Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(257)

Side by Side Diff: net/BUILD.gn

Issue 2649983003: A simple fuzzer for HttpServer, with limited coverage of WebSocket. (Closed)
Patch Set: Created 3 years, 11 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 # Copyright (c) 2013 The Chromium Authors. All rights reserved. 1 # Copyright (c) 2013 The Chromium Authors. All rights reserved.
2 # Use of this source code is governed by a BSD-style license that can be 2 # Use of this source code is governed by a BSD-style license that can be
3 # found in the LICENSE file. 3 # found in the LICENSE file.
4 4
5 import("//build/buildflag_header.gni") 5 import("//build/buildflag_header.gni")
6 import("//build/config/chromecast_build.gni") 6 import("//build/config/chromecast_build.gni")
7 import("//build/config/compiler/compiler.gni") 7 import("//build/config/compiler/compiler.gni")
8 import("//build/config/crypto.gni") 8 import("//build/config/crypto.gni")
9 import("//build/config/features.gni") 9 import("//build/config/features.gni")
10 import("//build/config/ui.gni") 10 import("//build/config/ui.gni")
(...skipping 1590 matching lines...) Expand 10 before | Expand all | Expand 10 after
1601 testonly = true 1601 testonly = true
1602 1602
1603 sources = [ 1603 sources = [
1604 "base/fuzzer_test_support.cc", 1604 "base/fuzzer_test_support.cc",
1605 "dns/fuzzed_host_resolver.cc", 1605 "dns/fuzzed_host_resolver.cc",
1606 "dns/fuzzed_host_resolver.h", 1606 "dns/fuzzed_host_resolver.h",
1607 "filter/fuzzed_source_stream.cc", 1607 "filter/fuzzed_source_stream.cc",
1608 "filter/fuzzed_source_stream.h", 1608 "filter/fuzzed_source_stream.h",
1609 "socket/fuzzed_datagram_client_socket.cc", 1609 "socket/fuzzed_datagram_client_socket.cc",
1610 "socket/fuzzed_datagram_client_socket.h", 1610 "socket/fuzzed_datagram_client_socket.h",
1611 "socket/fuzzed_server_socket.cc",
1612 "socket/fuzzed_server_socket.h",
1611 "socket/fuzzed_socket.cc", 1613 "socket/fuzzed_socket.cc",
1612 "socket/fuzzed_socket.h", 1614 "socket/fuzzed_socket.h",
1613 "socket/fuzzed_socket_factory.cc", 1615 "socket/fuzzed_socket_factory.cc",
1614 "socket/fuzzed_socket_factory.h", 1616 "socket/fuzzed_socket_factory.h",
1615 ] 1617 ]
1616 public_deps = [ 1618 public_deps = [
1617 "//base/test:test_support", 1619 "//base/test:test_support",
1618 ] 1620 ]
1619 deps = [ 1621 deps = [
1620 "//base", 1622 "//base",
(...skipping 452 matching lines...) Expand 10 before | Expand all | Expand 10 after
2073 "http/transport_security_state_static_fuzzer.cc", 2075 "http/transport_security_state_static_fuzzer.cc",
2074 ] 2076 ]
2075 deps = [ 2077 deps = [
2076 ":net_fuzzer_test_support", 2078 ":net_fuzzer_test_support",
2077 "//net", 2079 "//net",
2078 ] 2080 ]
2079 dict = 2081 dict =
2080 "data/fuzzer_dictionaries/net_http_transport_security_state_fuzzer.dict" 2082 "data/fuzzer_dictionaries/net_http_transport_security_state_fuzzer.dict"
2081 } 2083 }
2082 2084
2085 fuzzer_test("net_http_server_fuzzer") {
2086 sources = [
2087 "server/http_server_fuzzer.cc",
2088 ]
2089 deps = [
2090 ":http_server",
2091 ":net_fuzzer_test_support",
2092 ":test_support",
2093 "//base",
2094 "//net",
2095 ]
2096 dict = "data/fuzzer_dictionaries/net_http_server_fuzzer.dict"
2097 libfuzzer_options = [ "max_len=256" ]
mmenke 2017/01/24 16:29:16 Not needed - the default max length is significant
Maks Orlovich 2017/01/24 18:34:18 The default if I run it from command-line is 64; i
mmenke 2017/01/24 19:03:42 Yes. I think ClusterFuzz randomly varies it on a
Maks Orlovich 2017/01/25 14:54:37 Removed then.
2098 seed_corpus = "data/fuzzer_data/http_server_requests/"
2099 }
2100
2083 if (host_toolchain == current_toolchain) { 2101 if (host_toolchain == current_toolchain) {
2084 executable("domain_security_preload_generator") { 2102 executable("domain_security_preload_generator") {
2085 sources = gypi_values.net_domain_security_state_generator_sources 2103 sources = gypi_values.net_domain_security_state_generator_sources
2086 deps = [ 2104 deps = [
2087 "//base", 2105 "//base",
2088 "//crypto", 2106 "//crypto",
2089 "//third_party/boringssl", 2107 "//third_party/boringssl",
2090 ] 2108 ]
2091 } 2109 }
2092 } 2110 }
OLDNEW
« no previous file with comments | « no previous file | net/data/fuzzer_data/http_server_requests/get.txt » ('j') | net/server/http_server_fuzzer.cc » ('J')

Powered by Google App Engine
This is Rietveld 408576698