Home
last modified time | relevance | path

Searched full:fuzzing (Results 1 – 25 of 96) sorted by relevance

1234

/freebsd/crypto/openssl/fuzz/
H A DREADME.md1 Fuzzing OpenSSL
4 OpenSSL can use either LibFuzzer or AFL to do fuzzing.
20 Configure `openssl` for fuzzing. For now, you'll still need to pass in the path
69 Finally, perform the actual fuzzing:
86 fuzzing is the same, except that you also need to specify
106 Configure for fuzzing:
130 don't need to be built for fuzzing, there is no need to set CC or the call
159 connection setup. This results in the coverage of the fuzzing corpus changing
164 Since we want to maximize the coverage of the fuzzing corpus, the client and
H A Dhelper.py10 """Fuzzing helper, creates and uses corpus/crash directories.
/freebsd/contrib/bc/
H A DMAINTENANCE-TERMS.md26 weeks of fuzzing without error.
36 * Fuzzing.
47 * Fuzzing makes my computer unusable, so fuzzing for the 8-12 hours of the
69 The \$3000 above is the start, which leaves \$12,000. Fuzzing is expected to
H A DMakefile.in104 BC_FUZZ_OUTPUTS = tests/fuzzing/bc_outputs1 tests/fuzzing/bc_outputs2 tests/fuzzing/bc_outputs3
105 DC_FUZZ_OUTPUTS = tests/fuzzing/dc_outputs
/freebsd/contrib/libcbor/.github/workflows/
H A Dfuzz-pr.yml1 # A quick CIFuzz sanity check. Fuzzing time is kept low provide fast feedback
2 # on PRs; fuzz.yml schedules a daily long-running fuzzing job.
6 Fuzzing:
H A Dfuzz.yml6 Fuzzing:
/freebsd/crypto/openssh/regress/misc/fuzz-harness/testdata/
H A DREADME1 This is preparatory data for fuzzing testing including scripts and test keys,
3 fuzzing seed corpora. They should not be changed unless the affected seed
H A Dcreate-agent-corpus.sh3 # Exercise ssh-agent to generate fuzzing corpus
/freebsd/contrib/llvm-project/compiler-rt/lib/fuzzer/
H A DFuzzerFlags.def59 FUZZER_FLAG_INT(fork, 0, "Experimental mode where fuzzing happens "
76 FUZZER_FLAG_STRING(stop_file, "Stop fuzzing ASAP if this file exists")
109 "Experimental. Use value profile to guide fuzzing.")
128 FUZZER_FLAG_STRING(artifact_prefix, "Write fuzzing artifacts (crash, "
163 "try to detect memory leaks during fuzzing (i.e. not only at shut down).")
185 "Fuzzing will focus on inputs that trigger calls to this function. "
H A DFuzzerFork.cpp1 //===- FuzzerFork.cpp - run fuzzing in separate subprocesses --------------===//
8 // Spawn and orchestrate separate fuzzing processes.
76 // Fuzzing Outputs.
315 Printf("INFO: -fork=%d: fuzzing in separate process(s)\n", NumJobs); in FuzzWithFork()
H A DFuzzerFork.h1 //===- FuzzerFork.h - run fuzzing in sub-processes --------------*- C++ -* ===//
/freebsd/crypto/openssh/regress/unittests/
H A DMakefile.inc7 UNITTEST_FAST?= no # Skip slow tests (e.g. less intensive fuzzing).
8 UNITTEST_SLOW?= no # Include slower tests (e.g. more intensive fuzzing).
/freebsd/contrib/libfido2/
H A DNEWS17 ** Improved support for different fuzzing engines.
233 ** Better fuzzing harnesses.
244 ** Merged fuzzing instrumentation.
/freebsd/crypto/openssh/regress/misc/fuzz-harness/
H A DREADME1 This directory contains fuzzing harnesses for use with clang's libfuzzer.
/freebsd/contrib/libarchive/.github/workflows/
H A Dcifuzz.yml
/freebsd/crypto/libecc/.github/workflows/
H A Dlibecc_cifuzz.yml4 Fuzzing:
/freebsd/crypto/openssl/test/recipes/
H A Dfuzz.pl22 ok(run(fuzz(["$f-test", $d])), "Fuzzing $f");
/freebsd/crypto/krb5/.github/workflows/
H A Dcifuzz.yml8 Fuzzing:
/freebsd/crypto/openssh/.github/workflows/
H A Dcifuzz.yml9 Fuzzing:
/freebsd/crypto/openssh/regress/unittests/test_helper/
H A Dtest_helper.h288 /* Fuzzing support */
300 /* Start fuzzing a blob of data with selected strategies (bitmask) */
312 * generated change the input (e.g. when fuzzing signatures).
/freebsd/contrib/llvm-project/compiler-rt/lib/ubsan/
H A Dubsan_flags.inc28 "Used to provide fuzzing signal without blowing up logs.")
/freebsd/contrib/unbound/contrib/
H A Dunbound-fuzzme.patch7 for the purposes of fuzzing.
109 + * unbound-fuzzme.c - parse a packet provided on stdin (for fuzzing).
/freebsd/contrib/libfido2/fuzz/
H A DREADME4 AFL is more convenient when fuzzing the path from the authenticator to
/freebsd/contrib/libcbor/test/
H A Dfuzz_test.c60 printf("Fuzzing %llu rounds of up to %llu bytes with seed %u\n", ROUNDS, in fuzz()
/freebsd/contrib/unbound/
H A DREADME.md5 [![Fuzzing Status](https://oss-fuzz-build-logs.storage.googleapis.com/badges/unbound.svg)](https://…

1234