Searched +full:prs +full:- +full:fuzz (Results 1 – 18 of 18) sorted by relevance
| /external/oss-fuzz/infra/triage-party/ |
| D | oss-fuzz.yaml | 2 name: oss-fuzz 4 - https://github.com/google/oss-fuzz 7 - id: Fuzzing Issues 11 Status of issues across oss-fuzz repos 14 - fuzz-issue-updated-support 16 - fuzz-bugs 17 - fuzz-priority 19 - fuzz-many-reactions 20 - fuzz-many-commenters 21 - fuzz-issue-zombies [all …]
|
| /external/jazzer-api/ |
| D | README.md | 2 …<a href="https://code-intelligence.com"><img src="https://www.code-intelligence.com/hubfs/Logos/CI… 5 <p>Fuzz Testing for the JVM</p> 9 <a href="https://search.maven.org/search?q=g:com.code-intelligence%20a:jazzer"> 10 …<img src="https://img.shields.io/maven-central/v/com.code-intelligence/jazzer" alt="Maven Central"> 12 …<a href="https://github.com/CodeIntelligenceTesting/jazzer/actions/workflows/run-all-tests.yml?que… 13 …ields.io/github/actions/workflow/status/CodeIntelligenceTesting/jazzer/run-all-tests.yml?branch=ma… 19 <img src="https://img.shields.io/badge/PRs-welcome-brightgreen.svg" alt="PRs welcome" /> 24 <a href="https://www.code-intelligence.com/" target="_blank">Website</a> 26 <a href="https://www.code-intelligence.com/blog" target="_blank">Blog</a> 31 Jazzer is a coverage-guided, in-process fuzzer for the JVM platform developed by [Code Intelligence… [all …]
|
| /external/skia/fuzz/ |
| D | README.md | 8 These fuzzers are packaged in two different ways (see //BUILD.gn). There is a `fuzz` executable 9 that contains all fuzzers and is a convenient way to reproduce fuzzer-reported bugs. There are also 13 See [../site/dev/testing/fuzz.md] for more information on building and running fuzzers using the 14 `fuzz` executable. 17 We fuzz Skia using [OSS-Fuzz](https://github.com/google/oss-fuzz), which in turn uses fuzzing 18 engines such as libfuzzer, afl-fuzz, hong-fuzz, and others to fuzz Skia. OSS-Fuzz will automatically 19 [file and close bugs](https://bugs.chromium.org/p/oss-fuzz/issues/list?q=label:Proj-skia) when 22 There is a [Skia folder](https://github.com/google/oss-fuzz/tree/master/projects/skia) 23 in the OSS-Fuzz repo that we make changes to when we want to add/remove/change the fuzzers that 25 [This](https://google.github.io/oss-fuzz/getting-started/new-project-guide/#testing-locally) [all …]
|
| /external/libbpf/ |
| D | README.md | 2 …<source media="(prefers-color-scheme: dark)" srcset="assets/libbpf-logo-sideways-darkbg.png" width… 3 <img src="assets/libbpf-logo-sideways.png" width="40%"> 10 [](https://… 19 Libbpf *authoritative source code* is developed as part of [bpf-next Linux source 20 tree](https://kernel.googlesource.com/pub/scm/linux/kernel/git/bpf/bpf-next) under 22 libbpf changes should be sent to [BPF mailing list](http://vger.kernel.org/vger-lists.html#bpf), 23 please don't open PRs here unless you are changing Github-specific parts of libbpf 24 (e.g., Github-specific Makefile). 32 Please check out [libbpf-bootstrap](https://github.com/libbpf/libbpf-bootstrap) 33 and [the companion blog post](https://nakryiko.com/posts/libbpf-bootstrap/) for [all …]
|
| /external/rust/crates/base64/ |
| D | README.md | 3 …-base64/tree/master.svg?style=shield)](https://circleci.com/gh/marshallpierce/rust-base64/tree/mas… 5 <a href="https://www.jetbrains.com/?from=rust-base64"><img src="/icon_CLion.svg" height="40px"/></a> 23 Remove non-base64 characters from your input before decoding. 25 If you have a `Vec` of base64, [retain](https://doc.rust-lang.org/std/vec/struct.Vec.html#method.re… 30 - Use [iter_read](https://crates.io/crates/iter-read) together with `Read`'s `bytes()` to filter ou… 31 - Implement `Read` with a `read()` impl that delegates to your actual `Read`, and then drops any by… 33 ### I need to line-wrap base64, e.g. for MIME/PEM. 35 [line-wrap](https://crates.io/crates/line-wrap) does just that. 44 There are two opportunities for non-canonical encoding (and thus, detection of the same during deco… 53 The `=` pad bytes, on the other hand, are entirely a self-own by the Base64 standard. They do not a… [all …]
|
| /external/lz4/.github/workflows/ |
| D | README.md | 5 ## USAN, ASAN (`lz4-ubsan-x64`, `lz4-ubsan-x86`, `lz4-asan-x64`) 7 For now, `lz4-ubsan-*` ignores the exit code of `make usan` and `make usan32`. 10 We'll fully enable it when we ensure `make usan` is ready for all commits and PRs. 15 ## C Compilers (`lz4-c-compilers`) 17 - Our test doesn't use `gcc-4.5` due to installation issue of its package. (`apt-get install gcc-4… 19 - Currently, the following 32bit executable tests fail with all versions of `clang`. 20 - `CC=clang-X CFLAGS='-O3' make V=1 -C tests clean test-lz4c32` 21 - `CC=clang-X CFLAGS='-O3 -mx32' make V=1 -C tests clean test-lz4c32` 22 - See [#991](https://github.com/lz4/lz4/issues/991) for details. 24 - Currently, the following 32bit executable tests fail with `gcc-11` [all …]
|
| /external/AFLplusplus/docs/ |
| D | FAQ.md | 9 …<summary id="what-is-the-difference-between-afl-and-aflplusplus">What is the difference between AF… 11 AFL++ is a superior fork to Google's AFL - more speed, more and better 18 however, it is only accepting PRs from the community and is not developing 24 fixes and enhancements. Then from various AFL spin-offs - mostly academic 25 research - features were integrated. This already resulted in a much advanced 33 [Fuzzbench Report](https://www.fuzzbench.com/reports/2020-08-03/index.html). 37 …<summary id="is-afl-a-whitebox-graybox-or-blackbox-fuzzer">Is AFL++ a whitebox, graybox, or blackb… 41 binary-only or source code fuzzing, or something completely different. 44 …[The Fuzzing Book](https://www.fuzzingbook.org/html/GreyboxFuzzer.html#AFL:-An-Effective-Greybox-F… 50 <summary id="where-can-i-find-tutorials">Where can I find tutorials?</summary><p> [all …]
|
| D | Changelog.md | 7 - afl-fuzz: 8 - default power schedule is now EXPLORE, due a fix in fast schedules 10 - fixed minor issues in the mutation engine, thanks to @futhewo for 12 - better deterministic fuzzing is now available, benchmarks have shown 13 to improve fuzzing. Enable with -D. Thanks to @kdsjZh for the PR! 14 - afl-cc: 15 - large rewrite by @SonicStark which fixes a few corner cases, thanks! 16 - LTO mode now requires llvm 12+ 17 - workaround for ASAN with gcc_plugin mode 18 - instrumentation: [all …]
|
| /external/AFLplusplus/ |
| D | README.md | 14 * Marc "van Hauser" Heuse <mh@mh-sec.de> 17 * Heiko "hexcoder-" Eissfeldt <heiko.eissfeldt@hexco.de> 23 AFL++ is a superior fork to Google's AFL - more speed, more and better 27 terms of the Apache-2.0 License. See the [LICENSE](LICENSE) for details. 40 `dev` - depending on your risk appetite. Also take a look at the list of 47 `afl-clang-fast` with `AFL_LLVM_CMPLOG=1`. You can find the `aflplusplus` 58 docker run -ti -v /location/of/your/target:/src aflplusplus/aflplusplus 68 To build AFL++ yourself - *which we recommend* - continue at 74 [common sense risks of fuzzing](docs/fuzzing_in_depth.md#0-common-sense-risks).* 81 * Binary-only targets: [all …]
|
| D | Changelog.md | 7 - afl-fuzz: 8 - default power schedule is now EXPLORE, due a fix in fast schedules 10 - fixed minor issues in the mutation engine, thanks to @futhewo for 12 - better deterministic fuzzing is now available, benchmarks have shown 13 to improve fuzzing. Enable with -D. Thanks to @kdsjZh for the PR! 14 - afl-cc: 15 - large rewrite by @SonicStark which fixes a few corner cases, thanks! 16 - LTO mode now requires llvm 12+ 17 - workaround for ASAN with gcc_plugin mode 18 - instrumentation: [all …]
|
| /external/bc/src/ |
| D | vm.c | 4 * SPDX-License-Identifier: BSD-2-Clause 6 * Copyright (c) 2018-2023 Gavin D. Howard and contributors. 98 bc_file_puts(&vm->ferr, bc_flush_none, "Longjmp: "); 99 bc_file_puts(&vm->ferr, bc_flush_none, f); 100 bc_file_putchar(&vm->ferr, bc_flush_none, '\n'); 101 bc_file_flush(&vm->ferr, bc_flush_none); 105 assert(vm->jmp_bufs.len - (size_t) vm->sig_pop); 108 if (vm->jmp_bufs.len == 0) abort(); 109 if (vm->sig_pop) bc_vec_pop(&vm->jmp_bufs); 110 else vm->sig_pop = 1; [all …]
|
| /external/rust/crates/textwrap/ |
| D | CHANGELOG.md | 6 ## Version 0.16.0 (2022-10-23) 16 paths to `fill` and `wrap`. This makes the functions 10-25 times 29 ## Version 0.15.1 (2022-09-15) 34 ## Version 0.15.0 (2022-02-27) 71 nearly performance neutral (a 1-2% regression). 76 documentation for short last-line penalty more precise. 83 * [#423](https://github.com/mgeisler/textwrap/pull/423): Add fuzz 86 `wrap_optimal_fit` penalties to non-negative numbers. 88 `debug-words` example. 92 ## Version 0.14.2 (2021-06-27) [all …]
|
| /external/bc/ |
| D | configure.sh | 3 # SPDX-License-Identifier: BSD-2-Clause 5 # Copyright (c) 2018-2023 Gavin D. Howard and contributors. 42 if [ $# -gt 0 ]; then 53 printf ' %s -h\n' "$script" 54 printf ' %s --help\n' "$script" 55 …printf ' %s [-a|-bD|-dB|-c] [-CeEfgGHilmMNPrtTvz] [-O OPT_LEVEL] [-k KARATSUBA_LEN]\\\n' "$scri… 56 printf ' [-s SETTING] [-S SETTING] [-p TYPE]\n' 58 printf ' [--library|--bc-only --disable-dc|--dc-only --disable-bc|--coverage] \\\n' 59 printf ' [--force --debug --disable-extra-math --disable-generated-tests] \\\n' 60 printf ' [--disable-history --disable-man-pages --disable-nls --disable-strip] \\\n' [all …]
|
| D | configure | 3 # SPDX-License-Identifier: BSD-2-Clause 5 # Copyright (c) 2018-2023 Gavin D. Howard and contributors. 42 if [ $# -gt 0 ]; then 53 printf ' %s -h\n' "$script" 54 printf ' %s --help\n' "$script" 55 …printf ' %s [-a|-bD|-dB|-c] [-CeEfgGHilmMNPrtTvz] [-O OPT_LEVEL] [-k KARATSUBA_LEN]\\\n' "$scri… 56 printf ' [-s SETTING] [-S SETTING] [-p TYPE]\n' 58 printf ' [--library|--bc-only --disable-dc|--dc-only --disable-bc|--coverage] \\\n' 59 printf ' [--force --debug --disable-extra-math --disable-generated-tests] \\\n' 60 printf ' [--disable-history --disable-man-pages --disable-nls --disable-strip] \\\n' [all …]
|
| /external/python/cpython3/Misc/NEWS.d/ |
| D | 3.7.0a1.rst | 2 .. date: 2017-09-05-15-26-30 4 .. release date: 2017-09-19 13 .. date: 2017-08-23-17-02-55 17 Add fuzz tests for float(str), int(str), unicode(str); for oss-fuzz. 22 .. date: 2017-08-16-16-35-59 49 vulnerabilities including: CVE-2017-9233 (External entity infinite loop 50 DoS), CVE-2016-9063 (Integer overflow, re-fix), CVE-2016-0718 (Fix 51 regression bugs from 2.2.0's fix to CVE-2016-0718) and CVE-2012-0876 52 (Counter hash flooding with SipHash). Note: the CVE-2016-5300 (Use 53 os-specific entropy sources like getrandom) doesn't impact Python, since Python [all …]
|
| /external/cldr/tools/cldr-code/src/main/resources/org/unicode/cldr/util/data/transforms/ |
| D | internal_raw_IPA-old.txt | 1803 ad-lib ædlˈɪb 3726 aide-de-camp ˌeddɪkˈæmp 5495 alpha-fetoprotein ˌælfəfˌitoprˈotin, ˌælfəfˌitoprˈotˈiɪn 7542 anglo-saxon ˈæŋglosˌæksən 8282 anti-lewisite ˌæntilˈuɪsˌaɪt 9550 aquifer %21020 ˈækwəfər, ˈɑkwə- 9555 aquilegia %7773 -lˈiʤə, ˌækwəlˈiʤiə 9559 aquiline %15023 -lɪn, ˈækwəlˌaɪn 9629 aragonite %11075 ərˈægənˌaɪt, ˈærəgə- 9645 aram %8777 ær-, ˈeræm, ˈɛrəm [all …]
|
| /external/bcc/libbpf-tools/powerpc/ |
| D | vmlinux_600.h | 1855 PERF_EVENT_STATE_DEAD = -4, 1856 PERF_EVENT_STATE_EXIT = -3, 1857 PERF_EVENT_STATE_ERROR = -2, 1858 PERF_EVENT_STATE_OFF = -1, 4951 RPM_INVALID = -1, 5843 CGROUP_BPF_ATTACH_TYPE_INVALID = -1, 6479 perf_invalid_context = -1, 12497 __NETDEV_TX_MIN = -2147483648, 14220 CPUHP_INVALID = -1, 15146 WORK_STRUCT_WQ_DATA_MASK = -256LL, [all …]
|
| D | vmlinux.h | 1855 PERF_EVENT_STATE_DEAD = -4, 1856 PERF_EVENT_STATE_EXIT = -3, 1857 PERF_EVENT_STATE_ERROR = -2, 1858 PERF_EVENT_STATE_OFF = -1, 4951 RPM_INVALID = -1, 5843 CGROUP_BPF_ATTACH_TYPE_INVALID = -1, 6479 perf_invalid_context = -1, 12497 __NETDEV_TX_MIN = -2147483648, 14220 CPUHP_INVALID = -1, 15146 WORK_STRUCT_WQ_DATA_MASK = -256LL, [all …]
|