Home
last modified time | relevance | path

Searched refs:fuzzer (Results 1 – 25 of 101) sorted by relevance

12345

/src/lib/libclang_rt/fuzzer/
H A DMakefile3 LIB= clang_rt.fuzzer-${CRTARCH}
5 SRCS+= fuzzer/FuzzerCrossOver.cpp
6 SRCS+= fuzzer/FuzzerDataFlowTrace.cpp
7 SRCS+= fuzzer/FuzzerDriver.cpp
8 SRCS+= fuzzer/FuzzerExtFunctionsDlsym.cpp
9 SRCS+= fuzzer/FuzzerExtFunctionsWeak.cpp
10 SRCS+= fuzzer/FuzzerExtraCounters.cpp
11 SRCS+= fuzzer/FuzzerFork.cpp
12 SRCS+= fuzzer/FuzzerIO.cpp
13 SRCS+= fuzzer/FuzzerIOPosix.cpp
[all …]
/src/lib/libclang_rt/fuzzer_no_main/
H A DMakefile5 SRCS+= fuzzer/FuzzerCrossOver.cpp
6 SRCS+= fuzzer/FuzzerDataFlowTrace.cpp
7 SRCS+= fuzzer/FuzzerDriver.cpp
8 SRCS+= fuzzer/FuzzerExtFunctionsDlsym.cpp
9 SRCS+= fuzzer/FuzzerExtFunctionsWeak.cpp
10 SRCS+= fuzzer/FuzzerExtraCounters.cpp
11 SRCS+= fuzzer/FuzzerFork.cpp
12 SRCS+= fuzzer/FuzzerIO.cpp
13 SRCS+= fuzzer/FuzzerIOPosix.cpp
14 SRCS+= fuzzer/FuzzerLoop.cpp
[all …]
/src/contrib/llvm-project/compiler-rt/lib/fuzzer/
H A DFuzzerTracePC.cpp30 namespace fuzzer { namespace
445 fuzzer::WarnAboutDeprecatedInstrumentation( in __sanitizer_cov_trace_pc_guard()
454 fuzzer::WarnAboutDeprecatedInstrumentation("-fsanitize-coverage=trace-pc"); in __sanitizer_cov_trace_pc()
459 fuzzer::WarnAboutDeprecatedInstrumentation( in __sanitizer_cov_trace_pc_guard_init()
465 fuzzer::TPC.HandleInline8bitCountersInit(Start, Stop); in __sanitizer_cov_8bit_counters_init()
471 fuzzer::TPC.HandlePCsInit(pcs_beg, pcs_end); in __sanitizer_cov_pcs_init()
478 fuzzer::TPC.HandleCallerCallee(PC, Callee); in __sanitizer_cov_trace_pc_indir()
486 fuzzer::TPC.HandleCmp(PC, Arg1, Arg2); in __sanitizer_cov_trace_cmp8()
497 fuzzer::TPC.HandleCmp(PC, Arg1, Arg2); in __sanitizer_cov_trace_const_cmp8()
505 fuzzer::TPC.HandleCmp(PC, Arg1, Arg2); in __sanitizer_cov_trace_cmp4()
[all …]
/src/contrib/libder/tests/
H A DCMakeLists.txt11 foreach(fuzzer IN LISTS FUZZERS)
12 add_executable(${fuzzer} ${fuzzer}.c)
14 target_compile_options(${fuzzer} PUBLIC -fsanitize=fuzzer)
15 target_link_options(${fuzzer} PUBLIC -fsanitize=fuzzer)
/src/crypto/openssl/test/recipes/
H A D99-test_fuzz_ct.t15 my $fuzzer = "ct";
16 setup("test_fuzz_${fuzzer}");
18 plan skip_all => "This test requires $fuzzer support"
19 if disabled($fuzzer);
25 fuzz_ok($fuzzer);
H A D99-test_fuzz_cms.t15 my $fuzzer = "cms";
16 setup("test_fuzz_${fuzzer}");
18 plan skip_all => "This test requires $fuzzer support"
19 if disabled($fuzzer);
25 fuzz_ok($fuzzer);
H A D99-test_fuzz_sl-dsa.t15 my $fuzzer = "slh-dsa";
16 setup("test_fuzz_${fuzzer}");
18 plan skip_all => "This test requires $fuzzer support"
19 if disabled($fuzzer);
25 fuzz_ok($fuzzer);
H A D99-test_fuzz_cmp.t15 my $fuzzer = "cmp";
16 setup("test_fuzz_${fuzzer}");
18 plan skip_all => "This test requires $fuzzer support"
19 if disabled($fuzzer);
25 fuzz_ok($fuzzer);
H A D99-test_fuzz_asn1.t15 my $fuzzer = "asn1";
16 setup("test_fuzz_${fuzzer}");
22 fuzz_ok($fuzzer);
H A D99-test_fuzz_pem.t15 my $fuzzer = "pem";
16 setup("test_fuzz_${fuzzer}");
22 fuzz_ok($fuzzer);
H A D99-test_fuzz_crl.t15 my $fuzzer = "crl";
16 setup("test_fuzz_${fuzzer}");
22 fuzz_ok($fuzzer);
H A D99-test_fuzz_provider.t15 my $fuzzer = "provider";
16 setup("test_fuzz_${fuzzer}");
22 fuzz_ok($fuzzer);
H A D99-test_fuzz_client.t15 my $fuzzer = "client";
16 setup("test_fuzz_${fuzzer}");
22 fuzz_ok($fuzzer);
H A D99-test_fuzz_acert.t15 my $fuzzer = "acert";
16 setup("test_fuzz_${fuzzer}");
22 fuzz_ok($fuzzer);
H A D99-test_fuzz_v3name.t15 my $fuzzer = "v3name";
16 setup("test_fuzz_${fuzzer}");
22 fuzz_ok($fuzzer);
H A D99-test_fuzz_conf.t15 my $fuzzer = "conf";
16 setup("test_fuzz_${fuzzer}");
22 fuzz_ok($fuzzer);
H A D99-test_fuzz_server.t15 my $fuzzer = "server";
16 setup("test_fuzz_${fuzzer}");
22 fuzz_ok($fuzzer);
H A D99-test_fuzz_bndiv.t15 my $fuzzer = "bndiv";
16 setup("test_fuzz_${fuzzer}");
22 fuzz_ok($fuzzer);
H A D99-test_fuzz_asn1parse.t15 my $fuzzer = "asn1parse";
16 setup("test_fuzz_${fuzzer}");
22 fuzz_ok($fuzzer);
H A D99-test_fuzz_punycode.t15 my $fuzzer = "punycode";
16 setup("test_fuzz_${fuzzer}");
22 fuzz_ok($fuzzer);
H A D99-test_fuzz_bignum.t15 my $fuzzer = "bignum";
16 setup("test_fuzz_${fuzzer}");
22 fuzz_ok($fuzzer);
H A D99-test_fuzz_decoder.t15 my $fuzzer = "decoder";
16 setup("test_fuzz_${fuzzer}");
22 fuzz_ok($fuzzer);
H A D99-test_fuzz_hashtable.t15 my $fuzzer = "hashtable";
16 setup("test_fuzz_${fuzzer}");
22 fuzz_ok($fuzzer);
/src/crypto/openssl/fuzz/
H A DREADME.md15 Install `clang`, which [ships with `libfuzzer`](http://llvm.org/docs/LibFuzzer.html#fuzzer-usage)
23 `/usr/lib/llvm-7/lib/clang/7.0.1/lib/linux/libclang_rt.fuzzer-x86_64.a`.
26 --with-fuzzer-lib=$PATH_TO_LIBFUZZER \
29 -fsanitize=fuzzer-no-link \
87 a `--with-fuzzer-include` option, which should be the parent directory of the
88 prebuilt fuzzer library. This is represented as `$PATH_TO_LIBFUZZER_DIR` below.
91 --with-fuzzer-include=$PATH_TO_LIBFUZZER_DIR \
92 --with-fuzzer-lib=$PATH_TO_LIBFUZZER \
95 -fsanitize=fuzzer-no-link \
128 If a fuzzer generates a reproducible error, you can reproduce the problem using
[all …]
/src/contrib/libder/libder/
H A DCMakeLists.txt7 target_compile_options(der PUBLIC -fsanitize=fuzzer-no-link)
8 target_link_options(der PUBLIC -fsanitize=fuzzer-no-link)
10 target_compile_options(der_static PUBLIC -fsanitize=fuzzer-no-link)
11 target_link_options(der_static PUBLIC -fsanitize=fuzzer-no-link)

12345