/external/chromium_org/tools/ipc_fuzzer/mutate/ |
mutate.cc | 43 class Fuzzer { 89 // One such fuzzer implementation. 90 class DefaultFuzzer : public Fuzzer { 171 // No-op fuzzer. Rewrites each message unchanged to check if the message 173 class NoOpFuzzer : public Fuzzer { 197 static Fuzzer *Create(const std::string& name, int frequency) { 204 std::cerr << "No such fuzzer: " << name << "\n"; 212 static void Fuzz(P* p, Fuzzer *fuzzer) { 221 static void FuzzParam(P* p, Fuzzer* fuzzer) 690 Fuzzer* fuzzer = FuzzerFactory::Create(fuzzer_name, frequency); local [all...] |
cf_package_builder.py | 6 """Creates IPC fuzzer packages suitable for uploading to ClusterFuzz. Stores 26 desc = 'Builder of IPC fuzzer packages for ClusterFuzz' 51 def build_package(self, fuzzer): 52 os.makedirs(fuzzer) 53 fuzzer_src_path = os.path.join(self.mutate_dir, fuzzer + '.py') 54 fuzzer_dst_path = os.path.join(fuzzer, 'run.py') 56 distutils.archive_util.make_zipfile(fuzzer, fuzzer) 57 package_name = fuzzer + '.zip' 66 for fuzzer in self.fuzzer_list [all...] |
ipc_fuzzer_gen.py | 6 """Generational ClusterFuzz fuzzer. It generates IPC messages using 68 fuzzer = GenerationalFuzzer() variable 69 sys.exit(fuzzer.main())
|
ipc_fuzzer_mut.py | 6 """Mutational ClusterFuzz fuzzer. A pre-built corpus of ipcdump files has 10 This fuzzer will pick some ipcdumps from the corpus, concatenate them with 91 fuzzer = MutationalFuzzer() variable 92 sys.exit(fuzzer.main())
|
/external/fio/examples/ |
falloc.fio | 15 [falloc-fuzzer] 24 [punch hole-fuzzer]
|
e4defrag2.fio | 41 [e4defrag-fuzzer-4k] 51 [e4defrag-fuzzer-4k]
|
/external/chromium_org/components/test/data/web_database/ |
version_45.sql | 50 INSERT INTO web_intents VALUES ('http://poodles.com/fuzzer', 'fuzz', 'poodle/*', 'Poodle Fuzzer', 'window'); 51 INSERT INTO web_intents_defaults VALUES ('fuzz', 'poodle/*', '', 0, 0, 'http://poodles.com/fuzzer');
|
/external/chromium_org/tools/ipc_fuzzer/message_lib/ |
all_messages.h | 7 // received by RenderProcessHost should be included here for the IPC fuzzer.
|
/external/chromium_org/tools/ipc_fuzzer/ |
play_testcase.py | 9 IPC fuzzer. The fuzzer will then play back a specified testcase. 53 print 'fuzzer executable not found at ', fuzzer_path 68 '--ipc-fuzzer-testcase=' + args.testcase,
|
remove_close_messages.py | 10 fuzzer should be crafting random ViewHostMsg_Close messages.
|
/external/chromium_org/tools/ipc_fuzzer/replay/ |
replay_process.h | 32 // Extract messages from a file specified by --ipc-fuzzer-testcase=
|
/external/chromium_org/third_party/sqlite/src/src/ |
test_fuzzer.c | 16 ** A fuzzer virtual table is created like this: 18 ** CREATE VIRTUAL TABLE temp.f USING fuzzer; 21 ** Note that all fuzzer virtual tables must be TEMP tables. The 26 ** Before being used, the fuzzer needs to be programmed by giving it 48 ** After all the transformation costs have been set, the fuzzer table 64 ** It is important to put some kind of a limit on the fuzzer output. This 71 ** The fuzzer table can be useful for tasks such as spelling correction. 156 ** A fuzzer virtual-table object 160 char *zClassName; /* Name of this class. Default: "fuzzer" */ 161 fuzzer_rule *pRule; /* All active rules in this fuzzer */ [all...] |
/external/chromium_org/net/spdy/fuzzing/ |
hpack_fuzz_util.h | 65 // A FuzzerContext holds fuzzer input, as well as each of the decoder and
|
hpack_fuzz_util.cc | 116 // ClusterFuzz may truncate input files if the fuzzer ran out of allocated
|
/external/chromium_org/ipc/ |
ipc_fuzzing_tests.cc | 131 // The fuzzer server class. It runs in a child process and expects 188 wos << L"IPC fuzzer:" << caller << " [" << value << L" " << text << L"]\n";
|
/external/pixman/test/ |
blitters-test.c | 5 * Script 'fuzzer-find-diff.pl' can be used to narrow down the problem in
|
utils.h | 100 /* main body of the fuzzer test */
|
affine-test.c | 7 * Script 'fuzzer-find-diff.pl' can be used to narrow down the problem in
|
scaling-test.c | 7 * Script 'fuzzer-find-diff.pl' can be used to narrow down the problem in
|
/external/chromium_org/third_party/skia/samplecode/ |
SampleFuzz.cpp | 374 SampleCode::TitleR(evt, "Fuzzer");
|
/external/clang/docs/ |
MSVCCompatibility.rst | 46 * Record layout: :good:`Complete`. We've tested this with a fuzzer and have
|
/external/skia/samplecode/ |
SampleFuzz.cpp | 374 SampleCode::TitleR(evt, "Fuzzer");
|
/external/chromium_org/sdch/open-vcdiff/src/ |
vcdecoder_test.cc | 135 static const struct Fuzzer {
|
/external/compiler-rt/lib/tsan/tests/unit/ |
tsan_clock_test.cc | 337 TEST(Clock, Fuzzer) {
|
/external/chromium_org/third_party/sqlite/src/test/ |
fuzzer1.test | 14 # The focus of the tests is the word-fuzzer virtual table. 27 catchsql {CREATE VIRTUAL TABLE fault1 USING fuzzer;} 28 } {1 {fuzzer virtual tables must be TEMP}} 30 db eval {CREATE VIRTUAL TABLE temp.f1 USING fuzzer;} 48 CREATE VIRTUAL TABLE temp.f2 USING fuzzer; [all...] |