| /freebsd/crypto/openssl/fuzz/ |
| H A D | README.md | 1 Fuzzing OpenSSL 4 OpenSSL can use either LibFuzzer or AFL to do fuzzing. 20 Configure `openssl` for fuzzing. For now, you'll still need to pass in the path 69 Finally, perform the actual fuzzing: 86 fuzzing is the same, except that you also need to specify 106 Configure for fuzzing: 130 don't need to be built for fuzzing, there is no need to set CC or the call 159 connection setup. This results in the coverage of the fuzzing corpus changing 164 Since we want to maximize the coverage of the fuzzing corpus, the client and
|
| H A D | helper.py | 10 """Fuzzing helper, creates and uses corpus/crash directories.
|
| /freebsd/contrib/bc/ |
| H A D | MAINTENANCE-TERMS.md | 26 weeks of fuzzing without error. 36 * Fuzzing. 47 * Fuzzing makes my computer unusable, so fuzzing for the 8-12 hours of the 69 The \$3000 above is the start, which leaves \$12,000. Fuzzing is expected to
|
| H A D | Makefile.in | 104 BC_FUZZ_OUTPUTS = tests/fuzzing/bc_outputs1 tests/fuzzing/bc_outputs2 tests/fuzzing/bc_outputs3 105 DC_FUZZ_OUTPUTS = tests/fuzzing/dc_outputs
|
| /freebsd/contrib/libcbor/.github/workflows/ |
| H A D | fuzz-pr.yml | 1 # A quick CIFuzz sanity check. Fuzzing time is kept low provide fast feedback 2 # on PRs; fuzz.yml schedules a daily long-running fuzzing job. 6 Fuzzing:
|
| H A D | fuzz.yml | 6 Fuzzing:
|
| /freebsd/crypto/openssh/regress/misc/fuzz-harness/testdata/ |
| H A D | README | 1 This is preparatory data for fuzzing testing including scripts and test keys, 3 fuzzing seed corpora. They should not be changed unless the affected seed
|
| H A D | create-agent-corpus.sh | 3 # Exercise ssh-agent to generate fuzzing corpus
|
| /freebsd/contrib/llvm-project/compiler-rt/lib/fuzzer/ |
| H A D | FuzzerFlags.def | 59 FUZZER_FLAG_INT(fork, 0, "Experimental mode where fuzzing happens " 76 FUZZER_FLAG_STRING(stop_file, "Stop fuzzing ASAP if this file exists") 109 "Experimental. Use value profile to guide fuzzing.") 128 FUZZER_FLAG_STRING(artifact_prefix, "Write fuzzing artifacts (crash, " 163 "try to detect memory leaks during fuzzing (i.e. not only at shut down).") 185 "Fuzzing will focus on inputs that trigger calls to this function. "
|
| H A D | FuzzerFork.cpp | 1 //===- FuzzerFork.cpp - run fuzzing in separate subprocesses --------------===// 8 // Spawn and orchestrate separate fuzzing processes. 76 // Fuzzing Outputs. 315 Printf("INFO: -fork=%d: fuzzing in separate process(s)\n", NumJobs); in FuzzWithFork()
|
| H A D | FuzzerFork.h | 1 //===- FuzzerFork.h - run fuzzing in sub-processes --------------*- C++ -* ===//
|
| /freebsd/crypto/openssh/regress/unittests/ |
| H A D | Makefile.inc | 7 UNITTEST_FAST?= no # Skip slow tests (e.g. less intensive fuzzing). 8 UNITTEST_SLOW?= no # Include slower tests (e.g. more intensive fuzzing).
|
| /freebsd/contrib/libfido2/ |
| H A D | NEWS | 17 ** Improved support for different fuzzing engines. 233 ** Better fuzzing harnesses. 244 ** Merged fuzzing instrumentation.
|
| /freebsd/crypto/openssh/regress/misc/fuzz-harness/ |
| H A D | README | 1 This directory contains fuzzing harnesses for use with clang's libfuzzer.
|
| /freebsd/contrib/libarchive/.github/workflows/ |
| H A D | cifuzz.yml | |
| /freebsd/crypto/libecc/.github/workflows/ |
| H A D | libecc_cifuzz.yml | 4 Fuzzing:
|
| /freebsd/crypto/openssl/test/recipes/ |
| H A D | fuzz.pl | 22 ok(run(fuzz(["$f-test", $d])), "Fuzzing $f");
|
| /freebsd/crypto/krb5/.github/workflows/ |
| H A D | cifuzz.yml | 8 Fuzzing:
|
| /freebsd/crypto/openssh/.github/workflows/ |
| H A D | cifuzz.yml | 9 Fuzzing:
|
| /freebsd/crypto/openssh/regress/unittests/test_helper/ |
| H A D | test_helper.h | 288 /* Fuzzing support */ 300 /* Start fuzzing a blob of data with selected strategies (bitmask) */ 312 * generated change the input (e.g. when fuzzing signatures).
|
| /freebsd/contrib/llvm-project/compiler-rt/lib/ubsan/ |
| H A D | ubsan_flags.inc | 28 "Used to provide fuzzing signal without blowing up logs.")
|
| /freebsd/contrib/unbound/contrib/ |
| H A D | unbound-fuzzme.patch | 7 for the purposes of fuzzing. 109 + * unbound-fuzzme.c - parse a packet provided on stdin (for fuzzing).
|
| /freebsd/contrib/libfido2/fuzz/ |
| H A D | README | 4 AFL is more convenient when fuzzing the path from the authenticator to
|
| /freebsd/contrib/libcbor/test/ |
| H A D | fuzz_test.c | 60 printf("Fuzzing %llu rounds of up to %llu bytes with seed %u\n", ROUNDS, in fuzz()
|
| /freebsd/contrib/unbound/ |
| H A D | README.md | 5 [](https://…
|