| /src/lib/libclang_rt/fuzzer/ |
| H A D | Makefile | 3 LIB= clang_rt.fuzzer-${CRTARCH} 5 SRCS+= fuzzer/FuzzerCrossOver.cpp 6 SRCS+= fuzzer/FuzzerDataFlowTrace.cpp 7 SRCS+= fuzzer/FuzzerDriver.cpp 8 SRCS+= fuzzer/FuzzerExtFunctionsDlsym.cpp 9 SRCS+= fuzzer/FuzzerExtFunctionsWeak.cpp 10 SRCS+= fuzzer/FuzzerExtraCounters.cpp 11 SRCS+= fuzzer/FuzzerFork.cpp 12 SRCS+= fuzzer/FuzzerIO.cpp 13 SRCS+= fuzzer/FuzzerIOPosix.cpp [all …]
|
| /src/lib/libclang_rt/fuzzer_no_main/ |
| H A D | Makefile | 5 SRCS+= fuzzer/FuzzerCrossOver.cpp 6 SRCS+= fuzzer/FuzzerDataFlowTrace.cpp 7 SRCS+= fuzzer/FuzzerDriver.cpp 8 SRCS+= fuzzer/FuzzerExtFunctionsDlsym.cpp 9 SRCS+= fuzzer/FuzzerExtFunctionsWeak.cpp 10 SRCS+= fuzzer/FuzzerExtraCounters.cpp 11 SRCS+= fuzzer/FuzzerFork.cpp 12 SRCS+= fuzzer/FuzzerIO.cpp 13 SRCS+= fuzzer/FuzzerIOPosix.cpp 14 SRCS+= fuzzer/FuzzerLoop.cpp [all …]
|
| /src/contrib/llvm-project/compiler-rt/lib/fuzzer/ |
| H A D | FuzzerTracePC.cpp | 30 namespace fuzzer { namespace 445 fuzzer::WarnAboutDeprecatedInstrumentation( in __sanitizer_cov_trace_pc_guard() 454 fuzzer::WarnAboutDeprecatedInstrumentation("-fsanitize-coverage=trace-pc"); in __sanitizer_cov_trace_pc() 459 fuzzer::WarnAboutDeprecatedInstrumentation( in __sanitizer_cov_trace_pc_guard_init() 465 fuzzer::TPC.HandleInline8bitCountersInit(Start, Stop); in __sanitizer_cov_8bit_counters_init() 471 fuzzer::TPC.HandlePCsInit(pcs_beg, pcs_end); in __sanitizer_cov_pcs_init() 478 fuzzer::TPC.HandleCallerCallee(PC, Callee); in __sanitizer_cov_trace_pc_indir() 486 fuzzer::TPC.HandleCmp(PC, Arg1, Arg2); in __sanitizer_cov_trace_cmp8() 497 fuzzer::TPC.HandleCmp(PC, Arg1, Arg2); in __sanitizer_cov_trace_const_cmp8() 505 fuzzer::TPC.HandleCmp(PC, Arg1, Arg2); in __sanitizer_cov_trace_cmp4() [all …]
|
| /src/contrib/libder/tests/ |
| H A D | CMakeLists.txt | 11 foreach(fuzzer IN LISTS FUZZERS) 12 add_executable(${fuzzer} ${fuzzer}.c) 14 target_compile_options(${fuzzer} PUBLIC -fsanitize=fuzzer) 15 target_link_options(${fuzzer} PUBLIC -fsanitize=fuzzer)
|
| /src/crypto/openssl/test/recipes/ |
| H A D | 99-test_fuzz_ct.t | 15 my $fuzzer = "ct"; 16 setup("test_fuzz_${fuzzer}"); 18 plan skip_all => "This test requires $fuzzer support" 19 if disabled($fuzzer); 25 fuzz_ok($fuzzer);
|
| H A D | 99-test_fuzz_cms.t | 15 my $fuzzer = "cms"; 16 setup("test_fuzz_${fuzzer}"); 18 plan skip_all => "This test requires $fuzzer support" 19 if disabled($fuzzer); 25 fuzz_ok($fuzzer);
|
| H A D | 99-test_fuzz_sl-dsa.t | 15 my $fuzzer = "slh-dsa"; 16 setup("test_fuzz_${fuzzer}"); 18 plan skip_all => "This test requires $fuzzer support" 19 if disabled($fuzzer); 25 fuzz_ok($fuzzer);
|
| H A D | 99-test_fuzz_cmp.t | 15 my $fuzzer = "cmp"; 16 setup("test_fuzz_${fuzzer}"); 18 plan skip_all => "This test requires $fuzzer support" 19 if disabled($fuzzer); 25 fuzz_ok($fuzzer);
|
| H A D | 99-test_fuzz_asn1.t | 15 my $fuzzer = "asn1"; 16 setup("test_fuzz_${fuzzer}"); 22 fuzz_ok($fuzzer);
|
| H A D | 99-test_fuzz_pem.t | 15 my $fuzzer = "pem"; 16 setup("test_fuzz_${fuzzer}"); 22 fuzz_ok($fuzzer);
|
| H A D | 99-test_fuzz_crl.t | 15 my $fuzzer = "crl"; 16 setup("test_fuzz_${fuzzer}"); 22 fuzz_ok($fuzzer);
|
| H A D | 99-test_fuzz_provider.t | 15 my $fuzzer = "provider"; 16 setup("test_fuzz_${fuzzer}"); 22 fuzz_ok($fuzzer);
|
| H A D | 99-test_fuzz_client.t | 15 my $fuzzer = "client"; 16 setup("test_fuzz_${fuzzer}"); 22 fuzz_ok($fuzzer);
|
| H A D | 99-test_fuzz_acert.t | 15 my $fuzzer = "acert"; 16 setup("test_fuzz_${fuzzer}"); 22 fuzz_ok($fuzzer);
|
| H A D | 99-test_fuzz_v3name.t | 15 my $fuzzer = "v3name"; 16 setup("test_fuzz_${fuzzer}"); 22 fuzz_ok($fuzzer);
|
| H A D | 99-test_fuzz_conf.t | 15 my $fuzzer = "conf"; 16 setup("test_fuzz_${fuzzer}"); 22 fuzz_ok($fuzzer);
|
| H A D | 99-test_fuzz_server.t | 15 my $fuzzer = "server"; 16 setup("test_fuzz_${fuzzer}"); 22 fuzz_ok($fuzzer);
|
| H A D | 99-test_fuzz_bndiv.t | 15 my $fuzzer = "bndiv"; 16 setup("test_fuzz_${fuzzer}"); 22 fuzz_ok($fuzzer);
|
| H A D | 99-test_fuzz_asn1parse.t | 15 my $fuzzer = "asn1parse"; 16 setup("test_fuzz_${fuzzer}"); 22 fuzz_ok($fuzzer);
|
| H A D | 99-test_fuzz_punycode.t | 15 my $fuzzer = "punycode"; 16 setup("test_fuzz_${fuzzer}"); 22 fuzz_ok($fuzzer);
|
| H A D | 99-test_fuzz_bignum.t | 15 my $fuzzer = "bignum"; 16 setup("test_fuzz_${fuzzer}"); 22 fuzz_ok($fuzzer);
|
| H A D | 99-test_fuzz_decoder.t | 15 my $fuzzer = "decoder"; 16 setup("test_fuzz_${fuzzer}"); 22 fuzz_ok($fuzzer);
|
| H A D | 99-test_fuzz_hashtable.t | 15 my $fuzzer = "hashtable"; 16 setup("test_fuzz_${fuzzer}"); 22 fuzz_ok($fuzzer);
|
| /src/crypto/openssl/fuzz/ |
| H A D | README.md | 15 Install `clang`, which [ships with `libfuzzer`](http://llvm.org/docs/LibFuzzer.html#fuzzer-usage) 23 `/usr/lib/llvm-7/lib/clang/7.0.1/lib/linux/libclang_rt.fuzzer-x86_64.a`. 26 --with-fuzzer-lib=$PATH_TO_LIBFUZZER \ 29 -fsanitize=fuzzer-no-link \ 87 a `--with-fuzzer-include` option, which should be the parent directory of the 88 prebuilt fuzzer library. This is represented as `$PATH_TO_LIBFUZZER_DIR` below. 91 --with-fuzzer-include=$PATH_TO_LIBFUZZER_DIR \ 92 --with-fuzzer-lib=$PATH_TO_LIBFUZZER \ 95 -fsanitize=fuzzer-no-link \ 128 If a fuzzer generates a reproducible error, you can reproduce the problem using [all …]
|
| /src/contrib/libder/libder/ |
| H A D | CMakeLists.txt | 7 target_compile_options(der PUBLIC -fsanitize=fuzzer-no-link) 8 target_link_options(der PUBLIC -fsanitize=fuzzer-no-link) 10 target_compile_options(der_static PUBLIC -fsanitize=fuzzer-no-link) 11 target_link_options(der_static PUBLIC -fsanitize=fuzzer-no-link)
|