Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(191)

Side by Side Diff: testing/libfuzzer/fuzzers/BUILD.gn

Issue 1742813002: Move network fuzzers from //testing/libfuzzer/fuzzers to //net (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@fuzz1
Patch Set: rebase Created 4 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 # Copyright 2015 The Chromium Authors. All rights reserved. 1 # Copyright 2015 The Chromium Authors. All rights reserved.
2 # Use of this source code is governed by a BSD-style license that can be 2 # Use of this source code is governed by a BSD-style license that can be
3 # found in the LICENSE file. 3 # found in the LICENSE file.
4 4
5 # Individual libfuzzer tests that didn't find their home yet. 5 # Individual libfuzzer tests that didn't find their home yet.
6 6
7 import("//build/config/features.gni") 7 import("//build/config/features.gni")
8 import("//media/media_options.gni") 8 import("//media/media_options.gni")
9 import("//testing/libfuzzer/fuzzer_test.gni") 9 import("//testing/libfuzzer/fuzzer_test.gni")
10 import("//third_party/pdfium/pdfium.gni") 10 import("//third_party/pdfium/pdfium.gni")
(...skipping 22 matching lines...) Expand all
33 sources = [ 33 sources = [
34 "courgette_fuzzer.cc", 34 "courgette_fuzzer.cc",
35 ] 35 ]
36 deps = [ 36 deps = [
37 "//base", 37 "//base",
38 "//courgette:courgette_lib", 38 "//courgette:courgette_lib",
39 ] 39 ]
40 additional_configs = [ "//testing/libfuzzer:no_clusterfuzz" ] 40 additional_configs = [ "//testing/libfuzzer:no_clusterfuzz" ]
41 } 41 }
42 42
43 fuzzer_test("dns_record_fuzzer") {
44 sources = [
45 "dns_record_fuzzer.cc",
46 ]
47 deps = [
48 "//base",
49 "//net",
50 ]
51 }
52
53 fuzzer_test("ftp_ctrl_response_fuzzer") {
54 sources = [
55 "ftp_ctrl_response_fuzzer.cc",
56 ]
57 deps = [
58 "//base",
59 "//net",
60 ]
61 }
62
63 fuzzer_test("ftp_directory_listing_fuzzer") {
64 sources = [
65 "ftp_directory_listing_fuzzer.cc",
66 ]
67 deps = [
68 "//base",
69 "//base:i18n",
70 "//net",
71 ]
72 }
73
74 fuzzer_test("language_detection_fuzzer") { 43 fuzzer_test("language_detection_fuzzer") {
75 sources = [ 44 sources = [
76 "language_detection_fuzzer.cc", 45 "language_detection_fuzzer.cc",
77 ] 46 ]
78 deps = [ 47 deps = [
79 "//base", 48 "//base",
80 "//components/translate/core/language_detection:language_detection", 49 "//components/translate/core/language_detection:language_detection",
81 ] 50 ]
82 } 51 }
83 52
(...skipping 61 matching lines...) Expand 10 before | Expand all | Expand 10 after
145 114
146 fuzzer_test("string_to_int_fuzzer") { 115 fuzzer_test("string_to_int_fuzzer") {
147 sources = [ 116 sources = [
148 "string_to_int_fuzzer.cc", 117 "string_to_int_fuzzer.cc",
149 ] 118 ]
150 deps = [ 119 deps = [
151 "//base", 120 "//base",
152 ] 121 ]
153 } 122 }
154 123
155 fuzzer_test("unescape_url_component_fuzzer") {
156 sources = [
157 "unescape_url_component_fuzzer.cc",
158 ]
159 deps = [
160 "//base",
161 "//net",
162 ]
163 }
164
165 fuzzer_test("url_parse_fuzzer") { 124 fuzzer_test("url_parse_fuzzer") {
166 sources = [ 125 sources = [
167 "url_parse_fuzzer.cc", 126 "url_parse_fuzzer.cc",
168 ] 127 ]
169 deps = [ 128 deps = [
170 "//base", 129 "//base",
171 "//base:i18n", 130 "//base:i18n",
172 "//url:url", 131 "//url:url",
173 ] 132 ]
174 } 133 }
(...skipping 63 matching lines...) Expand 10 before | Expand all | Expand 10 after
238 197
239 fuzzer_test("pdf_xml_fuzzer") { 198 fuzzer_test("pdf_xml_fuzzer") {
240 sources = [] 199 sources = []
241 deps = [ 200 deps = [
242 "//third_party/pdfium/testing/libfuzzer:pdf_xml_fuzzer", 201 "//third_party/pdfium/testing/libfuzzer:pdf_xml_fuzzer",
243 ] 202 ]
244 dict = "dicts/pdf_xml.dict" 203 dict = "dicts/pdf_xml.dict"
245 } 204 }
246 } 205 }
247 206
248 fuzzer_test("websocket_frame_parser_fuzzer") {
249 sources = [
250 "websocket_frame_parser_fuzzer.cc",
251 ]
252 deps = [
253 "//net",
254 ]
255 }
256
257 fuzzer_test("http_chunked_decoder_fuzzer") {
258 sources = [
259 "http_chunked_decoder_fuzzer.cc",
260 ]
261 deps = [
262 "//net",
263 ]
264 }
265
266 fuzzer_test("quic_crypto_framer_parse_message_fuzzer") {
267 sources = [
268 "quic_crypto_framer_parse_message_fuzzer.cc",
269 ]
270 deps = [
271 "//base",
272 "//net",
273 ]
274 }
275
276 fuzzer_test("sqlite3_prepare_v2_fuzzer") { 207 fuzzer_test("sqlite3_prepare_v2_fuzzer") {
277 sources = [ 208 sources = [
278 "sqlite3_prepare_v2_fuzzer.cc", 209 "sqlite3_prepare_v2_fuzzer.cc",
279 ] 210 ]
280 deps = [ 211 deps = [
281 "//third_party/sqlite", 212 "//third_party/sqlite",
282 ] 213 ]
283 dict = "dicts/sql.dict" 214 dict = "dicts/sql.dict"
284 } 215 }
285 216
(...skipping 77 matching lines...) Expand 10 before | Expand all | Expand 10 after
363 "//v8:wasm_fuzzer", 294 "//v8:wasm_fuzzer",
364 ] 295 ]
365 } 296 }
366 297
367 fuzzer_test("v8_wasm_asmjs_fuzzer") { 298 fuzzer_test("v8_wasm_asmjs_fuzzer") {
368 sources = [] 299 sources = []
369 deps = [ 300 deps = [
370 "//v8:wasm_asmjs_fuzzer", 301 "//v8:wasm_asmjs_fuzzer",
371 ] 302 ]
372 } 303 }
OLDNEW
« no previous file with comments | « net/websockets/websocket_frame_parser_fuzzer.cc ('k') | testing/libfuzzer/fuzzers/dns_record_fuzzer.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698