Searched full:fuzzing (Results 1 – 25 of 266) sorted by relevance
1234567891011
1 Fuzzing OpenSSL4 OpenSSL can use either LibFuzzer or AFL to do fuzzing.20 Configure `openssl` for fuzzing. For now, you'll still need to pass in the path41 Finally, perform the actual fuzzing:58 fuzzing is the same, except that you also need to specify78 Configure for fuzzing:102 don't need to be built for fuzzing, there is no need to set CC or the call131 connection setup. This results in the coverage of the fuzzing corpus changing136 Since we want to maximize the coverage of the fuzzing corpus, the client and
50 // Status of the fuzzing session.54 // fuzzing session.81 // value is equal to 0. Because fuzzing cannot stop mid way through a fuzzer82 // pass, fuzzing will stop after the fuzzer pass that exceeds157 // We use this to determine whether we can continue fuzzing incrementally163 // mutated as fuzzing proceeds.170 // Provides probabilities that control the fuzzing process.173 // The sequence of transformations that have been applied during fuzzing. It178 // in the fuzzing.
1 # Fuzzing Dawn9 …er. This fuzzer supports error injection by using the first bytes of the fuzzing input as a Vulkan…13 … the efficiency of fuzzing. Dawn's fuzzers use interesting testcases discovered in previous fuzzin…
16 ## Fuzzing DB17 This fuzzer requires a fuzzing DB. To build one, get the latest `web_tests.zip`28 This may take a while. Optionally test the fuzzing DB with:82 # Experimenting (limited to differential fuzzing)101 output of the fuzzing session. Start the experiments with:104 $ # Around ~40000 corresponds to 24h of fuzzing on a workstation.
6 * @fileoverview Script mutator for differential fuzzing.85 // Mutators for differential fuzzing.113 // Add flags for the differnetial-fuzzing settings.135 * Adds extra dependencies for differential fuzzing.140 // fuzzing. It can also be used to temporarily silence some functionality
2 title: 'Fuzzing'3 linkTitle: 'Fuzzing'77 ## Fuzzing Defines82 // Required for fuzzing with afl-fuzz to prevent OOMs from adding noise.85 // Required for fuzzing with libfuzzer
12 --correctness-fuzzer-suppressions --expose-gc --fuzzing --allow-natives-for-differential-fuzzing --…14 --correctness-fuzzer-suppressions --expose-gc --fuzzing --allow-natives-for-differential-fuzzing --…
6 #[cfg(all(span_locations, not(fuzzing)))]8 #[cfg(all(span_locations, not(fuzzing)))]149 #[cfg(fuzzing)] in get_cursor()153 #[cfg(not(fuzzing))] in get_cursor()323 #[cfg(all(span_locations, not(fuzzing)))]337 #[cfg(all(span_locations, not(fuzzing)))]345 #[cfg(all(span_locations, not(fuzzing)))]408 #[cfg(all(span_locations, not(fuzzing)))]423 #[cfg(all(span_locations, not(fuzzing)))]428 #[cfg(all(span_locations, not(fuzzing)))][all …]
11 $CXX $CXXFLAGS $SRC/cjson/fuzzing/cjson_read_fuzzer.c -I. \15 find $SRC/cjson/fuzzing/inputs -name "*" | \18 cp $SRC/cjson/fuzzing/json.dict $OUT/cjson_read_fuzzer.dict
... re2-2021-11-01/re2/fuzzing/ re2-2021-11-01/re2 ...
44 ninja -Cfuzzbuild test/fuzzing/hb-{shape,draw,subset,set}-fuzzer45 fuzzbuild/test/fuzzing/hb-subset-fuzzer test/fuzzing/fonts
23 * This is the canonical flag to enable deterministic builds for fuzzing.24 * Changes to zstd for fuzzing are gated behind this define.25 * It is recommended to define this when building zstd for fuzzing.
8 * Main procedure for standalone fuzzing engine.11 * into memory and then call the fuzzing interface with the data.43 printf("Read %zu bytes, fuzzing.. ", buffer_len); in main()
43 suite: ['fuzzing', 'slow'],55 suite: ['fuzzing', 'slow'],64 suite: ['fuzzing'],
105 provided if the tool is invoked in fuzzing mode; incompatible in PrintUsage()122 format; it does not perform any fuzzing. in PrintUsage()125 fuzzing. Aborts fuzzing early if an invalid binary is created. in PrintUsage()130 the start of fuzzing, via randomly choosing enabled passes, and in PrintUsage()132 recommended to run subsequently. Fuzzing then involves in PrintUsage()140 --fuzzing-target= in PrintUsage()143 to the semantics of some fuzzing target. Available targets: in PrintUsage()148 (instead of fuzzing) in PrintUsage()166 (instead of fuzzing) in PrintUsage()271 } else if (0 == strncmp(cur_arg, "--fuzzing-target=", in ParseFlags()[all …]
54 // Passes fuzzed header to the `csmith-fuzzing/predicate.py` script, returns72 predicate_script_path.push("../../csmith-fuzzing/predicate.py"); in run_predicate_script()95 // `csmith-fuzzing/predicate.py` script. Success is measured by the success110 /// to the `csmith-fuzzing/predicate.py` script.
111 provided if the tool is invoked in fuzzing mode; incompatible in PrintUsage()128 format; it does not perform any fuzzing. in PrintUsage()131 fuzzing. Aborts fuzzing early if an invalid binary is created. in PrintUsage()136 the start of fuzzing, via randomly choosing enabled passes, and in PrintUsage()138 recommended to run subsequently. Fuzzing then involves in PrintUsage()146 --fuzzing-target= in PrintUsage()149 to the semantics of some fuzzing target. Available targets: in PrintUsage()154 (instead of fuzzing) in PrintUsage()172 (instead of fuzzing) in PrintUsage()277 } else if (0 == strncmp(cur_arg, "--fuzzing-target=", in ParseFlags()[all …]
6 * @fileoverview Tests for differential fuzzing.38 describe('Differential fuzzing', () => {46 // fuzzing.113 // Apply top-level fuzzing, with all probabilistic configs switched off.