| OLD | NEW |
| 1 # Copyright 2015 The Chromium Authors. All rights reserved. | 1 # Copyright 2015 The Chromium Authors. All rights reserved. |
| 2 # Use of this source code is governed by a BSD-style license that can be | 2 # Use of this source code is governed by a BSD-style license that can be |
| 3 # found in the LICENSE file. | 3 # found in the LICENSE file. |
| 4 | 4 |
| 5 # Individual libfuzzer tests that didn't find their home yet. | 5 # Individual libfuzzer tests that didn't find their home yet. |
| 6 | 6 |
| 7 import("//build/config/features.gni") | 7 import("//build/config/features.gni") |
| 8 import("//media/media_options.gni") | 8 import("//media/media_options.gni") |
| 9 import("//testing/libfuzzer/fuzzer_test.gni") | 9 import("//testing/libfuzzer/fuzzer_test.gni") |
| 10 import("//third_party/pdfium/pdfium.gni") | 10 import("//third_party/pdfium/pdfium.gni") |
| (...skipping 22 matching lines...) Expand all Loading... |
| 33 sources = [ | 33 sources = [ |
| 34 "courgette_fuzzer.cc", | 34 "courgette_fuzzer.cc", |
| 35 ] | 35 ] |
| 36 deps = [ | 36 deps = [ |
| 37 "//base", | 37 "//base", |
| 38 "//courgette:courgette_lib", | 38 "//courgette:courgette_lib", |
| 39 ] | 39 ] |
| 40 additional_configs = [ "//testing/libfuzzer:no_clusterfuzz" ] | 40 additional_configs = [ "//testing/libfuzzer:no_clusterfuzz" ] |
| 41 } | 41 } |
| 42 | 42 |
| 43 fuzzer_test("dns_record_fuzzer") { | |
| 44 sources = [ | |
| 45 "dns_record_fuzzer.cc", | |
| 46 ] | |
| 47 deps = [ | |
| 48 "//base", | |
| 49 "//net", | |
| 50 ] | |
| 51 } | |
| 52 | |
| 53 fuzzer_test("ftp_ctrl_response_fuzzer") { | |
| 54 sources = [ | |
| 55 "ftp_ctrl_response_fuzzer.cc", | |
| 56 ] | |
| 57 deps = [ | |
| 58 "//base", | |
| 59 "//net", | |
| 60 ] | |
| 61 } | |
| 62 | |
| 63 fuzzer_test("ftp_directory_listing_fuzzer") { | |
| 64 sources = [ | |
| 65 "ftp_directory_listing_fuzzer.cc", | |
| 66 ] | |
| 67 deps = [ | |
| 68 "//base", | |
| 69 "//base:i18n", | |
| 70 "//net", | |
| 71 ] | |
| 72 } | |
| 73 | |
| 74 fuzzer_test("language_detection_fuzzer") { | 43 fuzzer_test("language_detection_fuzzer") { |
| 75 sources = [ | 44 sources = [ |
| 76 "language_detection_fuzzer.cc", | 45 "language_detection_fuzzer.cc", |
| 77 ] | 46 ] |
| 78 deps = [ | 47 deps = [ |
| 79 "//base", | 48 "//base", |
| 80 "//components/translate/core/language_detection:language_detection", | 49 "//components/translate/core/language_detection:language_detection", |
| 81 ] | 50 ] |
| 82 } | 51 } |
| 83 | 52 |
| (...skipping 61 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 145 | 114 |
| 146 fuzzer_test("string_to_int_fuzzer") { | 115 fuzzer_test("string_to_int_fuzzer") { |
| 147 sources = [ | 116 sources = [ |
| 148 "string_to_int_fuzzer.cc", | 117 "string_to_int_fuzzer.cc", |
| 149 ] | 118 ] |
| 150 deps = [ | 119 deps = [ |
| 151 "//base", | 120 "//base", |
| 152 ] | 121 ] |
| 153 } | 122 } |
| 154 | 123 |
| 155 fuzzer_test("unescape_url_component_fuzzer") { | |
| 156 sources = [ | |
| 157 "unescape_url_component_fuzzer.cc", | |
| 158 ] | |
| 159 deps = [ | |
| 160 "//base", | |
| 161 "//net", | |
| 162 ] | |
| 163 } | |
| 164 | |
| 165 fuzzer_test("url_parse_fuzzer") { | 124 fuzzer_test("url_parse_fuzzer") { |
| 166 sources = [ | 125 sources = [ |
| 167 "url_parse_fuzzer.cc", | 126 "url_parse_fuzzer.cc", |
| 168 ] | 127 ] |
| 169 deps = [ | 128 deps = [ |
| 170 "//base", | 129 "//base", |
| 171 "//base:i18n", | 130 "//base:i18n", |
| 172 "//url:url", | 131 "//url:url", |
| 173 ] | 132 ] |
| 174 } | 133 } |
| (...skipping 63 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 238 | 197 |
| 239 fuzzer_test("pdf_xml_fuzzer") { | 198 fuzzer_test("pdf_xml_fuzzer") { |
| 240 sources = [] | 199 sources = [] |
| 241 deps = [ | 200 deps = [ |
| 242 "//third_party/pdfium/testing/libfuzzer:pdf_xml_fuzzer", | 201 "//third_party/pdfium/testing/libfuzzer:pdf_xml_fuzzer", |
| 243 ] | 202 ] |
| 244 dict = "dicts/pdf_xml.dict" | 203 dict = "dicts/pdf_xml.dict" |
| 245 } | 204 } |
| 246 } | 205 } |
| 247 | 206 |
| 248 fuzzer_test("websocket_frame_parser_fuzzer") { | |
| 249 sources = [ | |
| 250 "websocket_frame_parser_fuzzer.cc", | |
| 251 ] | |
| 252 deps = [ | |
| 253 "//net", | |
| 254 ] | |
| 255 } | |
| 256 | |
| 257 fuzzer_test("http_chunked_decoder_fuzzer") { | |
| 258 sources = [ | |
| 259 "http_chunked_decoder_fuzzer.cc", | |
| 260 ] | |
| 261 deps = [ | |
| 262 "//net", | |
| 263 ] | |
| 264 } | |
| 265 | |
| 266 fuzzer_test("quic_crypto_framer_parse_message_fuzzer") { | |
| 267 sources = [ | |
| 268 "quic_crypto_framer_parse_message_fuzzer.cc", | |
| 269 ] | |
| 270 deps = [ | |
| 271 "//base", | |
| 272 "//net", | |
| 273 ] | |
| 274 } | |
| 275 | |
| 276 fuzzer_test("sqlite3_prepare_v2_fuzzer") { | 207 fuzzer_test("sqlite3_prepare_v2_fuzzer") { |
| 277 sources = [ | 208 sources = [ |
| 278 "sqlite3_prepare_v2_fuzzer.cc", | 209 "sqlite3_prepare_v2_fuzzer.cc", |
| 279 ] | 210 ] |
| 280 deps = [ | 211 deps = [ |
| 281 "//third_party/sqlite", | 212 "//third_party/sqlite", |
| 282 ] | 213 ] |
| 283 dict = "dicts/sql.dict" | 214 dict = "dicts/sql.dict" |
| 284 } | 215 } |
| 285 | 216 |
| (...skipping 77 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 363 "//v8:wasm_fuzzer", | 294 "//v8:wasm_fuzzer", |
| 364 ] | 295 ] |
| 365 } | 296 } |
| 366 | 297 |
| 367 fuzzer_test("v8_wasm_asmjs_fuzzer") { | 298 fuzzer_test("v8_wasm_asmjs_fuzzer") { |
| 368 sources = [] | 299 sources = [] |
| 369 deps = [ | 300 deps = [ |
| 370 "//v8:wasm_asmjs_fuzzer", | 301 "//v8:wasm_asmjs_fuzzer", |
| 371 ] | 302 ] |
| 372 } | 303 } |
| OLD | NEW |