PK���ȼRY��������€��� �v3.phpUT �øŽg‰gñ“gux �õ��õ��½T]kÛ0}߯pEhìâÙM7X‰çv%”v0֐µ{)Aå:6S$!ÉMJèߕ?R÷!>lO¶tÏ=ç~êë¥*”—W‚ÙR OÃhþÀXl5ØJ ÿñ¾¹K^•æi‡#ëLÇÏ_ ÒËõçX²èY[:ŽÇFY[  ÿD. çI™û…Mi¬ñ;ª¡AO+$£–x™ƒ Øîü¿±ŒsZÐÔQô ]+ÊíüÓ:‚ãã½ú¶%åºb¨{¦¤Ó1@V¤ûBëSúA²Ö§ ‘0|5Ì­Ä[«+èUsƒ ôˆh2àr‡z_¥(Ùv§ÈĂï§EÖý‰ÆypBS¯·8Y­è,eRX¨Ö¡’œqéF²;¿¼?Ø?Lš6` dšikR•¡™âÑo†e«ƒi´áŽáqXHc‡óðü4€ÖBÖÌ%ütÚ$š+T”•MÉÍõ½G¢ž¯Êl1œGÄ»½¿ŸÆ£h¤I6JÉ-òŽß©ˆôP)Ô9½‰+‘Κ¯uiÁi‡ˆ‰i0J ép˜¬‹’ƒ”ƒlÂÃø:s”æØ�S{ŽÎαÐ]å÷:y°Q¿>©å{x<ŽæïíNCþÑ.Mf?¨«2ý}=ûõýî'=£§ÿu•Ü(—¾IIa­"éþ@¶�¿ä9?^-qìÇÞôvŠeÈc ðlacã®xèÄ'®âd¶ çˆSEæódP/ÍÆv{Ô)Ó ?>…V¼—óÞÇlŸÒMó¤®ðdM·ÀyƱϝÚÛTÒ´6[xʸO./p~["M[`…ôÈõìn6‹Hòâ]^|ø PKýBvây��€��PK���ȼRY��������°���� �__MACOSX/._v3.phpUT �øŽg‰gþ“gux �õ��õ��c`cg`b`ðMLVðVˆP€'qƒøˆŽ!!AP&HÇ %PDF-1.7 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R >> >> /MediaBox [0.000 0.000 595.280 841.890] >> endobj 4 0 obj [/PDF /Text ] endobj 5 0 obj << /Producer (���d�o�m�p�d�f� �2�.�0�.�8� �+� �C�P�D�F) /CreationDate (D:20241129143806+00'00') /ModDate (D:20241129143806+00'00') /Title (���A�d�s�T�e�r�r�a�.�c�o�m� �i�n�v�o�i�c�e) >> endobj 6 0 obj << /Type /Page /MediaBox [0.000 0.000 595.280 841.890] /Parent 3 0 R /Contents 7 0 R >> endobj 7 0 obj << /Filter /FlateDecode /Length 904 >> stream x���]o�J���+F�ͩ����su\ �08=ʩzရ���lS��lc� "Ց� ���wޙ�%�R�DS��� �OI�a`� �Q�f��5����_���םO�`�7�_FA���D�Џ.j�a=�j����>��n���R+�P��l�rH�{0��w��0��=W�2D ����G���I�>�_B3ed�H�yJ�G>/��ywy�fk��%�$�2.��d_�h����&)b0��"[\B��*_.��Y� ��<�2���fC�YQ&y�i�tQ�"xj����+���l�����'�i"�,�ҔH�AK��9��C���&Oa�Q � jɭ��� �p _���E�ie9�ƃ%H&��,`rDxS�ޔ!�(�X!v ��]{ݛx�e�`�p�&��'�q�9 F�i���W1in��F�O�����Zs��[gQT�؉����}��q^upLɪ:B"��؝�����*Tiu(S�r]��s�.��s9n�N!K!L�M�?�*[��N�8��c��ۯ�b�� ��� �YZ���SR3�n�����lPN��P�;��^�]�!'�z-���ӊ���/��껣��4�l(M�E�QL��X ��~���G��M|�����*��~�;/=N4�-|y�`�i�\�e�T�<���L��G}�"В�J^���q��"X�?(V�ߣXۆ{��H[����P�� �c���kc�Z�9v�����? �a��R�h|��^�k�D4W���?Iӊ�]<��4�)$wdat���~�����������|�L��x�p|N�*��E� �/4�Qpi�x.>��d����,M�y|4^�Ż��8S/޾���uQe���D�y� ��ͧH�����j�wX � �&z� endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj xref 0 10 0000000000 65535 f 0000000009 00000 n 0000000074 00000 n 0000000120 00000 n 0000000284 00000 n 0000000313 00000 n 0000000514 00000 n 0000000617 00000 n 0000001593 00000 n 0000001700 00000 n trailer << /Size 10 /Root 1 0 R /Info 5 0 R /ID[] >> startxref 1812 %%EOF
Warning: Cannot modify header information - headers already sent by (output started at /home/u866776246/domains/wisatalogung.com/public_html/uploads/produk/1775157541_x.php:1) in /home/u866776246/domains/wisatalogung.com/public_html/uploads/produk/1775157541_x.php on line 128

Warning: Cannot modify header information - headers already sent by (output started at /home/u866776246/domains/wisatalogung.com/public_html/uploads/produk/1775157541_x.php:1) in /home/u866776246/domains/wisatalogung.com/public_html/uploads/produk/1775157541_x.php on line 129

Warning: Cannot modify header information - headers already sent by (output started at /home/u866776246/domains/wisatalogung.com/public_html/uploads/produk/1775157541_x.php:1) in /home/u866776246/domains/wisatalogung.com/public_html/uploads/produk/1775157541_x.php on line 130

Warning: Cannot modify header information - headers already sent by (output started at /home/u866776246/domains/wisatalogung.com/public_html/uploads/produk/1775157541_x.php:1) in /home/u866776246/domains/wisatalogung.com/public_html/uploads/produk/1775157541_x.php on line 131
[!fuzz] skip [short] skip env GOCACHE=$WORK/cache # Test that running a fuzz target that returns without failing or calling # f.Fuzz fails and causes a non-zero exit status. ! go test noop_fuzz_test.go ! stdout ^ok stdout FAIL # Test that fuzzing a fuzz target that returns without failing or calling # f.Fuzz fails and causes a non-zero exit status. ! go test -fuzz=Fuzz -fuzztime=1x noop_fuzz_test.go ! stdout ^ok stdout FAIL # Test that calling f.Error in a fuzz target causes a non-zero exit status. ! go test -fuzz=Fuzz -fuzztime=1x error_fuzz_test.go ! stdout ^ok stdout FAIL # Test that calling f.Fatal in a fuzz target causes a non-zero exit status. ! go test fatal_fuzz_test.go ! stdout ^ok stdout FAIL # Test that successful test exits cleanly. go test success_fuzz_test.go stdout ^ok ! stdout FAIL # Test that successful fuzzing exits cleanly. go test -fuzz=Fuzz -fuzztime=1x success_fuzz_test.go stdout ok ! stdout FAIL # Test that calling f.Fatal while fuzzing causes a non-zero exit status. ! go test -fuzz=Fuzz -fuzztime=1x fatal_fuzz_test.go ! stdout ^ok stdout FAIL # Test error with seed corpus in f.Fuzz ! go test -run FuzzError fuzz_add_test.go ! stdout ^ok stdout FAIL stdout 'error here' [short] stop # Test that calling panic(nil) in a fuzz target causes a non-zero exit status. ! go test panic_fuzz_test.go ! stdout ^ok stdout FAIL # Test that skipped test exits cleanly. go test skipped_fuzz_test.go stdout ok ! stdout FAIL # Test that f.Fatal within f.Fuzz panics ! go test fatal_fuzz_fn_fuzz_test.go ! stdout ^ok ! stdout 'fatal here' stdout FAIL stdout 'fuzz target' # Test that f.Error within f.Fuzz panics ! go test error_fuzz_fn_fuzz_test.go ! stdout ^ok ! stdout 'error here' stdout FAIL stdout 'fuzz target' # Test that f.Fail within f.Fuzz panics ! go test fail_fuzz_fn_fuzz_test.go ! stdout ^ok stdout FAIL stdout 'fuzz target' # Test that f.Skip within f.Fuzz panics ! go test skip_fuzz_fn_fuzz_test.go ! stdout ^ok ! stdout 'skip here' stdout FAIL stdout 'fuzz target' # Test that f.Skipped within f.Fuzz panics ! go test skipped_fuzz_fn_fuzz_test.go ! stdout ^ok ! stdout 'f.Skipped is' stdout FAIL stdout 'fuzz target' stdout 't.Skipped is false' # Test that runtime.Goexit within the fuzz function is an error. ! go test goexit_fuzz_fn_fuzz_test.go ! stdout ^ok stdout FAIL # Test that a call to f.Fatal after the Fuzz func is executed. ! go test fatal_after_fuzz_func_fuzz_test.go ! stdout ok stdout FAIL # Test that missing *T in f.Fuzz causes a non-zero exit status. ! go test incomplete_fuzz_call_fuzz_test.go ! stdout ^ok stdout FAIL # Test that a panic in the Cleanup func is executed. ! go test cleanup_fuzz_test.go ! stdout ^ok stdout FAIL stdout 'failed some precondition' # Test success with seed corpus in f.Fuzz go test -run FuzzPass fuzz_add_test.go stdout ok ! stdout FAIL ! stdout 'off by one error' # Test fatal with seed corpus in f.Fuzz ! go test -run FuzzFatal fuzz_add_test.go ! stdout ^ok stdout FAIL stdout 'fatal here' # Test panic with seed corpus in f.Fuzz ! go test -run FuzzPanic fuzz_add_test.go ! stdout ^ok stdout FAIL stdout 'off by one error' # Test panic(nil) with seed corpus in f.Fuzz ! go test -run FuzzNilPanic fuzz_add_test.go ! stdout ^ok stdout FAIL # Test panic with unsupported seed corpus ! go test -run FuzzUnsupported fuzz_add_test.go ! stdout ^ok stdout FAIL # Test panic with different number of args to f.Add ! go test -run FuzzAddDifferentNumber fuzz_add_test.go ! stdout ^ok stdout FAIL # Test panic with different type of args to f.Add ! go test -run FuzzAddDifferentType fuzz_add_test.go ! stdout ^ok stdout FAIL # Test that the wrong type given with f.Add will fail. ! go test -run FuzzWrongType fuzz_add_test.go ! stdout ^ok stdout '\[string int\], want \[\[\]uint8 int8\]' stdout FAIL # Test fatal with testdata seed corpus ! go test -run FuzzFail corpustesting/fuzz_testdata_corpus_test.go ! stdout ^ok stdout FAIL stdout 'fatal here' # Test pass with testdata seed corpus go test -run FuzzPass corpustesting/fuzz_testdata_corpus_test.go stdout ok ! stdout FAIL ! stdout 'fatal here' # Test pass with testdata and f.Add seed corpus go test -run FuzzPassString corpustesting/fuzz_testdata_corpus_test.go stdout ok ! stdout FAIL # Fuzzing pass with testdata and f.Add seed corpus (skip running tests first) go test -run=None -fuzz=FuzzPassString corpustesting/fuzz_testdata_corpus_test.go -fuzztime=10x stdout ok ! stdout FAIL # Fuzzing pass with testdata and f.Add seed corpus go test -run=FuzzPassString -fuzz=FuzzPassString corpustesting/fuzz_testdata_corpus_test.go -fuzztime=10x stdout ok ! stdout FAIL # Test panic with malformed seed corpus ! go test -run FuzzFail corpustesting/fuzz_testdata_corpus_test.go ! stdout ^ok stdout FAIL # Test pass with file in other nested testdata directory go test -run FuzzInNestedDir corpustesting/fuzz_testdata_corpus_test.go stdout ok ! stdout FAIL ! stdout 'fatal here' # Test fails with file containing wrong type ! go test -run FuzzWrongType corpustesting/fuzz_testdata_corpus_test.go ! stdout ^ok stdout FAIL -- noop_fuzz_test.go -- package noop_fuzz import "testing" func Fuzz(f *testing.F) {} -- error_fuzz_test.go -- package error_fuzz import "testing" func Fuzz(f *testing.F) { f.Error("error in target") } -- fatal_fuzz_test.go -- package fatal_fuzz import "testing" func Fuzz(f *testing.F) { f.Fatal("fatal in target") } -- panic_fuzz_test.go -- package panic_fuzz import "testing" func FuzzPanic(f *testing.F) { panic(nil) } -- success_fuzz_test.go -- package success_fuzz import "testing" func Fuzz(f *testing.F) { f.Fuzz(func (*testing.T, []byte) {}) } -- skipped_fuzz_test.go -- package skipped_fuzz import "testing" func Fuzz(f *testing.F) { f.Skip() } -- fatal_fuzz_fn_fuzz_test.go -- package fatal_fuzz_fn_fuzz import "testing" func Fuzz(f *testing.F) { f.Add([]byte("aa")) f.Fuzz(func(t *testing.T, b []byte) { f.Fatal("fatal here") }) } -- error_fuzz_fn_fuzz_test.go -- package error_fuzz_fn_fuzz import "testing" func Fuzz(f *testing.F) { f.Add([]byte("aa")) f.Fuzz(func(t *testing.T, b []byte) { f.Error("error here") }) } -- fail_fuzz_fn_fuzz_test.go -- package skip_fuzz_fn_fuzz import "testing" func Fuzz(f *testing.F) { f.Add([]byte("aa")) f.Fuzz(func(t *testing.T, b []byte) { f.Fail() }) } -- skip_fuzz_fn_fuzz_test.go -- package skip_fuzz_fn_fuzz import "testing" func Fuzz(f *testing.F) { f.Add([]byte("aa")) f.Fuzz(func(t *testing.T, b []byte) { f.Skip("skip here") }) } -- skipped_fuzz_fn_fuzz_test.go -- package skipped_fuzz_fn_fuzz import "testing" func Fuzz(f *testing.F) { f.Add([]byte("aa")) f.Fuzz(func(t *testing.T, b []byte) { t.Logf("t.Skipped is %t\n", t.Skipped()) t.Logf("f.Skipped is %t\n", f.Skipped()) }) } -- goexit_fuzz_fn_fuzz_test.go -- package goexit_fuzz_fn_fuzz import "testing" func Fuzz(f *testing.F) { f.Add([]byte("aa")) f.Fuzz(func(t *testing.T, b []byte) { runtime.Goexit() }) } -- fatal_after_fuzz_func_fuzz_test.go -- package fatal_after_fuzz_func_fuzz import "testing" func Fuzz(f *testing.F) { f.Fuzz(func(t *testing.T, b []byte) { // no-op }) f.Fatal("this shouldn't be called") } -- incomplete_fuzz_call_fuzz_test.go -- package incomplete_fuzz_call_fuzz import "testing" func Fuzz(f *testing.F) { f.Fuzz(func(b []byte) { // this is missing *testing.T as the first param, so should panic }) } -- cleanup_fuzz_test.go -- package cleanup_fuzz_test import "testing" func Fuzz(f *testing.F) { f.Cleanup(func() { panic("failed some precondition") }) f.Fuzz(func(t *testing.T, b []byte) { // no-op }) } -- fuzz_add_test.go -- package fuzz_add import "testing" func add(f *testing.F) { f.Helper() f.Add([]byte("123")) f.Add([]byte("12345")) f.Add([]byte("")) } func FuzzPass(f *testing.F) { add(f) f.Fuzz(func(t *testing.T, b []byte) { if len(b) == -1 { t.Fatal("fatal here") // will not be executed } }) } func FuzzError(f *testing.F) { add(f) f.Fuzz(func(t *testing.T, b []byte) { if len(b) == 3 { t.Error("error here") } }) } func FuzzFatal(f *testing.F) { add(f) f.Fuzz(func(t *testing.T, b []byte) { if len(b) == 0 { t.Fatal("fatal here") } }) } func FuzzPanic(f *testing.F) { add(f) f.Fuzz(func(t *testing.T, b []byte) { if len(b) == 5 { panic("off by one error") } }) } func FuzzNilPanic(f *testing.F) { add(f) f.Fuzz(func(t *testing.T, b []byte) { if len(b) == 3 { panic(nil) } }) } func FuzzUnsupported(f *testing.F) { m := make(map[string]bool) f.Add(m) f.Fuzz(func(*testing.T, []byte) {}) } func FuzzAddDifferentNumber(f *testing.F) { f.Add([]byte("a")) f.Add([]byte("a"), []byte("b")) f.Fuzz(func(*testing.T, []byte) {}) } func FuzzAddDifferentType(f *testing.F) { f.Add(false) f.Add(1234) f.Fuzz(func(*testing.T, []byte) {}) } func FuzzWrongType(f *testing.F) { f.Add("hello", 50) f.Fuzz(func(*testing.T, []byte, int8) {}) } -- corpustesting/fuzz_testdata_corpus_test.go -- package fuzz_testdata_corpus import "testing" func fuzzFn(f *testing.F) { f.Helper() f.Fuzz(func(t *testing.T, b []byte) { if string(b) == "12345" { t.Fatal("fatal here") } }) } func FuzzFail(f *testing.F) { fuzzFn(f) } func FuzzPass(f *testing.F) { fuzzFn(f) } func FuzzPassString(f *testing.F) { f.Add("some seed corpus") f.Fuzz(func(*testing.T, string) {}) } func FuzzPanic(f *testing.F) { f.Fuzz(func(t *testing.T, b []byte) {}) } func FuzzInNestedDir(f *testing.F) { f.Fuzz(func(t *testing.T, b []byte) {}) } func FuzzWrongType(f *testing.F) { f.Fuzz(func(t *testing.T, b []byte) {}) } -- corpustesting/testdata/fuzz/FuzzFail/1 -- go test fuzz v1 []byte("12345") -- corpustesting/testdata/fuzz/FuzzPass/1 -- go test fuzz v1 []byte("00000") -- corpustesting/testdata/fuzz/FuzzPassString/1 -- go test fuzz v1 string("hello") -- corpustesting/testdata/fuzz/FuzzPanic/1 -- malformed -- corpustesting/testdata/fuzz/FuzzInNestedDir/anotherdir/1 -- go test fuzz v1 []byte("12345") -- corpustesting/testdata/fuzz/FuzzWrongType/1 -- go test fuzz v1 int("00000")