| 
					
				 | 
			
			
				@@ -95,6 +95,16 @@ LDXX_opt = $(DEFAULT_CXX) 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 CPPFLAGS_opt = -O2 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 DEFINES_opt = NDEBUG 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+VALID_CONFIG_asan-trace-cmp = 1 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+REQUIRE_CUSTOM_LIBRARIES_asan-trace-cmp = 1 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+CC_asan-trace-cmp = clang 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+CXX_asan-trace-cmp = clang++ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+LD_asan-trace-cmp = clang 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+LDXX_asan-trace-cmp = clang++ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+CPPFLAGS_asan-trace-cmp = -O0 -fsanitize-coverage=edge -fsanitize-coverage=trace-cmp -fsanitize=address -fno-omit-frame-pointer -Wno-unused-command-line-argument -DGPR_NO_DIRECT_SYSCALLS 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+LDFLAGS_asan-trace-cmp = -fsanitize=address 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+DEFINES_asan-trace-cmp += GRPC_TEST_SLOWDOWN_BUILD_FACTOR=3 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 VALID_CONFIG_dbg = 1 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 CC_dbg = $(DEFAULT_CC) 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 CXX_dbg = $(DEFAULT_CXX) 
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -109,7 +119,7 @@ CC_easan = clang 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 CXX_easan = clang++ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 LD_easan = clang 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 LDXX_easan = clang++ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-CPPFLAGS_easan = -O0 -fsanitize=address -fno-omit-frame-pointer -Wno-unused-command-line-argument -DGPR_NO_DIRECT_SYSCALLS 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+CPPFLAGS_easan = -O0 -fsanitize-coverage=edge -fsanitize=address -fno-omit-frame-pointer -Wno-unused-command-line-argument -DGPR_NO_DIRECT_SYSCALLS 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 LDFLAGS_easan = -fsanitize=address 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 DEFINES_easan = _DEBUG DEBUG GRPC_EXECUTION_CONTEXT_SANITIZER 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 DEFINES_easan += GRPC_TEST_SLOWDOWN_BUILD_FACTOR=3 
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -120,7 +130,7 @@ CC_asan = clang 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 CXX_asan = clang++ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 LD_asan = clang 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 LDXX_asan = clang++ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-CPPFLAGS_asan = -O0 -fsanitize=address -fno-omit-frame-pointer -Wno-unused-command-line-argument -DGPR_NO_DIRECT_SYSCALLS 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+CPPFLAGS_asan = -O0 -fsanitize-coverage=edge -fsanitize=address -fno-omit-frame-pointer -Wno-unused-command-line-argument -DGPR_NO_DIRECT_SYSCALLS 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 LDFLAGS_asan = -fsanitize=address 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 DEFINES_asan += GRPC_TEST_SLOWDOWN_BUILD_FACTOR=3 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -130,7 +140,7 @@ CC_msan = clang 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 CXX_msan = clang++ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 LD_msan = clang 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 LDXX_msan = clang++ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-CPPFLAGS_msan = -O0 -fsanitize=memory -fsanitize-memory-track-origins -fno-omit-frame-pointer -DGTEST_HAS_TR1_TUPLE=0 -DGTEST_USE_OWN_TR1_TUPLE=1 -Wno-unused-command-line-argument -fPIE -pie -DGPR_NO_DIRECT_SYSCALLS 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+CPPFLAGS_msan = -O0 -fsanitize-coverage=edge -fsanitize=memory -fsanitize-memory-track-origins -fno-omit-frame-pointer -DGTEST_HAS_TR1_TUPLE=0 -DGTEST_USE_OWN_TR1_TUPLE=1 -Wno-unused-command-line-argument -fPIE -pie -DGPR_NO_DIRECT_SYSCALLS 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 LDFLAGS_msan = -fsanitize=memory -DGTEST_HAS_TR1_TUPLE=0 -DGTEST_USE_OWN_TR1_TUPLE=1 -fPIE -pie $(if $(JENKINS_BUILD),-Wl$(comma)-Ttext-segment=0x7e0000000000,) 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 DEFINES_msan = NDEBUG 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 DEFINES_msan += GRPC_TEST_SLOWDOWN_BUILD_FACTOR=4 
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -159,7 +169,7 @@ CC_asan-noleaks = clang 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 CXX_asan-noleaks = clang++ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 LD_asan-noleaks = clang 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 LDXX_asan-noleaks = clang++ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-CPPFLAGS_asan-noleaks = -O0 -fsanitize=address -fno-omit-frame-pointer -Wno-unused-command-line-argument -DGPR_NO_DIRECT_SYSCALLS 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+CPPFLAGS_asan-noleaks = -O0 -fsanitize-coverage=edge -fsanitize=address -fno-omit-frame-pointer -Wno-unused-command-line-argument -DGPR_NO_DIRECT_SYSCALLS 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 LDFLAGS_asan-noleaks = -fsanitize=address 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 DEFINES_asan-noleaks += GRPC_TEST_SLOWDOWN_BUILD_FACTOR=3 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -177,7 +187,7 @@ CC_ubsan = clang 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 CXX_ubsan = clang++ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 LD_ubsan = clang 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 LDXX_ubsan = clang++ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-CPPFLAGS_ubsan = -O1 -fsanitize=undefined -fno-omit-frame-pointer -Wno-unused-command-line-argument 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+CPPFLAGS_ubsan = -O1 -fsanitize-coverage=edge -fsanitize=undefined -fno-omit-frame-pointer -Wno-unused-command-line-argument 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 LDFLAGS_ubsan = -fsanitize=undefined 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 DEFINES_ubsan = NDEBUG 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 DEFINES_ubsan += GRPC_TEST_SLOWDOWN_BUILD_FACTOR=1.5 
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -925,14 +935,17 @@ grpc_jwt_verifier_test: $(BINDIR)/$(CONFIG)/grpc_jwt_verifier_test 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 grpc_print_google_default_creds_token: $(BINDIR)/$(CONFIG)/grpc_print_google_default_creds_token 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 grpc_security_connector_test: $(BINDIR)/$(CONFIG)/grpc_security_connector_test 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 grpc_verify_jwt: $(BINDIR)/$(CONFIG)/grpc_verify_jwt 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+hpack_parser_fuzzer_test: $(BINDIR)/$(CONFIG)/hpack_parser_fuzzer_test 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 hpack_parser_test: $(BINDIR)/$(CONFIG)/hpack_parser_test 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 hpack_table_test: $(BINDIR)/$(CONFIG)/hpack_table_test 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+http_fuzzer_test: $(BINDIR)/$(CONFIG)/http_fuzzer_test 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 http_parser_test: $(BINDIR)/$(CONFIG)/http_parser_test 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 httpcli_format_request_test: $(BINDIR)/$(CONFIG)/httpcli_format_request_test 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 httpcli_test: $(BINDIR)/$(CONFIG)/httpcli_test 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 httpscli_test: $(BINDIR)/$(CONFIG)/httpscli_test 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 init_test: $(BINDIR)/$(CONFIG)/init_test 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 invalid_call_argument_test: $(BINDIR)/$(CONFIG)/invalid_call_argument_test 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+json_fuzzer_test: $(BINDIR)/$(CONFIG)/json_fuzzer_test 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 json_rewrite: $(BINDIR)/$(CONFIG)/json_rewrite 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 json_rewrite_test: $(BINDIR)/$(CONFIG)/json_rewrite_test 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 json_stream_error_test: $(BINDIR)/$(CONFIG)/json_stream_error_test 
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -966,6 +979,7 @@ transport_connectivity_state_test: $(BINDIR)/$(CONFIG)/transport_connectivity_st 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 transport_metadata_test: $(BINDIR)/$(CONFIG)/transport_metadata_test 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 transport_security_test: $(BINDIR)/$(CONFIG)/transport_security_test 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 udp_server_test: $(BINDIR)/$(CONFIG)/udp_server_test 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+uri_fuzzer_test: $(BINDIR)/$(CONFIG)/uri_fuzzer_test 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 uri_parser_test: $(BINDIR)/$(CONFIG)/uri_parser_test 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 workqueue_test: $(BINDIR)/$(CONFIG)/workqueue_test 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 alarm_cpp_test: $(BINDIR)/$(CONFIG)/alarm_cpp_test 
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -7766,6 +7780,38 @@ endif 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 endif 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+HPACK_PARSER_FUZZER_TEST_SRC = \ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+    test/core/transport/chttp2/hpack_parser_fuzzer_test.c \ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+HPACK_PARSER_FUZZER_TEST_OBJS = $(addprefix $(OBJDIR)/$(CONFIG)/, $(addsuffix .o, $(basename $(HPACK_PARSER_FUZZER_TEST_SRC)))) 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ifeq ($(NO_SECURE),true) 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+# You can't build secure targets if you don't have OpenSSL. 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+$(BINDIR)/$(CONFIG)/hpack_parser_fuzzer_test: openssl_dep_error 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+else 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+$(BINDIR)/$(CONFIG)/hpack_parser_fuzzer_test: $(HPACK_PARSER_FUZZER_TEST_OBJS) $(LIBDIR)/$(CONFIG)/libgrpc_test_util.a $(LIBDIR)/$(CONFIG)/libgrpc.a $(LIBDIR)/$(CONFIG)/libgpr_test_util.a $(LIBDIR)/$(CONFIG)/libgpr.a 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+	$(E) "[LD]      Linking $@" 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+	$(Q) mkdir -p `dirname $@` 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+	$(Q) $(LDXX) $(LDFLAGS) $(HPACK_PARSER_FUZZER_TEST_OBJS) $(LIBDIR)/$(CONFIG)/libgrpc_test_util.a $(LIBDIR)/$(CONFIG)/libgrpc.a $(LIBDIR)/$(CONFIG)/libgpr_test_util.a $(LIBDIR)/$(CONFIG)/libgpr.a $(LDLIBS) $(LDLIBS_SECURE) -lFuzzer -o $(BINDIR)/$(CONFIG)/hpack_parser_fuzzer_test 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+endif 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+$(OBJDIR)/$(CONFIG)/test/core/transport/chttp2/hpack_parser_fuzzer_test.o:  $(LIBDIR)/$(CONFIG)/libgrpc_test_util.a $(LIBDIR)/$(CONFIG)/libgrpc.a $(LIBDIR)/$(CONFIG)/libgpr_test_util.a $(LIBDIR)/$(CONFIG)/libgpr.a 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+deps_hpack_parser_fuzzer_test: $(HPACK_PARSER_FUZZER_TEST_OBJS:.o=.dep) 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ifneq ($(NO_SECURE),true) 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ifneq ($(NO_DEPS),true) 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+-include $(HPACK_PARSER_FUZZER_TEST_OBJS:.o=.dep) 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+endif 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+endif 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 HPACK_PARSER_TEST_SRC = \ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				     test/core/transport/chttp2/hpack_parser_test.c \ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -7830,6 +7876,38 @@ endif 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 endif 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+HTTP_FUZZER_TEST_SRC = \ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+    test/core/http/fuzzer.c \ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+HTTP_FUZZER_TEST_OBJS = $(addprefix $(OBJDIR)/$(CONFIG)/, $(addsuffix .o, $(basename $(HTTP_FUZZER_TEST_SRC)))) 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ifeq ($(NO_SECURE),true) 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+# You can't build secure targets if you don't have OpenSSL. 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+$(BINDIR)/$(CONFIG)/http_fuzzer_test: openssl_dep_error 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+else 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+$(BINDIR)/$(CONFIG)/http_fuzzer_test: $(HTTP_FUZZER_TEST_OBJS) $(LIBDIR)/$(CONFIG)/libgrpc_test_util.a $(LIBDIR)/$(CONFIG)/libgrpc.a $(LIBDIR)/$(CONFIG)/libgpr_test_util.a $(LIBDIR)/$(CONFIG)/libgpr.a 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+	$(E) "[LD]      Linking $@" 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+	$(Q) mkdir -p `dirname $@` 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+	$(Q) $(LDXX) $(LDFLAGS) $(HTTP_FUZZER_TEST_OBJS) $(LIBDIR)/$(CONFIG)/libgrpc_test_util.a $(LIBDIR)/$(CONFIG)/libgrpc.a $(LIBDIR)/$(CONFIG)/libgpr_test_util.a $(LIBDIR)/$(CONFIG)/libgpr.a $(LDLIBS) $(LDLIBS_SECURE) -lFuzzer -o $(BINDIR)/$(CONFIG)/http_fuzzer_test 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+endif 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+$(OBJDIR)/$(CONFIG)/test/core/http/fuzzer.o:  $(LIBDIR)/$(CONFIG)/libgrpc_test_util.a $(LIBDIR)/$(CONFIG)/libgrpc.a $(LIBDIR)/$(CONFIG)/libgpr_test_util.a $(LIBDIR)/$(CONFIG)/libgpr.a 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+deps_http_fuzzer_test: $(HTTP_FUZZER_TEST_OBJS:.o=.dep) 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ifneq ($(NO_SECURE),true) 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ifneq ($(NO_DEPS),true) 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+-include $(HTTP_FUZZER_TEST_OBJS:.o=.dep) 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+endif 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+endif 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 HTTP_PARSER_TEST_SRC = \ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				     test/core/http/parser_test.c \ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -8022,6 +8100,38 @@ endif 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 endif 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+JSON_FUZZER_TEST_SRC = \ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+    test/core/json/fuzzer.c \ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+JSON_FUZZER_TEST_OBJS = $(addprefix $(OBJDIR)/$(CONFIG)/, $(addsuffix .o, $(basename $(JSON_FUZZER_TEST_SRC)))) 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ifeq ($(NO_SECURE),true) 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+# You can't build secure targets if you don't have OpenSSL. 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+$(BINDIR)/$(CONFIG)/json_fuzzer_test: openssl_dep_error 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+else 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+$(BINDIR)/$(CONFIG)/json_fuzzer_test: $(JSON_FUZZER_TEST_OBJS) $(LIBDIR)/$(CONFIG)/libgrpc_test_util.a $(LIBDIR)/$(CONFIG)/libgrpc.a $(LIBDIR)/$(CONFIG)/libgpr_test_util.a $(LIBDIR)/$(CONFIG)/libgpr.a 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+	$(E) "[LD]      Linking $@" 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+	$(Q) mkdir -p `dirname $@` 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+	$(Q) $(LDXX) $(LDFLAGS) $(JSON_FUZZER_TEST_OBJS) $(LIBDIR)/$(CONFIG)/libgrpc_test_util.a $(LIBDIR)/$(CONFIG)/libgrpc.a $(LIBDIR)/$(CONFIG)/libgpr_test_util.a $(LIBDIR)/$(CONFIG)/libgpr.a $(LDLIBS) $(LDLIBS_SECURE) -lFuzzer -o $(BINDIR)/$(CONFIG)/json_fuzzer_test 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+endif 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+$(OBJDIR)/$(CONFIG)/test/core/json/fuzzer.o:  $(LIBDIR)/$(CONFIG)/libgrpc_test_util.a $(LIBDIR)/$(CONFIG)/libgrpc.a $(LIBDIR)/$(CONFIG)/libgpr_test_util.a $(LIBDIR)/$(CONFIG)/libgpr.a 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+deps_json_fuzzer_test: $(JSON_FUZZER_TEST_OBJS:.o=.dep) 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ifneq ($(NO_SECURE),true) 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ifneq ($(NO_DEPS),true) 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+-include $(JSON_FUZZER_TEST_OBJS:.o=.dep) 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+endif 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+endif 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 JSON_REWRITE_SRC = \ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				     test/core/json/json_rewrite.c \ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -9078,6 +9188,38 @@ endif 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 endif 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+URI_FUZZER_TEST_SRC = \ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+    test/core/client_config/uri_fuzzer_test.c \ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+URI_FUZZER_TEST_OBJS = $(addprefix $(OBJDIR)/$(CONFIG)/, $(addsuffix .o, $(basename $(URI_FUZZER_TEST_SRC)))) 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ifeq ($(NO_SECURE),true) 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+# You can't build secure targets if you don't have OpenSSL. 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+$(BINDIR)/$(CONFIG)/uri_fuzzer_test: openssl_dep_error 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+else 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+$(BINDIR)/$(CONFIG)/uri_fuzzer_test: $(URI_FUZZER_TEST_OBJS) $(LIBDIR)/$(CONFIG)/libgrpc_test_util.a $(LIBDIR)/$(CONFIG)/libgrpc.a $(LIBDIR)/$(CONFIG)/libgpr_test_util.a $(LIBDIR)/$(CONFIG)/libgpr.a 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+	$(E) "[LD]      Linking $@" 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+	$(Q) mkdir -p `dirname $@` 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+	$(Q) $(LDXX) $(LDFLAGS) $(URI_FUZZER_TEST_OBJS) $(LIBDIR)/$(CONFIG)/libgrpc_test_util.a $(LIBDIR)/$(CONFIG)/libgrpc.a $(LIBDIR)/$(CONFIG)/libgpr_test_util.a $(LIBDIR)/$(CONFIG)/libgpr.a $(LDLIBS) $(LDLIBS_SECURE) -lFuzzer -o $(BINDIR)/$(CONFIG)/uri_fuzzer_test 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+endif 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+$(OBJDIR)/$(CONFIG)/test/core/client_config/uri_fuzzer_test.o:  $(LIBDIR)/$(CONFIG)/libgrpc_test_util.a $(LIBDIR)/$(CONFIG)/libgrpc.a $(LIBDIR)/$(CONFIG)/libgpr_test_util.a $(LIBDIR)/$(CONFIG)/libgpr.a 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+deps_uri_fuzzer_test: $(URI_FUZZER_TEST_OBJS:.o=.dep) 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ifneq ($(NO_SECURE),true) 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ifneq ($(NO_DEPS),true) 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+-include $(URI_FUZZER_TEST_OBJS:.o=.dep) 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+endif 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+endif 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 URI_PARSER_TEST_SRC = \ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				     test/core/client_config/uri_parser_test.c \ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 |