Home
last modified time | relevance | path

Searched full:fuzzing (Results 1 – 25 of 83) sorted by relevance

1234

/freebsd/crypto/openssl/fuzz/
H A DREADME.md1 Fuzzing OpenSSL
4 OpenSSL can use either LibFuzzer or AFL to do fuzzing.
20 Configure `openssl` for fuzzing. For now, you'll still need to pass in the path
41 Finally, perform the actual fuzzing:
58 fuzzing is the same, except that you also need to specify
78 Configure for fuzzing:
102 don't need to be built for fuzzing, there is no need to set CC or the call
131 connection setup. This results in the coverage of the fuzzing corpus changing
136 Since we want to maximize the coverage of the fuzzing corpus, the client and
H A Dhelper.py10 """Fuzzing helper, creates and uses corpus/crash directories.
/freebsd/contrib/libcbor/.github/workflows/
H A Dfuzz-pr.yml1 # A quick CIFuzz sanity check. Fuzzing time is kept low provide fast feedback
2 # on PRs; fuzz.yml schedules a daily long-running fuzzing job.
6 Fuzzing:
H A Dfuzz.yml6 Fuzzing:
/freebsd/contrib/llvm-project/compiler-rt/lib/fuzzer/
H A DFuzzerFlags.def59 FUZZER_FLAG_INT(fork, 0, "Experimental mode where fuzzing happens "
76 FUZZER_FLAG_STRING(stop_file, "Stop fuzzing ASAP if this file exists")
109 "Experimental. Use value profile to guide fuzzing.")
128 FUZZER_FLAG_STRING(artifact_prefix, "Write fuzzing artifacts (crash, "
163 "try to detect memory leaks during fuzzing (i.e. not only at shut down).")
185 "Fuzzing will focus on inputs that trigger calls to this function. "
H A DFuzzerFork.cpp1 //===- FuzzerFork.cpp - run fuzzing in separate subprocesses --------------===//
8 // Spawn and orchestrate separate fuzzing processes.
76 // Fuzzing Outputs.
315 Printf("INFO: -fork=%d: fuzzing in separate process(s)\n", NumJobs); in FuzzWithFork()
H A DFuzzerFork.h1 //===- FuzzerFork.h - run fuzzing in sub-processes --------------*- C++ -* ===//
/freebsd/crypto/openssh/regress/misc/fuzz-harness/testdata/
H A DREADME1 This is preparatory data for fuzzing testing including scripts and test keys,
3 fuzzing seed corpora. They should not be changed unless the affected seed
H A Dcreate-agent-corpus.sh3 # Exercise ssh-agent to generate fuzzing corpus
/freebsd/crypto/openssh/regress/unittests/
H A DMakefile.inc7 UNITTEST_FAST?= no # Skip slow tests (e.g. less intensive fuzzing).
8 UNITTEST_SLOW?= no # Include slower tests (e.g. more intensive fuzzing).
/freebsd/contrib/libfido2/
H A DNEWS17 ** Improved support for different fuzzing engines.
233 ** Better fuzzing harnesses.
244 ** Merged fuzzing instrumentation.
/freebsd/crypto/openssh/regress/misc/fuzz-harness/
H A DREADME1 This directory contains fuzzing harnesses for use with clang's libfuzzer.
/freebsd/contrib/libarchive/.github/workflows/
H A Dcifuzz.yml
/freebsd/crypto/libecc/.github/workflows/
H A Dlibecc_cifuzz.yml4 Fuzzing:
/freebsd/crypto/openssl/test/recipes/
H A Dfuzz.pl22 ok(run(fuzz(["$f-test", $d])), "Fuzzing $f");
/freebsd/crypto/openssh/.github/workflows/
H A Dcifuzz.yml9 Fuzzing:
/freebsd/crypto/openssh/regress/unittests/test_helper/
H A Dtest_helper.h288 /* Fuzzing support */
300 /* Start fuzzing a blob of data with selected strategies (bitmask) */
312 * generated change the input (e.g. when fuzzing signatures).
/freebsd/contrib/llvm-project/compiler-rt/lib/ubsan/
H A Dubsan_flags.inc28 "Used to provide fuzzing signal without blowing up logs.")
/freebsd/contrib/unbound/contrib/
H A Dunbound-fuzzme.patch7 for the purposes of fuzzing.
109 + * unbound-fuzzme.c - parse a packet provided on stdin (for fuzzing).
/freebsd/contrib/libfido2/fuzz/
H A DREADME4 AFL is more convenient when fuzzing the path from the authenticator to
/freebsd/contrib/libcbor/test/
H A Dfuzz_test.c60 printf("Fuzzing %llu rounds of up to %llu bytes with seed %u\n", ROUNDS, in fuzz()
/freebsd/contrib/bc/
H A DMakefile.in103 BC_FUZZ_OUTPUTS = tests/fuzzing/bc_outputs1 tests/fuzzing/bc_outputs2 tests/fuzzing/bc_outputs3
105 DC_FUZZ_OUTPUTS = tests/fuzzing/dc_outputs
/freebsd/contrib/expat/
H A DChanges97 #942 CMake: Small fuzzing related improvements
120 #954 #955 .. Fuzzing: Add new fuzzer "xml_lpm_fuzzer" based on
122 #957 Fuzzing|CI: Start producing fuzzing code coverage reports
124 #942 CI: Small fuzzing related improvements
367 #660 #797 #801 Fuzzing: Improve fuzzing coverage
368 #367 #799 Fuzzing|CI: Start running OSS-Fuzz fuzzing regression tests
/freebsd/contrib/unbound/
H A DREADME.md5 [![Fuzzing Status](https://oss-fuzz-build-logs.storage.googleapis.com/badges/unbound.svg)](https://…
/freebsd/crypto/openssh/.github/
H A Dci-status.md6 [![Fuzzing Status](https://oss-fuzz-build-logs.storage.googleapis.com/badges/openssh.svg)](https://…

1234