Home
last modified time | relevance | path

Searched full:fuzzing (Results 1 – 25 of 74) sorted by relevance

123

/freebsd/crypto/openssl/fuzz/
H A DREADME.md1 Fuzzing OpenSSL
4 OpenSSL can use either LibFuzzer or AFL to do fuzzing.
20 Configure `openssl` for fuzzing. For now, you'll still need to pass in the path
41 Finally, perform the actual fuzzing:
58 fuzzing is the same, except that you also need to specify
78 Configure for fuzzing:
102 don't need to be built for fuzzing, there is no need to set CC or the call
131 connection setup. This results in the coverage of the fuzzing corpus changing
136 Since we want to maximize the coverage of the fuzzing corpus, the client and
H A Dhelper.py10 """Fuzzing helper, creates and uses corpus/crash directories.
/freebsd/contrib/libcbor/.github/workflows/
H A Dfuzz-pr.yml1 # A quick CIFuzz sanity check. Fuzzing time is kept low provide fast feedback
2 # on PRs; fuzz.yml schedules a daily long-running fuzzing job.
6 Fuzzing:
H A Dfuzz.yml6 Fuzzing:
/freebsd/crypto/openssh/regress/misc/fuzz-harness/testdata/
H A DREADME1 This is preparatory data for fuzzing testing including scripts and test keys,
3 fuzzing seed corpora. They should not be changed unless the affected seed
H A Dcreate-agent-corpus.sh3 # Exercise ssh-agent to generate fuzzing corpus
/freebsd/contrib/llvm-project/compiler-rt/lib/fuzzer/
H A DFuzzerFlags.def59 FUZZER_FLAG_INT(fork, 0, "Experimental mode where fuzzing happens "
76 FUZZER_FLAG_STRING(stop_file, "Stop fuzzing ASAP if this file exists")
109 "Experimental. Use value profile to guide fuzzing.")
128 FUZZER_FLAG_STRING(artifact_prefix, "Write fuzzing artifacts (crash, "
163 "try to detect memory leaks during fuzzing (i.e. not only at shut down).")
185 "Fuzzing will focus on inputs that trigger calls to this function. "
H A DFuzzerFork.h1 //===- FuzzerFork.h - run fuzzing in sub-processes --------------*- C++ -* ===//
H A DFuzzerFork.cpp1 //===- FuzzerFork.cpp - run fuzzing in separate subprocesses --------------===//
8 // Spawn and orchestrate separate fuzzing processes.
76 // Fuzzing Outputs.
315 Printf("INFO: -fork=%d: fuzzing in separate process(s)\n", NumJobs); in FuzzWithFork()
H A DFuzzerUtilFuchsia.cpp181 #error "Unsupported architecture for fuzzing on Fuchsia"
248 #error "Unsupported architecture for fuzzing on Fuchsia" in MakeTrampoline()
363 #error "Unsupported architecture for fuzzing on Fuchsia" in CrashHandler()
/freebsd/crypto/openssh/regress/unittests/
H A DMakefile.inc7 UNITTEST_FAST?= no # Skip slow tests (e.g. less intensive fuzzing).
8 UNITTEST_SLOW?= no # Include slower tests (e.g. more intensive fuzzing).
/freebsd/contrib/libfido2/
H A DNEWS17 ** Improved support for different fuzzing engines.
233 ** Better fuzzing harnesses.
244 ** Merged fuzzing instrumentation.
/freebsd/crypto/openssh/regress/misc/fuzz-harness/
H A DREADME1 This directory contains fuzzing harnesses for use with clang's libfuzzer.
/freebsd/contrib/libarchive/.github/workflows/
H A Dcifuzz.yml
/freebsd/crypto/openssl/test/recipes/
H A Dfuzz.pl22 ok(run(fuzz(["$f-test", $d])), "Fuzzing $f");
/freebsd/crypto/openssh/.github/workflows/
H A Dcifuzz.yml9 Fuzzing:
/freebsd/contrib/llvm-project/compiler-rt/lib/ubsan/
H A Dubsan_flags.inc28 "Used to provide fuzzing signal without blowing up logs.")
/freebsd/crypto/openssh/regress/unittests/test_helper/
H A Dtest_helper.h288 /* Fuzzing support */
300 /* Start fuzzing a blob of data with selected strategies (bitmask) */
312 * generated change the input (e.g. when fuzzing signatures).
/freebsd/contrib/libfido2/fuzz/
H A DREADME4 AFL is more convenient when fuzzing the path from the authenticator to
/freebsd/contrib/libcbor/test/
H A Dfuzz_test.c60 printf("Fuzzing %llu rounds of up to %llu bytes with seed %u\n", ROUNDS, in fuzz()
/freebsd/contrib/unbound/contrib/
H A Dunbound-fuzzme.patch7 for the purposes of fuzzing.
109 + * unbound-fuzzme.c - parse a packet provided on stdin (for fuzzing).
/freebsd/contrib/bc/
H A DMakefile.in103 BC_FUZZ_OUTPUTS = tests/fuzzing/bc_outputs1 tests/fuzzing/bc_outputs2 tests/fuzzing/bc_outputs3
105 DC_FUZZ_OUTPUTS = tests/fuzzing/dc_outputs
/freebsd/contrib/unbound/
H A DREADME.md5 [![Fuzzing Status](https://oss-fuzz-build-logs.storage.googleapis.com/badges/unbound.svg)](https://…
/freebsd/crypto/openssh/.github/
H A Dci-status.md6 [![Fuzzing Status](https://oss-fuzz-build-logs.storage.googleapis.com/badges/openssh.svg)](https://…
/freebsd/contrib/expat/fuzz/
H A Dxml_parse_fuzzer.c36 static unsigned char hash_key[16] = "FUZZING IS FUN!";

123