code_intelligence.jazzer.runtime.Constants.IS_ANDROID;
27 import com.code_intelligence.jazzer.android.AndroidRuntime;
28 import com.code_intelligence.jazzer.driver.Driver;
29 import com.code_intelligence.jazzer.utils.Log;
30 import com.code_intelligence.jazzer.utils.ZipUtils;
56 * The libFuzzer-compatible CLI entrypoint for Jazzer.
58 * <p>Arguments to Jazzer are passed as command-line arguments or {@code jazzer.*} system
59 * properties. For example, setting the property {@code jazzer.target_class} to
[all …]
/external/jazzer-api/deploy/
DBUILD.bazel26 name = "jazzer-api",
29 "-link",
35 pom_template = "//deploy:jazzer-api.pom",
37 runtime_deps = ["//src/main/java/com/code_intelligence/jazzer/api"],
41 name = "jazzer",
43 pom_template = "jazzer.pom",
44 # Do not generate an implicit javadocs target - the current target is based on the shaded deploy
46 tags = ["no-javadocs"],
49 "//src/main/java/com/code_intelligence/jazzer:jazzer_import",
54 name = "jazzer-docs",
[all …]
Ddeploy.sh8 # http://www.apache.org/licenses/LICENSE-2.0
16 set -eu
27 [ -z "${MAVEN_USER+x}" ] && \
29 [ -z "${MAVEN_PASSWORD+x}" ] && \
31 [ -z "${JAZZER_JAR_PATH+x}" ] && \
32 …fail "Set JAZZER_JAR_PATH to the absolute path of jazzer.jar obtained from the release GitHub Acti…
33 [ ! -f "${JAZZER_JAR_PATH}" ] && \
38 # The Jazzer jar itself bundles native libraries for multiple architectures and thus can't be built
40 bazel build //deploy:jazzer-docs //deploy:jazzer-sources //deploy:jazzer-pom
42 JAZZER_DOCS_PATH=$PWD/$(bazel cquery --output=files //deploy:jazzer-docs)
[all …]
/external/jazzer-api/
DREADME.md2 …ttps://code-intelligence.com"><img src="https://www.code-intelligence.com/hubfs/Logos/CI%20Logos/J…
4 <h1>Jazzer</h1>
6 <a href="https://github.com/CodeIntelligenceTesting/jazzer/releases">
7 … <img src="https://img.shields.io/github/v/release/CodeIntelligenceTesting/jazzer" alt="Releases">
9 <a href="https://search.maven.org/search?q=g:com.code-intelligence%20a:jazzer">
10 …<img src="https://img.shields.io/maven-central/v/com.code-intelligence/jazzer" alt="Maven Central">
12 …<a href="https://github.com/CodeIntelligenceTesting/jazzer/actions/workflows/run-all-tests.yml?que…
13 …mg.shields.io/github/actions/workflow/status/CodeIntelligenceTesting/jazzer/run-all-tests.yml?bran…
15 <a href="https://github.com/CodeIntelligenceTesting/jazzer/blob/main/LICENSE">
16 <img src="https://img.shields.io/github/license/CodeIntelligenceTesting/jazzer" alt="License">
[all …]
DCONTRIBUTING.md1 ## Building Jazzer from source
5 Jazzer has the following dependencies when being built from source:
9 * [Clang](https://clang.llvm.org/) 9.0+ (clang-cl on Windows)
11 * GCC (should work with `--repo_env=CC=gcc`, but is not tested)
15 The instructions below will assume that this binary is called `bazel` - Bazelisk is a thin wrapper …
19 Assuming the dependencies are installed, build Jazzer from source and run it as follows:
22 $ git clone https://github.com/CodeIntelligenceTesting/jazzer
23 $ cd jazzer
24 # Note the double dash used to pass <arguments> to Jazzer rather than Bazel.
25 $ bazel run //:jazzer -- <arguments>
[all …]
/external/jazzer-api/src/main/java/com/code_intelligence/jazzer/runtime/
DBUILD.bazel7 # of the bootstrap class loader. They will be visible to all classes - care must
18 visibility = ["//src/main/java/com/code_intelligence/jazzer:__pkg__"],
27 # passed to the `deploy_env` attribute of the Jazzer `java_binary` to ensure that
32 visibility = ["//src/main/java/com/code_intelligence/jazzer:__pkg__"],
34 "//src/main/java/com/code_intelligence/jazzer/api:hooks",
35 "//src/main/java/com/code_intelligence/jazzer/utils:unsafe_provider",
50 "com/code_intelligence/jazzer/**",
52 "META-INF/MANIFEST.MF",
55 "//src/main/java/com/code_intelligence/jazzer/agent:__pkg__",
56 "//src/main/java/com/code_intelligence/jazzer/android:__pkg__",
[all …]
/external/jazzer-api/src/test/java/com/code_intelligence/jazzer/instrumentor/
DBUILD.bazel22 "//src/main/java/com/code_intelligence/jazzer/instrumentor:instrumentor",
24 test_class = "com.code_intelligence.jazzer.instrumentor.TraceDataFlowInstrumentationTest",
27 "@com_github_jetbrains_kotlin//:kotlin-test",
42 "//src/main/java/com/code_intelligence/jazzer/instrumentor:instrumentor",
44 test_class = "com.code_intelligence.jazzer.instrumentor.CoverageInstrumentationTest",
47 "//src/main/java/com/code_intelligence/jazzer/runtime:coverage_map",
48 "@com_github_jetbrains_kotlin//:kotlin-test",
60 "//src/main/java/com/code_intelligence/jazzer/instrumentor:instrumentor",
62 test_class = "com.code_intelligence.jazzer.instrumentor.DescriptorUtilsTest",
64 "@com_github_jetbrains_kotlin//:kotlin-test",
[all …]
/external/jazzer-api/examples/junit-spring-web/
Dbuild-and-run-tests.sh8 # http://www.apache.org/licenses/LICENSE-2.0
16 # Development-only. This script builds the example project against the local version of Jazzer,
19 set -e
24 # Update jazzer version used for building this project in the pom.xml
25 JAZZER_VERSION=$(grep -oP '(?<=JAZZER_VERSION = ")[^"]*' ../../maven.bzl)
26 # Find line with "<artifactId>jazzer-junit</artifactId>" and replace the version in the next line
27 sed -i "/<artifactId>jazzer-junit<\/artifactId>/ {n;s/<version>.*<\/version>/<version>$JAZZER_VERSI…
29 # Add locally-built Jazzer to the Maven repository
30 ./mvnw install:install-file -Dfile=../../bazel-bin/deploy/jazzer-junit-project.jar -DpomFile=../../…
31 ./mvnw install:install-file -Dfile=../../bazel-bin/deploy/jazzer-project.jar -DpomFile=../../…
[all …]
/external/jazzer-api/sanitizers/src/test/java/com/example/
DBUILD.bazel10 "com.code_intelligence.jazzer.api.FuzzerSecurityIssueHigh",
22 "com.code_intelligence.jazzer.api.FuzzerSecurityIssueHigh",
34 "com.code_intelligence.jazzer.api.FuzzerSecurityIssueHigh",
50 allowed_findings = ["com.code_intelligence.jazzer.api.FuzzerSecurityIssueHigh"],
65 allowed_findings = ["com.code_intelligence.jazzer.api.FuzzerSecurityIssueCritical"],
75 allowed_findings = ["com.code_intelligence.jazzer.api.FuzzerSecurityIssueCritical"],
87 "com.code_intelligence.jazzer.api.FuzzerSecurityIssueCritical",
104 "com.code_intelligence.jazzer.api.FuzzerSecurityIssueCritical",
117 allowed_findings = ["com.code_intelligence.jazzer.api.FuzzerSecurityIssueLow"],
127 allowed_findings = ["com.code_intelligence.jazzer.api.FuzzerSecurityIssueLow"],
[all …]
DDisabledHooksTest.java7 // http://www.apache.org/licenses/LICENSE-2.0
17 import com.code_intelligence.jazzer.api.FuzzerSecurityIssueHigh;
53 System.clearProperty("jazzer.disabled_hooks"); in resetDisabledHooksProperty()
74 "jazzer.disabled_hooks", "com.code_intelligence.jazzer.sanitizers.ReflectiveCall"); in disableReflectiveCallSanitizer()
81 "jazzer.disabled_hooks", "com.code_intelligence.jazzer.sanitizers.Deserialization"); in disableDeserializationSanitizer()
87 System.setProperty("jazzer.disabled_hooks", in disableExpressionLanguageSanitizer()
88 "com.code_intelligence.jazzer.sanitizers.ExpressionLanguageInjection"); in disableExpressionLanguageSanitizer()
95 "jazzer.disabled_hooks", "com.code_intelligence.jazzer.sanitizers.ReflectiveCall"); in disableReflectiveCallAndEnableDeserialization()
102 System.setProperty("jazzer.disabled_hooks", in disableAllSanitizers()
103 "com.code_intelligence.jazzer.sanitizers.ReflectiveCall," in disableAllSanitizers()
[all …]
/external/jazzer-api/src/main/java/com/code_intelligence/jazzer/driver/
DDriver.java8 * http://www.apache.org/licenses/LICENSE-2.0
17 package com.code_intelligence.jazzer.driver;
19 import static com.code_intelligence.jazzer.runtime.Constants.IS_ANDROID;
22 import com.code_intelligence.jazzer.agent.AgentInstaller;
23 import com.code_intelligence.jazzer.driver.junit.JUnitRunner;
24 import com.code_intelligence.jazzer.utils.Log;
37 if (!System.getProperty("jazzer.autofuzz", "").isEmpty()) { in start()
38 Log.error("--autofuzz is not supported for Android"); in start()
41 if (!System.getProperty("jazzer.coverage_report", "").isEmpty()) { in start()
42 Log.warn("--coverage_report is not supported for Android and has been disabled"); in start()
[all …]
/external/jazzer-api/src/test/java/com/code_intelligence/jazzer/driver/
DBUILD.bazel4 jvm_flags = ["-ea"],
7 "//src/main/java/com/code_intelligence/jazzer/agent:agent_installer",
8 "//src/main/java/com/code_intelligence/jazzer/api",
9 "//src/main/java/com/code_intelligence/jazzer/api:hooks",
10 "//src/main/java/com/code_intelligence/jazzer/driver:fuzz_target_finder",
11 "//src/main/java/com/code_intelligence/jazzer/driver:fuzz_target_holder",
12 "//src/main/java/com/code_intelligence/jazzer/driver:fuzz_target_runner",
13 "//src/main/java/com/code_intelligence/jazzer/runtime:coverage_map",
14 "//src/main/java/com/code_intelligence/jazzer/utils:unsafe_provider",
23 "//src/main/java/com/code_intelligence/jazzer/api",
[all …]
/external/jazzer-api/src/test/java/com/code_intelligence/jazzer/junit/
DBUILD.bazel4 name = "test-method",
6 visibility = ["//src/test/java/com/code_intelligence/jazzer/junit:__pkg__"],
17 "//src/main/java/com/code_intelligence/jazzer/junit:utils",
28 test_class = "com.code_intelligence.jazzer.junit.RegressionTestTest",
34 "//src/main/java/com/code_intelligence/jazzer/api:hooks",
52 test_class = "com.code_intelligence.jazzer.junit.FuzzingWithCrashTest",
58 "//src/main/java/com/code_intelligence/jazzer/api:hooks",
59 "//src/test/java/com/code_intelligence/jazzer/junit:test-method",
83 test_class = "com.code_intelligence.jazzer.junit.FuzzingWithoutCrashTest",
89 "//src/main/java/com/code_intelligence/jazzer/api:hooks",
[all …]
/external/jazzer-api/tests/
DBUILD.bazel12 allowed_findings = ["com.code_intelligence.jazzer.api.FuzzerSecurityIssueLow"],
14 # Additionally verify that Jazzer-Fuzz-Target-Class is picked up if --target_class isn't set.
15 deploy_manifest_lines = ["Jazzer-Fuzz-Target-Class: com.example.LongStringFuzzer"],
27 "--autofuzz=org.apache.commons.imaging.formats.jpeg.JpegImageParser::getBufferedImage",
28 "--autofuzz_ignore=java.lang.NullPointerException",
39 deploy_manifest_lines = ["Jazzer-Hook-Classes: com.example.HookDependenciesFuzzerHooks"],
40 deps = ["//src/main/java/com/code_intelligence/jazzer/api:hooks"],
47 "com.code_intelligence.jazzer.api.FuzzerSecurityIssueLow",
49 env = {"JAVA_OPTS": "-Xverify:all"},
61 "--autofuzz=java.util.regex.Pattern::compile",
[all …]
/external/jazzer-api/examples/junit/src/test/java/com/example/
DBUILD.bazel9 "//src/test/java/com/code_intelligence/jazzer/junit:__pkg__",
12 "//deploy:jazzer",
13 "//deploy:jazzer-api",
14 "//deploy:jazzer-junit",
26 allowed_findings = ["com.code_intelligence.jazzer.api.FuzzerSecurityIssueMedium"],
28 "-runs=0",
38 "//src/main/java/com/code_intelligence/jazzer/junit:fuzz_test",
48 "-runs=0",
58 "//src/main/java/com/code_intelligence/jazzer/junit:fuzz_test",
68 "-runs=0",
[all …]
/external/jazzer-api/src/main/java/com/code_intelligence/jazzer/mutation/mutator/collection/
DMapMutatorFactory.java8 * http://www.apache.org/licenses/LICENSE-2.0
17 package com.code_intelligence.jazzer.mutation.mutator.collection;
19 import static com.code_intelligence.jazzer.mutation.mutator.collection.ChunkCrossOvers.CrossOverAct…
20 import static com.code_intelligence.jazzer.mutation.mutator.collection.ChunkCrossOvers.crossOverChu…
21 import static com.code_intelligence.jazzer.mutation.mutator.collection.ChunkCrossOvers.insertChunk;
22 import static com.code_intelligence.jazzer.mutation.mutator.collection.ChunkCrossOvers.overwriteChu…
23 import static com.code_intelligence.jazzer.mutation.mutator.collection.ChunkMutations.MutationActio…
24 import static com.code_intelligence.jazzer.mutation.mutator.collection.ChunkMutations.deleteRandomC…
25 import static com.code_intelligence.jazzer.mutation.mutator.collection.ChunkMutations.growBy;
26 import static com.code_intelligence.jazzer.mutation.mutator.collection.ChunkMutations.insertRandomC…
[all …]
DListMutatorFactory.java8 * http://www.apache.org/licenses/LICENSE-2.0
17 package com.code_intelligence.jazzer.mutation.mutator.collection;
19 import static com.code_intelligence.jazzer.mutation.mutator.collection.ChunkCrossOvers.CrossOverAct…
20 import static com.code_intelligence.jazzer.mutation.mutator.collection.ChunkCrossOvers.crossOverChu…
21 import static com.code_intelligence.jazzer.mutation.mutator.collection.ChunkCrossOvers.insertChunk;
22 import static com.code_intelligence.jazzer.mutation.mutator.collection.ChunkCrossOvers.overwriteChu…
23 import static com.code_intelligence.jazzer.mutation.mutator.collection.ChunkMutations.MutationActio…
24 import static com.code_intelligence.jazzer.mutation.mutator.collection.ChunkMutations.deleteRandomC…
25 import static com.code_intelligence.jazzer.mutation.mutator.collection.ChunkMutations.insertRandomC…
26 import static com.code_intelligence.jazzer.mutation.mutator.collection.ChunkMutations.mutateRandomC…
[all …]
/external/jazzer-api/docs/
Dadvanced.md3 * [Passing JVM arguments](#passing-jvm-arguments)
4 * [Coverage instrumentation](#coverage-instrumentation)
5 * [Trace instrumentation](#trace-instrumentation)
6 * [Value profile](#value-profile)
7 * [Custom hooks](#custom-hooks)
8 * [Suppressing stack traces](#suppressing-stack-traces)
9 * [Export coverage information](#export-coverage-information)
10 * [Native libraries](#native-libraries)
11 * [Fuzzing mutators](#fuzzing-mutators)
13 <!-- Created by https://github.com/ekalinin/github-markdown-toc -->
[all …]
/external/jazzer-api/src/test/java/com/code_intelligence/jazzer/mutation/mutator/proto/
DMessageMutatorTest.java8 * http://www.apache.org/licenses/LICENSE-2.0
17 package com.code_intelligence.jazzer.mutation.mutator.proto;
19 import static com.code_intelligence.jazzer.mutation.support.TestSupport.mockPseudoRandom;
22 import com.code_intelligence.jazzer.mutation.annotation.NotNull;
23 import com.code_intelligence.jazzer.mutation.api.ChainedMutatorFactory;
24 import com.code_intelligence.jazzer.mutation.api.MutatorFactory;
25 import com.code_intelligence.jazzer.mutation.api.SerializingMutator;
26 import com.code_intelligence.jazzer.mutation.mutator.collection.CollectionMutators;
27 import com.code_intelligence.jazzer.mutation.mutator.lang.LangMutators;
28 import com.code_intelligence.jazzer.mutation.support.TestSupport.MockPseudoRandom;
[all …]
/external/jazzer-api/src/main/native/com/code_intelligence/jazzer/driver/
DBUILD.bazel9 "//src/main/java/com/code_intelligence/jazzer/driver:__pkg__",
10 "//src/main/java/com/code_intelligence/jazzer/junit:__pkg__",
11 "//src/main/java/com/code_intelligence/jazzer/runtime:__pkg__",
26 visibility = ["//src/test/native/com/code_intelligence/jazzer/driver/mocks:__pkg__"],
41 visibility = ["//src/main/java/com/code_intelligence/jazzer/android:__pkg__"],
43 "//src/main/java/com/code_intelligence/jazzer/android:android_runtime.hdrs",
51 deps = ["//src/main/java/com/code_intelligence/jazzer/runtime:coverage_map.hdrs"],
62 "//conditions:default": ["-ldl"],
66 "//src/main/java/com/code_intelligence/jazzer/runtime:fuzz_target_runner_natives.hdrs",
79 "//src/main/java/com/code_intelligence/jazzer/driver:fuzzed_data_provider_impl.hdrs",
[all …]
/external/jazzer-api/examples/
DBUILD.bazel11 "--autofuzz=com.google.json.JsonSanitizer::sanitize",
21 allowed_findings = ["com.code_intelligence.jazzer.api.FuzzerSecurityIssueMedium"],
32 …# Comment out the next line to keep the ExampleFuzzer running indefinitely - without the hook, it …
34 deploy_manifest_lines = ["Jazzer-Hook-Classes: com.example.ExampleFuzzerHooks"],
35 deps = ["//src/main/java/com/code_intelligence/jazzer/api:hooks"],
49 "//deploy:jazzer-api",
59 "--asan",
61 # The shell launcher generated by Jazzer is killed in CI, even with codesigning disabled on the
63 tags = ["no-macos-x86_64-jdk8"],
78 "--ubsan",
[all …]
/external/jazzer-api/.github/workflows/
Drelease.yml8 runs-on: ${{ matrix.os }}
12 - os: ubuntu-20.04
14 - os: macos-11
16 - os: windows-2019
20 - uses: actions/checkout@v3
22 - name: Set up JDK
23 uses: actions/setup-java@v3
26 java-version: 8
28 - name: Set Build Buddy config
32 - name: Append build settings to .bazelrc
[all …]
/external/jazzer-api/src/main/java/com/code_intelligence/jazzer/junit/
DAgentConfigurator.java7 // http://www.apache.org/licenses/LICENSE-2.0
15 package com.code_intelligence.jazzer.junit;
17 import static com.code_intelligence.jazzer.junit.Utils.getClassPathBasedInstrumentationFilter;
18 import static com.code_intelligence.jazzer.junit.Utils.getLegacyInstrumentationFilter;
35 System.setProperty("jazzer.internal.conditional_hooks", "true"); in forRegressionTest()
37 System.setProperty("jazzer.instrumentation_excludes", "**"); in forRegressionTest()
38 extensionContext.getConfigurationParameter("jazzer.instrument") in forRegressionTest()
40 -> System.setProperty( in forRegressionTest()
41 "jazzer.custom_hook_includes", String.join(File.pathSeparator, s.split(",")))); in forRegressionTest()
52 executionRequest.getConfigurationParameter("jazzer.instrument") in forFuzzing()
[all …]
/external/jazzer-api/src/main/java/com/code_intelligence/jazzer/mutation/mutator/proto/
DBuilderMutatorFactory.java8 * http://www.apache.org/licenses/LICENSE-2.0
17 package com.code_intelligence.jazzer.mutation.mutator.proto;
19 import static com.code_intelligence.jazzer.mutation.combinator.MutatorCombinators.assemble;
20 import static com.code_intelligence.jazzer.mutation.combinator.MutatorCombinators.combine;
21 import static com.code_intelligence.jazzer.mutation.combinator.MutatorCombinators.fixedValue;
22 import static com.code_intelligence.jazzer.mutation.combinator.MutatorCombinators.mutateIndices;
23 import static com.code_intelligence.jazzer.mutation.combinator.MutatorCombinators.mutateProperty;
24 import static com.code_intelligence.jazzer.mutation.combinator.MutatorCombinators.mutateSumInPlace;
25 import static com.code_intelligence.jazzer.mutation.combinator.MutatorCombinators.mutateThenMapToIm…
26 import static com.code_intelligence.jazzer.mutation.combinator.MutatorCombinators.mutateViaView;
[all …]

12345678910>>...18