Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(56)

Side by Side Diff: net/BUILD.gn

Issue 2649983003: A simple fuzzer for HttpServer, with limited coverage of WebSocket. (Closed)
Patch Set: Apply review feedback; tweak the dictionary some to try to get to websocket paths easier. Created 3 years, 11 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 # Copyright (c) 2013 The Chromium Authors. All rights reserved. 1 # Copyright (c) 2013 The Chromium Authors. All rights reserved.
2 # Use of this source code is governed by a BSD-style license that can be 2 # Use of this source code is governed by a BSD-style license that can be
3 # found in the LICENSE file. 3 # found in the LICENSE file.
4 4
5 import("//build/buildflag_header.gni") 5 import("//build/buildflag_header.gni")
6 import("//build/config/chromecast_build.gni") 6 import("//build/config/chromecast_build.gni")
7 import("//build/config/compiler/compiler.gni") 7 import("//build/config/compiler/compiler.gni")
8 import("//build/config/crypto.gni") 8 import("//build/config/crypto.gni")
9 import("//build/config/features.gni") 9 import("//build/config/features.gni")
10 import("//build/config/ui.gni") 10 import("//build/config/ui.gni")
(...skipping 5133 matching lines...) Expand 10 before | Expand all | Expand 10 after
5144 testonly = true 5144 testonly = true
5145 5145
5146 sources = [ 5146 sources = [
5147 "base/fuzzer_test_support.cc", 5147 "base/fuzzer_test_support.cc",
5148 "dns/fuzzed_host_resolver.cc", 5148 "dns/fuzzed_host_resolver.cc",
5149 "dns/fuzzed_host_resolver.h", 5149 "dns/fuzzed_host_resolver.h",
5150 "filter/fuzzed_source_stream.cc", 5150 "filter/fuzzed_source_stream.cc",
5151 "filter/fuzzed_source_stream.h", 5151 "filter/fuzzed_source_stream.h",
5152 "socket/fuzzed_datagram_client_socket.cc", 5152 "socket/fuzzed_datagram_client_socket.cc",
5153 "socket/fuzzed_datagram_client_socket.h", 5153 "socket/fuzzed_datagram_client_socket.h",
5154 "socket/fuzzed_server_socket.cc",
5155 "socket/fuzzed_server_socket.h",
5154 "socket/fuzzed_socket.cc", 5156 "socket/fuzzed_socket.cc",
5155 "socket/fuzzed_socket.h", 5157 "socket/fuzzed_socket.h",
5156 "socket/fuzzed_socket_factory.cc", 5158 "socket/fuzzed_socket_factory.cc",
5157 "socket/fuzzed_socket_factory.h", 5159 "socket/fuzzed_socket_factory.h",
5158 ] 5160 ]
5159 public_deps = [ 5161 public_deps = [
5160 "//base/test:test_support", 5162 "//base/test:test_support",
5161 ] 5163 ]
5162 deps = [ 5164 deps = [
5163 "//base", 5165 "//base",
(...skipping 452 matching lines...) Expand 10 before | Expand all | Expand 10 after
5616 "http/transport_security_state_static_fuzzer.cc", 5618 "http/transport_security_state_static_fuzzer.cc",
5617 ] 5619 ]
5618 deps = [ 5620 deps = [
5619 ":net_fuzzer_test_support", 5621 ":net_fuzzer_test_support",
5620 "//net", 5622 "//net",
5621 ] 5623 ]
5622 dict = 5624 dict =
5623 "data/fuzzer_dictionaries/net_http_transport_security_state_fuzzer.dict" 5625 "data/fuzzer_dictionaries/net_http_transport_security_state_fuzzer.dict"
5624 } 5626 }
5625 5627
5628 fuzzer_test("net_http_server_fuzzer") {
5629 sources = [
5630 "server/http_server_fuzzer.cc",
5631 ]
5632 deps = [
5633 ":http_server",
5634 ":net_fuzzer_test_support",
5635 ":test_support",
5636 "//base",
5637 "//net",
5638 ]
5639 dict = "data/fuzzer_dictionaries/net_http_server_fuzzer.dict"
5640 seed_corpus = "data/fuzzer_data/http_server_requests/"
5641 }
5642
5626 if (host_toolchain == current_toolchain && !is_proto_quic) { 5643 if (host_toolchain == current_toolchain && !is_proto_quic) {
5627 executable("domain_security_preload_generator") { 5644 executable("domain_security_preload_generator") {
5628 sources = [ 5645 sources = [
5629 "tools/domain_security_preload_generator/bit_writer.cc", 5646 "tools/domain_security_preload_generator/bit_writer.cc",
5630 "tools/domain_security_preload_generator/bit_writer.h", 5647 "tools/domain_security_preload_generator/bit_writer.h",
5631 "tools/domain_security_preload_generator/cert_util.cc", 5648 "tools/domain_security_preload_generator/cert_util.cc",
5632 "tools/domain_security_preload_generator/cert_util.h", 5649 "tools/domain_security_preload_generator/cert_util.h",
5633 "tools/domain_security_preload_generator/domain_security_entry.cc", 5650 "tools/domain_security_preload_generator/domain_security_entry.cc",
5634 "tools/domain_security_preload_generator/domain_security_entry.h", 5651 "tools/domain_security_preload_generator/domain_security_entry.h",
5635 "tools/domain_security_preload_generator/domain_security_preload_generator .cc", 5652 "tools/domain_security_preload_generator/domain_security_preload_generator .cc",
(...skipping 12 matching lines...) Expand all
5648 "tools/domain_security_preload_generator/trie/trie_writer.cc", 5665 "tools/domain_security_preload_generator/trie/trie_writer.cc",
5649 "tools/domain_security_preload_generator/trie/trie_writer.h", 5666 "tools/domain_security_preload_generator/trie/trie_writer.h",
5650 ] 5667 ]
5651 deps = [ 5668 deps = [
5652 "//base", 5669 "//base",
5653 "//crypto", 5670 "//crypto",
5654 "//third_party/boringssl", 5671 "//third_party/boringssl",
5655 ] 5672 ]
5656 } 5673 }
5657 } 5674 }
OLDNEW
« no previous file with comments | « no previous file | net/data/fuzzer_data/http_server_requests/get.bin » ('j') | net/server/http_server_fuzzer.cc » ('J')

Powered by Google App Engine
This is Rietveld 408576698