diff options
author | Matt A. Tobin <mattatobin@localhost.localdomain> | 2018-02-02 04:16:08 -0500 |
---|---|---|
committer | Matt A. Tobin <mattatobin@localhost.localdomain> | 2018-02-02 04:16:08 -0500 |
commit | 5f8de423f190bbb79a62f804151bc24824fa32d8 (patch) | |
tree | 10027f336435511475e392454359edea8e25895d /security/nss/fuzz/fuzz.gyp | |
parent | 49ee0794b5d912db1f95dce6eb52d781dc210db5 (diff) | |
download | UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.gz UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.lz UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.xz UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.zip |
Add m-esr52 at 52.6.0
Diffstat (limited to 'security/nss/fuzz/fuzz.gyp')
-rw-r--r-- | security/nss/fuzz/fuzz.gyp | 65 |
1 files changed, 65 insertions, 0 deletions
diff --git a/security/nss/fuzz/fuzz.gyp b/security/nss/fuzz/fuzz.gyp new file mode 100644 index 000000000..4321c5cf5 --- /dev/null +++ b/security/nss/fuzz/fuzz.gyp @@ -0,0 +1,65 @@ +# This Source Code Form is subject to the terms of the Mozilla Public +# License, v. 2.0. If a copy of the MPL was not distributed with this +# file, You can obtain one at http://mozilla.org/MPL/2.0/. +{ + 'includes': [ + '../coreconf/config.gypi', + '../cmd/platlibs.gypi' + ], + 'targets': [ + { + 'target_name': 'libFuzzer', + 'type': 'static_library', + 'sources': [ + 'libFuzzer/FuzzerCrossOver.cpp', + 'libFuzzer/FuzzerDriver.cpp', + 'libFuzzer/FuzzerExtFunctionsDlsym.cpp', + 'libFuzzer/FuzzerExtFunctionsWeak.cpp', + 'libFuzzer/FuzzerIO.cpp', + 'libFuzzer/FuzzerLoop.cpp', + 'libFuzzer/FuzzerMutate.cpp', + 'libFuzzer/FuzzerSHA1.cpp', + 'libFuzzer/FuzzerTracePC.cpp', + 'libFuzzer/FuzzerTraceState.cpp', + 'libFuzzer/FuzzerUtil.cpp', + 'libFuzzer/FuzzerUtilDarwin.cpp', + 'libFuzzer/FuzzerUtilLinux.cpp', + ], + 'cflags': [ + '-O2', + ], + 'cflags/': [ + ['exclude', '-fsanitize='], + ['exclude', '-fsanitize-'], + ], + 'xcode_settings': { + 'GCC_OPTIMIZATION_LEVEL': '2', # -O2 + 'OTHER_CFLAGS/': [ + ['exclude', '-fsanitize='], + ['exclude', '-fsanitize-'], + ], + }, + }, + { + 'target_name': 'nssfuzz', + 'type': 'executable', + 'sources': [ + 'nssfuzz.cc', + 'pkcs8_target.cc', + 'quickder_targets.cc', + ], + 'dependencies': [ + '<(DEPTH)/exports.gyp:nss_exports', + 'libFuzzer', + ] + } + ], + 'target_defaults': { + 'include_dirs': [ + 'libFuzzer', + ], + }, + 'variables': { + 'module': 'nss', + } +} |