Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(327)

Side by Side Diff: net/BUILD.gn

Issue 2753703002: Add Expect-CT header parsing (Closed)
Patch Set: add txt extensions to seed corpus Created 3 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « no previous file | net/data/fuzzer_data/http_security_headers/http_security_header_000.txt » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 # Copyright (c) 2013 The Chromium Authors. All rights reserved. 1 # Copyright (c) 2013 The Chromium Authors. All rights reserved.
2 # Use of this source code is governed by a BSD-style license that can be 2 # Use of this source code is governed by a BSD-style license that can be
3 # found in the LICENSE file. 3 # found in the LICENSE file.
4 4
5 import("//build/buildflag_header.gni") 5 import("//build/buildflag_header.gni")
6 import("//build/config/chromecast_build.gni") 6 import("//build/config/chromecast_build.gni")
7 import("//build/config/compiler/compiler.gni") 7 import("//build/config/compiler/compiler.gni")
8 import("//build/config/crypto.gni") 8 import("//build/config/crypto.gni")
9 import("//build/config/features.gni") 9 import("//build/config/features.gni")
10 import("//build/config/ui.gni") 10 import("//build/config/ui.gni")
(...skipping 5688 matching lines...) Expand 10 before | Expand all | Expand 10 after
5699 "http/http_auth_challenge_tokenizer_fuzzer.cc", 5699 "http/http_auth_challenge_tokenizer_fuzzer.cc",
5700 ] 5700 ]
5701 deps = [ 5701 deps = [
5702 ":net_fuzzer_test_support", 5702 ":net_fuzzer_test_support",
5703 ":test_support", 5703 ":test_support",
5704 "//base", 5704 "//base",
5705 "//net", 5705 "//net",
5706 ] 5706 ]
5707 } 5707 }
5708 5708
5709 fuzzer_test("net_http_security_headers_expect_ct_fuzzer") {
5710 sources = [
5711 "http/http_security_headers_expect_ct_fuzzer.cc",
5712 ]
5713 deps = [
5714 ":net_fuzzer_test_support",
5715 "//base",
5716 "//net",
5717 "//url",
5718 ]
5719 dict = "data/fuzzer_dictionaries/net_http_security_headers_fuzzer.dict"
5720 seed_corpus = "data/fuzzer_data/http_security_headers/"
5721 }
5722
5709 fuzzer_test("net_http_security_headers_hsts_fuzzer") { 5723 fuzzer_test("net_http_security_headers_hsts_fuzzer") {
5710 sources = [ 5724 sources = [
5711 "http/http_security_headers_hsts_fuzzer.cc", 5725 "http/http_security_headers_hsts_fuzzer.cc",
5712 ] 5726 ]
5713 deps = [ 5727 deps = [
5714 "//base", 5728 "//base",
5715 "//net", 5729 "//net",
5716 ] 5730 ]
5717 dict = "data/fuzzer_dictionaries/net_http_security_headers_fuzzer.dict" 5731 dict = "data/fuzzer_dictionaries/net_http_security_headers_fuzzer.dict"
5732 seed_corpus = "data/fuzzer_data/http_security_headers/"
5718 } 5733 }
5719 5734
5720 fuzzer_test("net_http_security_headers_hpkp_fuzzer") { 5735 fuzzer_test("net_http_security_headers_hpkp_fuzzer") {
5721 sources = [ 5736 sources = [
5722 "http/http_security_headers_hpkp_fuzzer.cc", 5737 "http/http_security_headers_hpkp_fuzzer.cc",
5723 ] 5738 ]
5724 deps = [ 5739 deps = [
5725 ":net_fuzzer_test_support", 5740 ":net_fuzzer_test_support",
5726 "//base", 5741 "//base",
5727 "//net", 5742 "//net",
5728 "//url", 5743 "//url",
5729 ] 5744 ]
5730 dict = "data/fuzzer_dictionaries/net_http_security_headers_fuzzer.dict" 5745 dict = "data/fuzzer_dictionaries/net_http_security_headers_fuzzer.dict"
5746 seed_corpus = "data/fuzzer_data/http_security_headers/"
5731 } 5747 }
5732 5748
5733 fuzzer_test("net_http_security_headers_hpkp_report_only_fuzzer") { 5749 fuzzer_test("net_http_security_headers_hpkp_report_only_fuzzer") {
5734 sources = [ 5750 sources = [
5735 "http/http_security_headers_hpkp_report_only_fuzzer.cc", 5751 "http/http_security_headers_hpkp_report_only_fuzzer.cc",
5736 ] 5752 ]
5737 deps = [ 5753 deps = [
5738 ":net_fuzzer_test_support", 5754 ":net_fuzzer_test_support",
5739 "//base", 5755 "//base",
5740 "//net", 5756 "//net",
(...skipping 35 matching lines...) Expand 10 before | Expand all | Expand 10 after
5776 ] 5792 ]
5777 deps = [ 5793 deps = [
5778 ":net_fuzzer_test_support", 5794 ":net_fuzzer_test_support",
5779 ":test_support", 5795 ":test_support",
5780 "//base", 5796 "//base",
5781 "//net", 5797 "//net",
5782 ] 5798 ]
5783 dict = "data/fuzzer_dictionaries/net_spdy_session_fuzzer.dict" 5799 dict = "data/fuzzer_dictionaries/net_spdy_session_fuzzer.dict"
5784 seed_corpus = "data/fuzzer_data/net_spdy_session_fuzzer/" 5800 seed_corpus = "data/fuzzer_data/net_spdy_session_fuzzer/"
5785 } 5801 }
OLDNEW
« no previous file with comments | « no previous file | net/data/fuzzer_data/http_security_headers/http_security_header_000.txt » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698