Home
last modified time | relevance | path

Searched full:fuzzing (Results 1 – 25 of 266) sorted by relevance

1234567891011

/third_party/openssl/fuzz/
DREADME.md1 Fuzzing OpenSSL
4 OpenSSL can use either LibFuzzer or AFL to do fuzzing.
20 Configure `openssl` for fuzzing. For now, you'll still need to pass in the path
41 Finally, perform the actual fuzzing:
58 fuzzing is the same, except that you also need to specify
78 Configure for fuzzing:
102 don't need to be built for fuzzing, there is no need to set CC or the call
131 connection setup. This results in the coverage of the fuzzing corpus changing
136 Since we want to maximize the coverage of the fuzzing corpus, the client and
/third_party/node/deps/openssl/openssl/fuzz/
DREADME.md1 Fuzzing OpenSSL
4 OpenSSL can use either LibFuzzer or AFL to do fuzzing.
20 Configure `openssl` for fuzzing. For now, you'll still need to pass in the path
41 Finally, perform the actual fuzzing:
58 fuzzing is the same, except that you also need to specify
78 Configure for fuzzing:
102 don't need to be built for fuzzing, there is no need to set CC or the call
131 connection setup. This results in the coverage of the fuzzing corpus changing
136 Since we want to maximize the coverage of the fuzzing corpus, the client and
/third_party/skia/third_party/externals/spirv-tools/source/fuzz/
Dfuzzer.h50 // Status of the fuzzing session.
54 // fuzzing session.
81 // value is equal to 0. Because fuzzing cannot stop mid way through a fuzzer
82 // pass, fuzzing will stop after the fuzzer pass that exceeds
157 // We use this to determine whether we can continue fuzzing incrementally
163 // mutated as fuzzing proceeds.
170 // Provides probabilities that control the fuzzing process.
173 // The sequence of transformations that have been applied during fuzzing. It
178 // in the fuzzing.
/third_party/skia/third_party/externals/swiftshader/third_party/SPIRV-Tools/source/fuzz/
Dfuzzer.h50 // Status of the fuzzing session.
54 // fuzzing session.
81 // value is equal to 0. Because fuzzing cannot stop mid way through a fuzzer
82 // pass, fuzzing will stop after the fuzzer pass that exceeds
157 // We use this to determine whether we can continue fuzzing incrementally
163 // mutated as fuzzing proceeds.
170 // Provides probabilities that control the fuzzing process.
173 // The sequence of transformations that have been applied during fuzzing. It
178 // in the fuzzing.
/third_party/spirv-tools/source/fuzz/
Dfuzzer.h50 // Status of the fuzzing session.
54 // fuzzing session.
81 // value is equal to 0. Because fuzzing cannot stop mid way through a fuzzer
82 // pass, fuzzing will stop after the fuzzer pass that exceeds
157 // We use this to determine whether we can continue fuzzing incrementally
163 // mutated as fuzzing proceeds.
170 // Provides probabilities that control the fuzzing process.
173 // The sequence of transformations that have been applied during fuzzing. It
178 // in the fuzzing.
/third_party/skia/third_party/externals/dawn/docs/
Dfuzzing.md1 # Fuzzing Dawn
9 …er. This fuzzer supports error injection by using the first bytes of the fuzzing input as a Vulkan…
13 … the efficiency of fuzzing. Dawn's fuzzers use interesting testcases discovered in previous fuzzin…
/third_party/node/deps/v8/tools/clusterfuzz/js_fuzzer/
DREADME.md16 ## Fuzzing DB
17 This fuzzer requires a fuzzing DB. To build one, get the latest `web_tests.zip`
28 This may take a while. Optionally test the fuzzing DB with:
82 # Experimenting (limited to differential fuzzing)
101 output of the fuzzing session. Start the experiments with:
104 $ # Around ~40000 corresponds to 24h of fuzzing on a workstation.
Ddifferential_script_mutator.js6 * @fileoverview Script mutator for differential fuzzing.
85 // Mutators for differential fuzzing.
113 // Add flags for the differnetial-fuzzing settings.
135 * Adds extra dependencies for differential fuzzing.
140 // fuzzing. It can also be used to temporarily silence some functionality
/third_party/skia/site/docs/dev/testing/
Dfuzz.md2 title: 'Fuzzing'
3 linkTitle: 'Fuzzing'
77 ## Fuzzing Defines
82 // Required for fuzzing with afl-fuzz to prevent OOMs from adding noise.
85 // Required for fuzzing with libfuzzer
/third_party/node/deps/v8/tools/clusterfuzz/foozzie/testdata/
Dsmoke_test_output.txt12 --correctness-fuzzer-suppressions --expose-gc --fuzzing --allow-natives-for-differential-fuzzing --…
14 --correctness-fuzzer-suppressions --expose-gc --fuzzing --allow-natives-for-differential-fuzzing --…
Dfailure_output.txt12 --correctness-fuzzer-suppressions --expose-gc --fuzzing --allow-natives-for-differential-fuzzing --…
14 --correctness-fuzzer-suppressions --expose-gc --fuzzing --allow-natives-for-differential-fuzzing --…
Dfailure_output_arch.txt12 --correctness-fuzzer-suppressions --expose-gc --fuzzing --allow-natives-for-differential-fuzzing --…
14 --correctness-fuzzer-suppressions --expose-gc --fuzzing --allow-natives-for-differential-fuzzing --…
Dfailure_output_second.txt12 --correctness-fuzzer-suppressions --expose-gc --fuzzing --allow-natives-for-differential-fuzzing --…
14 --correctness-fuzzer-suppressions --expose-gc --fuzzing --allow-natives-for-differential-fuzzing --…
/third_party/rust/crates/proc-macro2/src/
Dfallback.rs6 #[cfg(all(span_locations, not(fuzzing)))]
8 #[cfg(all(span_locations, not(fuzzing)))]
149 #[cfg(fuzzing)] in get_cursor()
153 #[cfg(not(fuzzing))] in get_cursor()
323 #[cfg(all(span_locations, not(fuzzing)))]
337 #[cfg(all(span_locations, not(fuzzing)))]
345 #[cfg(all(span_locations, not(fuzzing)))]
408 #[cfg(all(span_locations, not(fuzzing)))]
423 #[cfg(all(span_locations, not(fuzzing)))]
428 #[cfg(all(span_locations, not(fuzzing)))]
[all …]
/third_party/cJSON/fuzzing/
Dossfuzz.sh11 $CXX $CXXFLAGS $SRC/cjson/fuzzing/cjson_read_fuzzer.c -I. \
15 find $SRC/cjson/fuzzing/inputs -name "*" | \
18 cp $SRC/cjson/fuzzing/json.dict $OUT/cjson_read_fuzzer.dict
/third_party/re2/
Dre2-2021-11-01.tar.gz ... re2-2021-11-01/re2/fuzzing/ re2-2021-11-01/re2 ...
/third_party/skia/third_party/externals/harfbuzz/
DTESTING.md44 ninja -Cfuzzbuild test/fuzzing/hb-{shape,draw,subset,set}-fuzzer
45 fuzzbuild/test/fuzzing/hb-subset-fuzzer test/fuzzing/fonts
/third_party/lz4/ossfuzz/
Dfuzz.h23 * This is the canonical flag to enable deterministic builds for fuzzing.
24 * Changes to zstd for fuzzing are gated behind this define.
25 * It is recommended to define this when building zstd for fuzzing.
Dstandaloneengine.c8 * Main procedure for standalone fuzzing engine.
11 * into memory and then call the fuzzing interface with the data.
43 printf("Read %zu bytes, fuzzing.. ", buffer_len); in main()
/third_party/skia/third_party/externals/harfbuzz/test/fuzzing/
Dmeson.build43 suite: ['fuzzing', 'slow'],
55 suite: ['fuzzing', 'slow'],
64 suite: ['fuzzing'],
/third_party/spirv-tools/tools/fuzz/
Dfuzz.cpp105 provided if the tool is invoked in fuzzing mode; incompatible in PrintUsage()
122 format; it does not perform any fuzzing. in PrintUsage()
125 fuzzing. Aborts fuzzing early if an invalid binary is created. in PrintUsage()
130 the start of fuzzing, via randomly choosing enabled passes, and in PrintUsage()
132 recommended to run subsequently. Fuzzing then involves in PrintUsage()
140 --fuzzing-target= in PrintUsage()
143 to the semantics of some fuzzing target. Available targets: in PrintUsage()
148 (instead of fuzzing) in PrintUsage()
166 (instead of fuzzing) in PrintUsage()
271 } else if (0 == strncmp(cur_arg, "--fuzzing-target=", in ParseFlags()
[all …]
/third_party/rust/crates/bindgen/bindgen-tests/tests/quickchecking/src/
Dlib.rs54 // Passes fuzzed header to the `csmith-fuzzing/predicate.py` script, returns
72 predicate_script_path.push("../../csmith-fuzzing/predicate.py"); in run_predicate_script()
95 // `csmith-fuzzing/predicate.py` script. Success is measured by the success
110 /// to the `csmith-fuzzing/predicate.py` script.
/third_party/skia/third_party/externals/swiftshader/third_party/SPIRV-Tools/tools/fuzz/
Dfuzz.cpp111 provided if the tool is invoked in fuzzing mode; incompatible in PrintUsage()
128 format; it does not perform any fuzzing. in PrintUsage()
131 fuzzing. Aborts fuzzing early if an invalid binary is created. in PrintUsage()
136 the start of fuzzing, via randomly choosing enabled passes, and in PrintUsage()
138 recommended to run subsequently. Fuzzing then involves in PrintUsage()
146 --fuzzing-target= in PrintUsage()
149 to the semantics of some fuzzing target. Available targets: in PrintUsage()
154 (instead of fuzzing) in PrintUsage()
172 (instead of fuzzing) in PrintUsage()
277 } else if (0 == strncmp(cur_arg, "--fuzzing-target=", in ParseFlags()
[all …]
/third_party/skia/third_party/externals/spirv-tools/tools/fuzz/
Dfuzz.cpp111 provided if the tool is invoked in fuzzing mode; incompatible in PrintUsage()
128 format; it does not perform any fuzzing. in PrintUsage()
131 fuzzing. Aborts fuzzing early if an invalid binary is created. in PrintUsage()
136 the start of fuzzing, via randomly choosing enabled passes, and in PrintUsage()
138 recommended to run subsequently. Fuzzing then involves in PrintUsage()
146 --fuzzing-target= in PrintUsage()
149 to the semantics of some fuzzing target. Available targets: in PrintUsage()
154 (instead of fuzzing) in PrintUsage()
172 (instead of fuzzing) in PrintUsage()
277 } else if (0 == strncmp(cur_arg, "--fuzzing-target=", in ParseFlags()
[all …]
/third_party/node/deps/v8/tools/clusterfuzz/js_fuzzer/test/
Dtest_differential_fuzz.js6 * @fileoverview Tests for differential fuzzing.
38 describe('Differential fuzzing', () => {
46 // fuzzing.
113 // Apply top-level fuzzing, with all probabilistic configs switched off.

1234567891011