OLD | NEW |
---|---|
1 # Copyright (c) 2013 The Chromium Authors. All rights reserved. | 1 # Copyright (c) 2013 The Chromium Authors. All rights reserved. |
2 # Use of this source code is governed by a BSD-style license that can be | 2 # Use of this source code is governed by a BSD-style license that can be |
3 # found in the LICENSE file. | 3 # found in the LICENSE file. |
4 | 4 |
5 import("//build/buildflag_header.gni") | 5 import("//build/buildflag_header.gni") |
6 import("//build/config/chromecast_build.gni") | 6 import("//build/config/chromecast_build.gni") |
7 import("//build/config/compiler/compiler.gni") | 7 import("//build/config/compiler/compiler.gni") |
8 import("//build/config/crypto.gni") | 8 import("//build/config/crypto.gni") |
9 import("//build/config/features.gni") | 9 import("//build/config/features.gni") |
10 import("//build/config/ui.gni") | 10 import("//build/config/ui.gni") |
(...skipping 5688 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
5699 "http/http_auth_challenge_tokenizer_fuzzer.cc", | 5699 "http/http_auth_challenge_tokenizer_fuzzer.cc", |
5700 ] | 5700 ] |
5701 deps = [ | 5701 deps = [ |
5702 ":net_fuzzer_test_support", | 5702 ":net_fuzzer_test_support", |
5703 ":test_support", | 5703 ":test_support", |
5704 "//base", | 5704 "//base", |
5705 "//net", | 5705 "//net", |
5706 ] | 5706 ] |
5707 } | 5707 } |
5708 | 5708 |
5709 fuzzer_test("net_http_security_headers_expect_ct_fuzzer") { | |
5710 sources = [ | |
5711 "http/http_security_headers_expect_ct_fuzzer.cc", | |
5712 ] | |
5713 deps = [ | |
5714 ":net_fuzzer_test_support", | |
5715 "//base", | |
5716 "//net", | |
5717 "//url", | |
5718 ] | |
5719 dict = "data/fuzzer_dictionaries/net_http_security_headers_fuzzer.dict" | |
mmoroz
2017/04/21 13:17:58
I believe it also would be great to have a `seed_c
estark
2017/04/21 16:37:31
Thanks for the tip! I added a seed corpus of the d
| |
5720 } | |
5721 | |
5709 fuzzer_test("net_http_security_headers_hsts_fuzzer") { | 5722 fuzzer_test("net_http_security_headers_hsts_fuzzer") { |
5710 sources = [ | 5723 sources = [ |
5711 "http/http_security_headers_hsts_fuzzer.cc", | 5724 "http/http_security_headers_hsts_fuzzer.cc", |
5712 ] | 5725 ] |
5713 deps = [ | 5726 deps = [ |
5714 "//base", | 5727 "//base", |
5715 "//net", | 5728 "//net", |
5716 ] | 5729 ] |
5717 dict = "data/fuzzer_dictionaries/net_http_security_headers_fuzzer.dict" | 5730 dict = "data/fuzzer_dictionaries/net_http_security_headers_fuzzer.dict" |
5718 } | 5731 } |
(...skipping 57 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
5776 ] | 5789 ] |
5777 deps = [ | 5790 deps = [ |
5778 ":net_fuzzer_test_support", | 5791 ":net_fuzzer_test_support", |
5779 ":test_support", | 5792 ":test_support", |
5780 "//base", | 5793 "//base", |
5781 "//net", | 5794 "//net", |
5782 ] | 5795 ] |
5783 dict = "data/fuzzer_dictionaries/net_spdy_session_fuzzer.dict" | 5796 dict = "data/fuzzer_dictionaries/net_spdy_session_fuzzer.dict" |
5784 seed_corpus = "data/fuzzer_data/net_spdy_session_fuzzer/" | 5797 seed_corpus = "data/fuzzer_data/net_spdy_session_fuzzer/" |
5785 } | 5798 } |
OLD | NEW |