• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * Copyright 2023 Code Intelligence GmbH
3  *
4  * Licensed under the Apache License, Version 2.0 (the "License");
5  * you may not use this file except in compliance with the License.
6  * You may obtain a copy of the License at
7  *
8  *      http://www.apache.org/licenses/LICENSE-2.0
9  *
10  * Unless required by applicable law or agreed to in writing, software
11  * distributed under the License is distributed on an "AS IS" BASIS,
12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13  * See the License for the specific language governing permissions and
14  * limitations under the License.
15  */
16 
17 package com.example;
18 
19 import com.code_intelligence.jazzer.api.FuzzerSecurityIssueHigh;
20 import java.io.OutputStream;
21 import java.io.PrintStream;
22 
23 public class SilencedFuzzer {
24   private static final PrintStream noopStream = new PrintStream(new OutputStream() {
25     @Override
26     public void write(int b) {}
27   });
28 
fuzzerInitialize()29   public static void fuzzerInitialize() {
30     System.setErr(noopStream);
31     System.setOut(noopStream);
32   }
33 
fuzzerTestOneInput(byte[] input)34   public static void fuzzerTestOneInput(byte[] input) {
35     // If the FuzzTargetTestWrapper successfully parses the stack trace emitted by this finding, we
36     // know that the fuzzer still emitted output despite the fact that System.err and System.out
37     // have been redirected above.
38     throw new FuzzerSecurityIssueHigh();
39   }
40 }
41