/freebsd/crypto/openssl/fuzz/ |
H A D | README.md | 1 Fuzzing OpenSSL 4 OpenSSL can use either LibFuzzer or AFL to do fuzzing. 20 Configure `openssl` for fuzzing. For now, you'll still need to pass in the path 41 Finally, perform the actual fuzzing: 58 fuzzing is the same, except that you also need to specify 78 Configure for fuzzing: 102 don't need to be built for fuzzing, there is no need to set CC or the call 131 connection setup. This results in the coverage of the fuzzing corpus changing 136 Since we want to maximize the coverage of the fuzzing corpus, the client and
|
H A D | helper.py | 10 """Fuzzing helper, creates and uses corpus/crash directories.
|
/freebsd/contrib/libcbor/.github/workflows/ |
H A D | fuzz-pr.yml | 1 # A quick CIFuzz sanity check. Fuzzing time is kept low provide fast feedback 2 # on PRs; fuzz.yml schedules a daily long-running fuzzing job. 6 Fuzzing:
|
H A D | fuzz.yml | 6 Fuzzing:
|
/freebsd/crypto/openssh/regress/misc/fuzz-harness/testdata/ |
H A D | README | 1 This is preparatory data for fuzzing testing including scripts and test keys, 3 fuzzing seed corpora. They should not be changed unless the affected seed
|
H A D | create-agent-corpus.sh | 3 # Exercise ssh-agent to generate fuzzing corpus
|
/freebsd/contrib/llvm-project/compiler-rt/lib/fuzzer/ |
H A D | FuzzerFlags.def | 59 FUZZER_FLAG_INT(fork, 0, "Experimental mode where fuzzing happens " 76 FUZZER_FLAG_STRING(stop_file, "Stop fuzzing ASAP if this file exists") 109 "Experimental. Use value profile to guide fuzzing.") 128 FUZZER_FLAG_STRING(artifact_prefix, "Write fuzzing artifacts (crash, " 163 "try to detect memory leaks during fuzzing (i.e. not only at shut down).") 185 "Fuzzing will focus on inputs that trigger calls to this function. "
|
H A D | FuzzerFork.h | 1 //===- FuzzerFork.h - run fuzzing in sub-processes --------------*- C++ -* ===//
|
H A D | FuzzerFork.cpp | 1 //===- FuzzerFork.cpp - run fuzzing in separate subprocesses --------------===// 8 // Spawn and orchestrate separate fuzzing processes. 76 // Fuzzing Outputs. 315 Printf("INFO: -fork=%d: fuzzing in separate process(s)\n", NumJobs); in FuzzWithFork()
|
H A D | FuzzerUtilFuchsia.cpp | 181 #error "Unsupported architecture for fuzzing on Fuchsia" 248 #error "Unsupported architecture for fuzzing on Fuchsia" in MakeTrampoline() 363 #error "Unsupported architecture for fuzzing on Fuchsia" in CrashHandler()
|
/freebsd/crypto/openssh/regress/unittests/ |
H A D | Makefile.inc | 7 UNITTEST_FAST?= no # Skip slow tests (e.g. less intensive fuzzing). 8 UNITTEST_SLOW?= no # Include slower tests (e.g. more intensive fuzzing).
|
/freebsd/contrib/libfido2/ |
H A D | NEWS | 17 ** Improved support for different fuzzing engines. 233 ** Better fuzzing harnesses. 244 ** Merged fuzzing instrumentation.
|
/freebsd/crypto/openssh/regress/misc/fuzz-harness/ |
H A D | README | 1 This directory contains fuzzing harnesses for use with clang's libfuzzer.
|
/freebsd/contrib/libarchive/.github/workflows/ |
H A D | cifuzz.yml |
|
/freebsd/crypto/openssl/test/recipes/ |
H A D | fuzz.pl | 22 ok(run(fuzz(["$f-test", $d])), "Fuzzing $f");
|
/freebsd/crypto/openssh/.github/workflows/ |
H A D | cifuzz.yml | 9 Fuzzing:
|
/freebsd/contrib/llvm-project/compiler-rt/lib/ubsan/ |
H A D | ubsan_flags.inc | 28 "Used to provide fuzzing signal without blowing up logs.")
|
/freebsd/crypto/openssh/regress/unittests/test_helper/ |
H A D | test_helper.h | 288 /* Fuzzing support */ 300 /* Start fuzzing a blob of data with selected strategies (bitmask) */ 312 * generated change the input (e.g. when fuzzing signatures).
|
/freebsd/contrib/libfido2/fuzz/ |
H A D | README | 4 AFL is more convenient when fuzzing the path from the authenticator to
|
/freebsd/contrib/libcbor/test/ |
H A D | fuzz_test.c | 60 printf("Fuzzing %llu rounds of up to %llu bytes with seed %u\n", ROUNDS, in fuzz()
|
/freebsd/contrib/unbound/contrib/ |
H A D | unbound-fuzzme.patch | 7 for the purposes of fuzzing. 109 + * unbound-fuzzme.c - parse a packet provided on stdin (for fuzzing).
|
/freebsd/contrib/bc/ |
H A D | Makefile.in | 103 BC_FUZZ_OUTPUTS = tests/fuzzing/bc_outputs1 tests/fuzzing/bc_outputs2 tests/fuzzing/bc_outputs3 105 DC_FUZZ_OUTPUTS = tests/fuzzing/dc_outputs
|
/freebsd/contrib/unbound/ |
H A D | README.md | 5 [](https://…
|
/freebsd/crypto/openssh/.github/ |
H A D | ci-status.md | 6 [](https://…
|
/freebsd/contrib/expat/fuzz/ |
H A D | xml_parse_fuzzer.c | 36 static unsigned char hash_key[16] = "FUZZING IS FUN!";
|