Skip to content

Commit 9325a4f

Browse files
committed
http->https
1 parent ddc930f commit 9325a4f

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

70 files changed

+85
-86
lines changed

GNUmakefile

+1-1
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@
1010
# you may not use this file except in compliance with the License.
1111
# You may obtain a copy of the License at:
1212
#
13-
# http://www.apache.org/licenses/LICENSE-2.0
13+
# https://www.apache.org/licenses/LICENSE-2.0
1414
#
1515

1616
# For Heiko:

GNUmakefile.gcc_plugin

+1-1
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@
1717
# you may not use this file except in compliance with the License.
1818
# You may obtain a copy of the License at:
1919
#
20-
# http://www.apache.org/licenses/LICENSE-2.0
20+
# https://www.apache.org/licenses/LICENSE-2.0
2121
#
2222
#TEST_MMAP=1
2323
PREFIX ?= /usr/local

GNUmakefile.llvm

+1-1
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@
1212
# you may not use this file except in compliance with the License.
1313
# You may obtain a copy of the License at:
1414
#
15-
# http://www.apache.org/licenses/LICENSE-2.0
15+
# https://www.apache.org/licenses/LICENSE-2.0
1616
#
1717

1818
# For Heiko:

TODO.md

-1
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,6 @@
22

33
## TODO
44

5-
- AFL_USE_TSAN to docs/env_variables.md after work over
65
- screen update during input2stage
76
- better autodetection of shifting runtime timeout values
87
- Update afl->pending_not_fuzzed for MOpt

afl-cmin.bash

+1-1
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@
1111
# you may not use this file except in compliance with the License.
1212
# You may obtain a copy of the License at:
1313
#
14-
# http://www.apache.org/licenses/LICENSE-2.0
14+
# https://www.apache.org/licenses/LICENSE-2.0
1515
#
1616
# This tool tries to find the smallest subset of files in the input directory
1717
# that still trigger the full range of instrumentation data points seen in

afl-plot

+1-1
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@
1212
# you may not use this file except in compliance with the License.
1313
# You may obtain a copy of the License at:
1414
#
15-
# http://www.apache.org/licenses/LICENSE-2.0
15+
# https://www.apache.org/licenses/LICENSE-2.0
1616
#
1717

1818
get_abs_path() {

afl-whatsup

+1-1
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@
1212
# you may not use this file except in compliance with the License.
1313
# You may obtain a copy of the License at:
1414
#
15-
# http://www.apache.org/licenses/LICENSE-2.0
15+
# https://www.apache.org/licenses/LICENSE-2.0
1616
#
1717
# This tool summarizes the status of any locally-running synchronized
1818
# instances of afl-fuzz.

docs/Changelog.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -2760,7 +2760,7 @@ sending a mail to <[email protected]>.
27602760
- Updated the documentation and added notes_for_asan.txt. Based on feedback
27612761
from Hanno Boeck, Ben Laurie, and others.
27622762

2763-
- Moved the project to http://lcamtuf.coredump.cx/afl/.
2763+
- Moved the project to https://lcamtuf.coredump.cx/afl/.
27642764

27652765
### Version 0.46b:
27662766

docs/INSTALL.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -150,4 +150,4 @@ sysctl kern.sysv.shmseg=48
150150
sysctl kern.sysv.shmall=98304
151151
```
152152

153-
See [http://www.spy-hill.com/help/apple/SharedMemory.html](http://www.spy-hill.com/help/apple/SharedMemory.html) for documentation for these settings and how to make them permanent.
153+
See [https://www.spy-hill.com/help/apple/SharedMemory.html](https://www.spy-hill.com/help/apple/SharedMemory.html) for documentation for these settings and how to make them permanent.

docs/best_practices.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -108,7 +108,7 @@ Four steps are required to do this and it also requires quite some knowledge of
108108

109109
Follow this document on how to do this: [instrumentation/README.instrument_list.md](../instrumentation/README.instrument_list.md).
110110
If `PCGUARD` is used, then you need to follow this guide (needs llvm 12+!):
111-
[http://clang.llvm.org/docs/SanitizerCoverage.html#partially-disabling-instrumentation](http://clang.llvm.org/docs/SanitizerCoverage.html#partially-disabling-instrumentation)
111+
[https://clang.llvm.org/docs/SanitizerCoverage.html#partially-disabling-instrumentation](https://clang.llvm.org/docs/SanitizerCoverage.html#partially-disabling-instrumentation)
112112

113113
Only exclude those functions from instrumentation that provide no value for coverage - that is if it does not process any fuzz data directly or indirectly (e.g. hash maps, thread management etc.).
114114
If however a function directly or indirectly handles fuzz data, then you should not put the function in a deny instrumentation list and rather live with the instability it comes with.

docs/interpreting_output.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ Any existing output directory can be also used to resume aborted jobs; try:
5656

5757
If you have gnuplot installed, you can also generate some pretty graphs for any
5858
active fuzzing task using afl-plot. For an example of how this looks like,
59-
see [http://lcamtuf.coredump.cx/afl/plot/](http://lcamtuf.coredump.cx/afl/plot/).
59+
see [https://lcamtuf.coredump.cx/afl/plot/](https://lcamtuf.coredump.cx/afl/plot/).
6060

6161
You can also manually build and install afl-plot-ui, which is a helper utility
6262
for showing the graphs generated by afl-plot in a graphical window using GTK.

docs/known_limitations.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,6 @@ Here are some of the most important caveats for AFL:
3131
[https://www.fastly.com/blog/how-to-fuzz-server-american-fuzzy-lop](https://www.fastly.com/blog/how-to-fuzz-server-american-fuzzy-lop)
3232

3333
- Occasionally, sentient machines rise against their creators. If this
34-
happens to you, please consult [http://lcamtuf.coredump.cx/prep/](http://lcamtuf.coredump.cx/prep/).
34+
happens to you, please consult [https://lcamtuf.coredump.cx/prep/](https://lcamtuf.coredump.cx/prep/).
3535

3636
Beyond this, see [INSTALL.md](INSTALL.md) for platform-specific tips.

docs/sister_projects.md

+6-6
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ instruction manual.
1515
Allows fuzz-testing of Python programs. Uses custom instrumentation and its
1616
own forkserver.
1717

18-
http://jwilk.net/software/python-afl
18+
https://jwilk.net/software/python-afl
1919

2020
### Go-fuzz (Dmitry Vyukov)
2121

@@ -34,7 +34,7 @@ https://github.com/kmcallister/afl.rs
3434
Adds AFL-compatible instrumentation to OCaml programs.
3535

3636
https://github.com/ocamllabs/opam-repo-dev/pull/23
37-
http://canopy.mirage.io/Posts/Fuzzing
37+
https://canopy.mirage.io/Posts/Fuzzing
3838

3939
### AFL for GCJ Java and other GCC frontends (-)
4040

@@ -54,7 +54,7 @@ some programs to be fuzzed without the fork / execve overhead. (Similar
5454
functionality is now available as the "persistent" feature described in
5555
[the llvm_mode readme](../instrumentation/README.llvm.md))
5656

57-
http://llvm.org/docs/LibFuzzer.html
57+
https://llvm.org/docs/LibFuzzer.html
5858

5959
## TriforceAFL (Tim Newsham and Jesse Hertz)
6060

@@ -189,7 +189,7 @@ https://github.com/bshastry/afl-sancov
189189

190190
Makes it easy to estimate memory usage limits when fuzzing with ASAN or MSAN.
191191

192-
http://jwilk.net/software/recidivm
192+
https://jwilk.net/software/recidivm
193193

194194
### aflize (Jacek Wielemborek)
195195

@@ -274,7 +274,7 @@ https://goo.gl/j9EgFf
274274

275275
A simple SQL shell designed specifically for fuzzing the underlying library.
276276

277-
http://www.sqlite.org/src/artifact/9e7e273da2030371
277+
https://www.sqlite.org/src/artifact/9e7e273da2030371
278278

279279
### Support for Python mutation modules (Christian Holler)
280280

@@ -292,7 +292,7 @@ A similar guided approach as applied to fuzzing syscalls:
292292

293293
https://github.com/google/syzkaller/wiki/Found-Bugs
294294
https://github.com/dvyukov/linux/commit/33787098ffaaa83b8a7ccf519913ac5fd6125931
295-
http://events.linuxfoundation.org/sites/events/files/slides/AFL%20filesystem%20fuzzing%2C%20Vault%202016_0.pdf
295+
https://events.linuxfoundation.org/sites/events/files/slides/AFL%20filesystem%20fuzzing%2C%20Vault%202016_0.pdf
296296

297297

298298
### Kernel Snapshot Fuzzing using Unicornafl (Security in Telecommunications)

docs/technical_details.md

+6-6
Original file line numberDiff line numberDiff line change
@@ -161,8 +161,8 @@ features of the underlying data format, as shown in this image:
161161
Several practical examples of the results of this algorithm are discussed
162162
here:
163163

164-
http://lcamtuf.blogspot.com/2014/11/pulling-jpegs-out-of-thin-air.html
165-
http://lcamtuf.blogspot.com/2014/11/afl-fuzz-nobody-expects-cdata-sections.html
164+
https://lcamtuf.blogspot.com/2014/11/pulling-jpegs-out-of-thin-air.html
165+
https://lcamtuf.blogspot.com/2014/11/afl-fuzz-nobody-expects-cdata-sections.html
166166

167167
The synthetic corpus produced by this process is essentially a compact
168168
collection of "hmm, this does something new!" input files, and can be used to
@@ -323,7 +323,7 @@ value of various fuzzing strategies and optimize their parameters so that they
323323
work equally well across a wide range of file types. The strategies used by
324324
afl-fuzz are generally format-agnostic and are discussed in more detail here:
325325

326-
http://lcamtuf.blogspot.com/2014/08/binary-fuzzing-strategies-what-works.html
326+
https://lcamtuf.blogspot.com/2014/08/binary-fuzzing-strategies-what-works.html
327327

328328
It is somewhat notable that especially early on, most of the work done by
329329
`afl-fuzz` is actually highly deterministic, and progresses to random stacked
@@ -376,7 +376,7 @@ valid grammar for the tested parser.
376376
A discussion of how these features are implemented within afl-fuzz can be found
377377
here:
378378

379-
http://lcamtuf.blogspot.com/2015/01/afl-fuzz-making-up-grammar-with.html
379+
https://lcamtuf.blogspot.com/2015/01/afl-fuzz-making-up-grammar-with.html
380380

381381
In essence, when basic, typically easily-obtained syntax tokens are combined
382382
together in a purely random manner, the instrumentation and the evolutionary
@@ -429,7 +429,7 @@ thrown away.
429429

430430
A detailed discussion of the value of this approach can be found here:
431431

432-
http://lcamtuf.blogspot.com/2014/11/afl-fuzz-crash-exploration-mode.html
432+
https://lcamtuf.blogspot.com/2014/11/afl-fuzz-crash-exploration-mode.html
433433

434434
The method uses instrumentation feedback to explore the state of the crashing
435435
program to get past the ambiguous faulting condition and then isolate the
@@ -447,7 +447,7 @@ goes through `execve()`, linking, and libc initialization only once, and is then
447447
cloned from a stopped process image by leveraging copy-on-write. The
448448
implementation is described in more detail here:
449449

450-
http://lcamtuf.blogspot.com/2014/10/fuzzing-binaries-without-execve.html
450+
https://lcamtuf.blogspot.com/2014/10/fuzzing-binaries-without-execve.html
451451

452452
The fork server is an integral aspect of the injected instrumentation and
453453
simply stops at the first instrumented function to await commands from

frida_mode/Scripting.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -302,7 +302,7 @@ Consider the [following](test/js/test2.c) test code...
302302
Licensed under the Apache License, Version 2.0 (the "License");
303303
you may not use this file except in compliance with the License.
304304
You may obtain a copy of the License at:
305-
http://www.apache.org/licenses/LICENSE-2.0
305+
https://www.apache.org/licenses/LICENSE-2.0
306306
*/
307307
308308
#include <fcntl.h>

include/afl-as.h

+2-2
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@
1616
you may not use this file except in compliance with the License.
1717
You may obtain a copy of the License at:
1818
19-
http://www.apache.org/licenses/LICENSE-2.0
19+
https://www.apache.org/licenses/LICENSE-2.0
2020
2121
This file houses the assembly-level instrumentation injected into fuzzed
2222
programs. The instrumentation stores XORed pairs of data: identifiers of the
@@ -396,7 +396,7 @@ static const u8 *main_payload_32 =
396396
"\n";
397397

398398
/* The OpenBSD hack is due to lahf and sahf not being recognized by some
399-
versions of binutils: http://marc.info/?l=openbsd-cvs&m=141636589924400
399+
versions of binutils: https://marc.info/?l=openbsd-cvs&m=141636589924400
400400
401401
The Apple code is a bit different when calling libc functions because
402402
they are doing relocations differently from everybody else. We also need

include/afl-fuzz.h

+1-1
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@
1616
you may not use this file except in compliance with the License.
1717
You may obtain a copy of the License at:
1818
19-
http://www.apache.org/licenses/LICENSE-2.0
19+
https://www.apache.org/licenses/LICENSE-2.0
2020
2121
This is the real deal: the program takes an instrumented binary and
2222
attempts a variety of basic fuzzing tricks, paying close attention to

include/afl-prealloc.h

+1-1
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@
1616
you may not use this file except in compliance with the License.
1717
You may obtain a copy of the License at:
1818
19-
http://www.apache.org/licenses/LICENSE-2.0
19+
https://www.apache.org/licenses/LICENSE-2.0
2020
2121
*/
2222

include/alloc-inl.h

+1-1
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@
1616
you may not use this file except in compliance with the License.
1717
You may obtain a copy of the License at:
1818
19-
http://www.apache.org/licenses/LICENSE-2.0
19+
https://www.apache.org/licenses/LICENSE-2.0
2020
2121
This allocator is not designed to resist malicious attackers (the canaries
2222
are small and predictable), but provides a robust and portable way to detect

include/cmplog.h

+1-1
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@
1818
you may not use this file except in compliance with the License.
1919
You may obtain a copy of the License at:
2020
21-
http://www.apache.org/licenses/LICENSE-2.0
21+
https://www.apache.org/licenses/LICENSE-2.0
2222
2323
Shared code to handle the shared memory. This is used by the fuzzer
2424
as well the other components like afl-tmin, afl-showmap, etc...

include/common.h

+1-1
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@
1616
you may not use this file except in compliance with the License.
1717
You may obtain a copy of the License at:
1818
19-
http://www.apache.org/licenses/LICENSE-2.0
19+
https://www.apache.org/licenses/LICENSE-2.0
2020
2121
Gather some functions common to multiple executables
2222

include/config.h

+1-1
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@
1616
you may not use this file except in compliance with the License.
1717
You may obtain a copy of the License at:
1818
19-
http://www.apache.org/licenses/LICENSE-2.0
19+
https://www.apache.org/licenses/LICENSE-2.0
2020
2121
*/
2222

include/debug.h

+1-1
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@
1616
you may not use this file except in compliance with the License.
1717
You may obtain a copy of the License at:
1818
19-
http://www.apache.org/licenses/LICENSE-2.0
19+
https://www.apache.org/licenses/LICENSE-2.0
2020
2121
*/
2222

include/forkserver.h

+1-1
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@
1818
you may not use this file except in compliance with the License.
1919
You may obtain a copy of the License at:
2020
21-
http://www.apache.org/licenses/LICENSE-2.0
21+
https://www.apache.org/licenses/LICENSE-2.0
2222
2323
Shared code that implements a forkserver. This is used by the fuzzer
2424
as well the other components like afl-tmin.

include/hash.h

+1-1
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@
2121
you may not use this file except in compliance with the License.
2222
You may obtain a copy of the License at:
2323
24-
http://www.apache.org/licenses/LICENSE-2.0
24+
https://www.apache.org/licenses/LICENSE-2.0
2525
2626
*/
2727

include/list.h

+1-1
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@
1616
you may not use this file except in compliance with the License.
1717
You may obtain a copy of the License at:
1818
19-
http://www.apache.org/licenses/LICENSE-2.0
19+
https://www.apache.org/licenses/LICENSE-2.0
2020
2121
This allocator is not designed to resist malicious attackers (the canaries
2222
are small and predictable), but provides a robust and portable way to detect

include/sharedmem.h

+1-1
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@
1818
you may not use this file except in compliance with the License.
1919
You may obtain a copy of the License at:
2020
21-
http://www.apache.org/licenses/LICENSE-2.0
21+
https://www.apache.org/licenses/LICENSE-2.0
2222
2323
Shared code to handle the shared memory. This is used by the fuzzer
2424
as well the other components like afl-tmin, afl-showmap, etc...

include/snapshot-inl.h

+1-1
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@
1818
you may not use this file except in compliance with the License.
1919
You may obtain a copy of the License at:
2020
21-
http://www.apache.org/licenses/LICENSE-2.0
21+
https://www.apache.org/licenses/LICENSE-2.0
2222
2323
*/
2424

include/types.h

+1-1
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@
1616
you may not use this file except in compliance with the License.
1717
You may obtain a copy of the License at:
1818
19-
http://www.apache.org/licenses/LICENSE-2.0
19+
https://www.apache.org/licenses/LICENSE-2.0
2020
2121
*/
2222

instrumentation/README.llvm.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ load modules (you'll see "Service unavailable" when loading afl-llvm-pass.so).
7575

7676
To solve all your problems, you can grab pre-built binaries for your OS from:
7777

78-
http://llvm.org/releases/download.html
78+
https://llvm.org/releases/download.html
7979

8080
...and then put the bin/ directory from the tarball at the beginning of your
8181
$PATH when compiling the feature and building packages later on. You don't need

instrumentation/afl-compiler-rt.o.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@
99
you may not use this file except in compliance with the License.
1010
You may obtain a copy of the License at:
1111
12-
http://www.apache.org/licenses/LICENSE-2.0
12+
https://www.apache.org/licenses/LICENSE-2.0
1313
1414
1515
*/

instrumentation/afl-gcc-pass.so.cc

+1-1
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@
3030
GNU General Public License for more details.
3131
3232
You should have received a copy of the GNU General Public License
33-
along with this program. If not, see <http://www.gnu.org/licenses/>.
33+
along with this program. If not, see <https://www.gnu.org/licenses/>.
3434
3535
*/
3636

instrumentation/afl-llvm-dict2file.so.cc

+1-1
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@
1010
you may not use this file except in compliance with the License.
1111
You may obtain a copy of the License at:
1212
13-
http://www.apache.org/licenses/LICENSE-2.0
13+
https://www.apache.org/licenses/LICENSE-2.0
1414
1515
This library is plugged into LLVM when invoking clang through afl-clang-lto.
1616

instrumentation/afl-llvm-lto-instrumentation.so.cc

+1-1
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@
1010
you may not use this file except in compliance with the License.
1111
You may obtain a copy of the License at:
1212
13-
http://www.apache.org/licenses/LICENSE-2.0
13+
https://www.apache.org/licenses/LICENSE-2.0
1414
1515
This library is plugged into LLVM when invoking clang through afl-clang-lto.
1616

0 commit comments

Comments
 (0)