| Index: third_party/ots/test/test_malicious_fonts.sh
 | 
| diff --git a/third_party/ots/test/test_malicious_fonts.sh b/third_party/ots/test/test_malicious_fonts.sh
 | 
| new file mode 100755
 | 
| index 0000000000000000000000000000000000000000..7a35f26340db1cbfc6d7235028871d6d74bd23bc
 | 
| --- /dev/null
 | 
| +++ b/third_party/ots/test/test_malicious_fonts.sh
 | 
| @@ -0,0 +1,39 @@
 | 
| +#!/bin/bash
 | 
| +
 | 
| +# Copyright (c) 2009 The Chromium Authors. All rights reserved.
 | 
| +# Use of this source code is governed by a BSD-style license that can be
 | 
| +# found in the LICENSE file.
 | 
| +
 | 
| +# Usage: ./test_malicious_fonts.sh [ttf_or_otf_file_name]
 | 
| +
 | 
| +BASE_DIR=~/malicious/
 | 
| +CHECKER=./validator-checker
 | 
| +
 | 
| +if [ ! -x "$CHECKER" ] ; then
 | 
| +  echo "$CHECKER is not found."
 | 
| +  exit 1
 | 
| +fi
 | 
| +
 | 
| +if [ $# -eq 0 ] ; then
 | 
| +  # No font file is specified. Apply this script to all TT/OT files under the
 | 
| +  # BASE_DIR.
 | 
| +  if [ ! -d $BASE_DIR ] ; then
 | 
| +    echo "$BASE_DIR does not exist."
 | 
| +    exit 1
 | 
| +  fi
 | 
| +
 | 
| +  # Recursively call this script.
 | 
| +  find $BASE_DIR -type f -name '*tf' -exec "$0" {} \;
 | 
| +  echo
 | 
| +  exit 0
 | 
| +fi
 | 
| +
 | 
| +if [ $# -gt 1 ] ; then
 | 
| +  echo "Usage: $0 [ttf_or_otf_file_name]"
 | 
| +  exit 1
 | 
| +fi
 | 
| +
 | 
| +# Confirm that the malicious font file does not crash OTS nor OS font renderer. 
 | 
| +base=`basename "$1"`
 | 
| +"$CHECKER" "$1" > /dev/null 2>&1 || (echo ; echo "\nFAIL: $1 (Run $CHECKER $1 for more information.)")
 | 
| +echo -n "."
 | 
| 
 |