Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(18)

Side by Side Diff: net/BUILD.gn

Issue 2649983003: A simple fuzzer for HttpServer, with limited coverage of WebSocket. (Closed)
Patch Set: Rebased, looked like doing it automatically failed Created 3 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « no previous file | net/data/fuzzer_data/http_server_requests/get.bin » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 # Copyright (c) 2013 The Chromium Authors. All rights reserved. 1 # Copyright (c) 2013 The Chromium Authors. All rights reserved.
2 # Use of this source code is governed by a BSD-style license that can be 2 # Use of this source code is governed by a BSD-style license that can be
3 # found in the LICENSE file. 3 # found in the LICENSE file.
4 4
5 import("//build/buildflag_header.gni") 5 import("//build/buildflag_header.gni")
6 import("//build/config/chromecast_build.gni") 6 import("//build/config/chromecast_build.gni")
7 import("//build/config/compiler/compiler.gni") 7 import("//build/config/compiler/compiler.gni")
8 import("//build/config/crypto.gni") 8 import("//build/config/crypto.gni")
9 import("//build/config/features.gni") 9 import("//build/config/features.gni")
10 import("//build/config/ui.gni") 10 import("//build/config/ui.gni")
(...skipping 5161 matching lines...) Expand 10 before | Expand all | Expand 10 after
5172 testonly = true 5172 testonly = true
5173 5173
5174 sources = [ 5174 sources = [
5175 "base/fuzzer_test_support.cc", 5175 "base/fuzzer_test_support.cc",
5176 "dns/fuzzed_host_resolver.cc", 5176 "dns/fuzzed_host_resolver.cc",
5177 "dns/fuzzed_host_resolver.h", 5177 "dns/fuzzed_host_resolver.h",
5178 "filter/fuzzed_source_stream.cc", 5178 "filter/fuzzed_source_stream.cc",
5179 "filter/fuzzed_source_stream.h", 5179 "filter/fuzzed_source_stream.h",
5180 "socket/fuzzed_datagram_client_socket.cc", 5180 "socket/fuzzed_datagram_client_socket.cc",
5181 "socket/fuzzed_datagram_client_socket.h", 5181 "socket/fuzzed_datagram_client_socket.h",
5182 "socket/fuzzed_server_socket.cc",
5183 "socket/fuzzed_server_socket.h",
5182 "socket/fuzzed_socket.cc", 5184 "socket/fuzzed_socket.cc",
5183 "socket/fuzzed_socket.h", 5185 "socket/fuzzed_socket.h",
5184 "socket/fuzzed_socket_factory.cc", 5186 "socket/fuzzed_socket_factory.cc",
5185 "socket/fuzzed_socket_factory.h", 5187 "socket/fuzzed_socket_factory.h",
5186 ] 5188 ]
5187 public_deps = [ 5189 public_deps = [
5188 "//base/test:test_support", 5190 "//base/test:test_support",
5189 ] 5191 ]
5190 deps = [ 5192 deps = [
5191 "//base", 5193 "//base",
(...skipping 452 matching lines...) Expand 10 before | Expand all | Expand 10 after
5644 "http/transport_security_state_static_fuzzer.cc", 5646 "http/transport_security_state_static_fuzzer.cc",
5645 ] 5647 ]
5646 deps = [ 5648 deps = [
5647 ":net_fuzzer_test_support", 5649 ":net_fuzzer_test_support",
5648 "//net", 5650 "//net",
5649 ] 5651 ]
5650 dict = 5652 dict =
5651 "data/fuzzer_dictionaries/net_http_transport_security_state_fuzzer.dict" 5653 "data/fuzzer_dictionaries/net_http_transport_security_state_fuzzer.dict"
5652 } 5654 }
5653 5655
5656 fuzzer_test("net_http_server_fuzzer") {
5657 sources = [
5658 "server/http_server_fuzzer.cc",
5659 ]
5660 deps = [
5661 ":http_server",
5662 ":net_fuzzer_test_support",
5663 ":test_support",
5664 "//base",
5665 "//net",
5666 ]
5667 dict = "data/fuzzer_dictionaries/net_http_server_fuzzer.dict"
5668 seed_corpus = "data/fuzzer_data/http_server_requests/"
5669 }
5670
5654 if (host_toolchain == current_toolchain && !is_proto_quic) { 5671 if (host_toolchain == current_toolchain && !is_proto_quic) {
5655 executable("transport_security_state_generator") { 5672 executable("transport_security_state_generator") {
5656 sources = [ 5673 sources = [
5657 "tools/transport_security_state_generator/bit_writer.cc", 5674 "tools/transport_security_state_generator/bit_writer.cc",
5658 "tools/transport_security_state_generator/bit_writer.h", 5675 "tools/transport_security_state_generator/bit_writer.h",
5659 "tools/transport_security_state_generator/cert_util.cc", 5676 "tools/transport_security_state_generator/cert_util.cc",
5660 "tools/transport_security_state_generator/cert_util.h", 5677 "tools/transport_security_state_generator/cert_util.h",
5661 "tools/transport_security_state_generator/huffman/huffman_builder.cc", 5678 "tools/transport_security_state_generator/huffman/huffman_builder.cc",
5662 "tools/transport_security_state_generator/huffman/huffman_builder.h", 5679 "tools/transport_security_state_generator/huffman/huffman_builder.h",
5663 "tools/transport_security_state_generator/pinset.cc", 5680 "tools/transport_security_state_generator/pinset.cc",
(...skipping 12 matching lines...) Expand all
5676 "tools/transport_security_state_generator/trie/trie_writer.cc", 5693 "tools/transport_security_state_generator/trie/trie_writer.cc",
5677 "tools/transport_security_state_generator/trie/trie_writer.h", 5694 "tools/transport_security_state_generator/trie/trie_writer.h",
5678 ] 5695 ]
5679 deps = [ 5696 deps = [
5680 "//base", 5697 "//base",
5681 "//crypto", 5698 "//crypto",
5682 "//third_party/boringssl", 5699 "//third_party/boringssl",
5683 ] 5700 ]
5684 } 5701 }
5685 } 5702 }
OLDNEW
« no previous file with comments | « no previous file | net/data/fuzzer_data/http_server_requests/get.bin » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698