Searched +full:cargo +full:- +full:fuzz (Results 1 – 25 of 91) sorted by relevance
1234
| /external/rust/crates/libfuzzer-sys/ci/ |
| D | script.sh | 3 set -eux 8 cargo test --doc 11 cargo fuzz build 12 cargo fuzz build --dev 13 (! cargo fuzz run bananas -- -runs=100000) 17 cargo fuzz build 18 cargo fuzz build --dev 19 (! cargo fuzz run rgb -- -runs=10000000) 21 cargo fuzz run rgb \ 22 $(ls ./fuzz/artifacts/rgb/crash-* | head -n 1) [all …]
|
| /external/oss-fuzz/docs/getting-started/new-project-guide/ |
| D | rust_lang.md | 1 --- 7 permalink: /getting-started/new-project-guide/rust-lang/ 8 --- 13 - TOC 15 --- 17 The process of integrating a project written in Rust with OSS-Fuzz is very 19 }}/getting-started/new-project-guide/) process. The key specifics of integrating 22 ## cargo-fuzz support 24 Rust integration with OSS-Fuzz is expected to use [`cargo 25 fuzz`](https://github.com/rust-fuzz/cargo-fuzz) to build fuzzers. The `cargo [all …]
|
| /external/rust/crates/arbitrary/.github/workflows/ |
| D | rust.yml | 8 runs-on: ubuntu-latest 10 - uses: actions/checkout@v3 11 - run: rustup update 12 - name: Build 13 run: cargo build --verbose --all 14 - name: Run tests 15 run: cargo test --verbose --all 18 runs-on: ubuntu-latest 20 - uses: actions/checkout@v3 21 - run: rustup update [all …]
|
| /external/rust/crates/libfuzzer-sys/ |
| D | README.md | 1 # The `libfuzzer-sys` Crate 5 The CPP parts are extracted from compiler-rt git repository with `git filter-branch`. 7 … The Rust compiler has built-in support for LLVM sanitizer support, for now, it's limited to Linux… 11 ### Use `cargo fuzz`! 13 [The recommended way to use this crate with `cargo fuzz`!][cargo-fuzz]. 15 [cargo-fuzz]: https://github.com/rust-fuzz/cargo-fuzz 21 First create a new cargo project: 24 $ cargo new --bin fuzzed 28 Then add a dependency on the `fuzzer-sys` crate and your own crate: 32 libfuzzer-sys = "0.4.0" [all …]
|
| D | Cargo.toml | 1 # THIS FILE IS AUTOMATICALLY GENERATED BY CARGO 3 # When uploading crates to the registry Cargo will automatically 4 # "normalize" Cargo.toml files for maximal compatibility 5 # with all versions of Cargo and also rewrite `path` dependencies 8 # If you are reading this file be aware that the original Cargo.toml 10 # See Cargo.toml.orig for the original contents. 14 name = "libfuzzer-sys" 16 authors = ["The rust-fuzz Project Developers"] 19 license = "MIT/Apache-2.0/NCSA" 20 repository = "https://github.com/rust-fuzz/libfuzzer" [all …]
|
| /external/rust/crates/itoa/.github/workflows/ |
| D | ci.yml | 12 RUSTFLAGS: -Dwarnings 17 runs-on: ubuntu-latest 19 fail-fast: false 22 timeout-minutes: 45 24 - uses: actions/checkout@v3 25 - uses: dtolnay/rust-toolchain@master 28 - run: cargo build 29 - run: cargo test 30 - run: cargo test --release 31 - run: cargo build --no-default-features [all …]
|
| /external/rust/crates/semver/.github/workflows/ |
| D | ci.yml | 13 RUSTFLAGS: -Dwarnings 23 runs-on: ubuntu-latest 25 fail-fast: false 28 timeout-minutes: 45 30 - uses: actions/checkout@v3 31 - uses: dtolnay/rust-toolchain@master 34 - name: Enable type layout randomization 35 run: echo RUSTFLAGS=${RUSTFLAGS}\ -Zrandomize-layout >> $GITHUB_ENV 37 - run: cargo test 38 - run: cargo check --no-default-features [all …]
|
| /external/rust/crates/proc-macro2/.github/workflows/ |
| D | ci.yml | 13 RUSTFLAGS: -Dwarnings 23 runs-on: ubuntu-latest 25 fail-fast: false 28 timeout-minutes: 45 30 - uses: actions/checkout@v3 31 - uses: dtolnay/rust-toolchain@master 34 - run: cargo test 35 - run: cargo test --no-default-features 36 - run: cargo test --features span-locations 37 - name: RUSTFLAGS='--cfg procmacro2_semver_exempt' cargo test [all …]
|
| /external/rust/crates/ryu/.github/workflows/ |
| D | ci.yml | 13 RUSTFLAGS: -Dwarnings 23 runs-on: ubuntu-latest 25 fail-fast: false 28 timeout-minutes: 45 30 - uses: actions/checkout@v3 31 - uses: dtolnay/rust-toolchain@master 34 - name: Enable type layout randomization 35 run: echo RUSTFLAGS=${RUSTFLAGS}\ -Zrandomize-layout >> $GITHUB_ENV 37 - run: cargo test 38 - run: cargo test --features small [all …]
|
| /external/rust/crates/serde_json/.github/workflows/ |
| D | ci.yml | 12 RUSTFLAGS: -Dwarnings 17 runs-on: ${{matrix.os}}-latest 19 fail-fast: false 22 timeout-minutes: 45 24 - uses: actions/checkout@v3 25 - uses: dtolnay/rust-toolchain@nightly 26 - run: cargo test 27 - run: cargo test --features preserve_order --tests -- --skip ui --exact 28 - run: cargo test --features float_roundtrip --tests -- --skip ui --exact 29 - run: cargo test --features arbitrary_precision --tests -- --skip ui --exact [all …]
|
| /external/rust/crates/zip/ |
| D | README.md | 1 zip-rs 4 … Status](https://img.shields.io/github/workflow/status/zip-rs/zip/CI)](https://github.com/zip-rs/z… 14 ---- 29 * Multi-disk 32 ----- 45 zip = { version = "0.6.4", default-features = false } 50 * `aes-crypto`: Enables decryption of files which were encrypted with AES. Supports AE-1 and AE-2 m… 53 * `time`: Enables features using the [time](https://github.com/rust-lang-deprecated/time) crate. 59 ---- 64 - We will always support the latest four minor Rust versions. This gives you a 6 [all …]
|
| /external/oss-fuzz/infra/base-images/base-builder/ |
| D | cargo | 1 #!/bin/bash -eu 8 # http://www.apache.org/licenses/LICENSE-2.0 16 # This is a wrapper around calling cargo 18 # We need this until https://github.com/rust-lang/cargo/issues/5450 is merged 19 # because cargo uses relative paths for the current crate 26 crate_src_abspath=`cargo metadata --no-deps --format-version 1 | jq -r '.workspace_root'` 27 export RUSTFLAGS="$RUSTFLAGS --remap-path-prefix src=$crate_src_abspath/src" 30 if [ "$SANITIZER" = "coverage" ] && [ $1 = "fuzz" ] && [ $2 = "build" ] 32 # hack to turn cargo fuzz build into cargo build so as to get coverage 33 # cargo fuzz adds "--target" "x86_64-unknown-linux-gnu" [all …]
|
| /external/rust/crates/base64/.circleci/ |
| D | config.yml | 7 - build: 11 …# Yes, a single-parameter axis, but means it can be referred to as a cache parameter easily without 13 … # The default rust images (not -slim or -alpine) are based on buildpack-deps. Hopefully this will 35 - image: << parameters.rust_img >> 37 - checkout 38 - restore_cache: 39 …key: project-cache-v5-<< parameters.rust_img >>-<< parameters.toolchain_override >>-{{ checksum "C… 40 - run: 48 - run: 50 command: rustc --version [all …]
|
| /external/rust/beto-rust/nearby/ |
| D | README.md | 19 ### Cargo subsection 21 Install [`cargo-deny`](https://github.com/EmbarkStudios/cargo-deny) 22 and [`cargo-fuzz`](https://github.com/rust-fuzz/cargo-fuzz): 25 cargo install --locked cargo-deny 26 cargo install cargo-fuzz 38 sudo docker build -t nearby_rust:v1.0 . 39 sudo docker run --rm -it nearby_rust:v1.0 46 Running the image runs check-everything.sh to verify all of the targets can 52 sudo docker run -it nearby_rust:v1.0 bash 56 …iner on a remote host](https://code.visualstudio.com/remote/advancedcontainers/develop-remote-host) [all …]
|
| /external/rust/crates/zip/.github/workflows/ |
| D | ci.yaml | 7 - master 10 RUSTFLAGS: -Dwarnings 15 runs-on: ${{ matrix.os }} 18 os: [ubuntu-latest, macOS-latest, windows-latest] 22 - uses: actions/checkout@master 24 - name: Install ${{ matrix.rust }} 25 uses: actions-rs/toolchain@v1 30 - name: check 31 uses: actions-rs/cargo@v1 34 args: --all --bins --examples [all …]
|
| /external/rust/crates/rustc-demangle/.github/workflows/ |
| D | main.yml | 7 runs-on: ubuntu-latest 12 - uses: actions/checkout@v2 13 - name: Install Rust 15 - run: cargo build --all 16 - run: cargo test --all 17 - run: cargo build --features std 20 name: Fuzz Targets 21 runs-on: ubuntu-latest 23 - uses: actions/checkout@v2 26 - run: rustup update nightly && rustup default nightly [all …]
|
| /external/rust/crates/base64/ |
| D | README.md | 3 …-base64/tree/master.svg?style=shield)](https://circleci.com/gh/marshallpierce/rust-base64/tree/mas… 5 <a href="https://www.jetbrains.com/?from=rust-base64"><img src="/icon_CLion.svg" height="40px"/></a> 23 Remove non-base64 characters from your input before decoding. 25 If you have a `Vec` of base64, [retain](https://doc.rust-lang.org/std/vec/struct.Vec.html#method.re… 30 - Use [iter_read](https://crates.io/crates/iter-read) together with `Read`'s `bytes()` to filter ou… 31 - Implement `Read` with a `read()` impl that delegates to your actual `Read`, and then drops any by… 33 ### I need to line-wrap base64, e.g. for MIME/PEM. 35 [line-wrap](https://crates.io/crates/line-wrap) does just that. 44 There are two opportunities for non-canonical encoding (and thus, detection of the same during deco… 53 The `=` pad bytes, on the other hand, are entirely a self-own by the Base64 standard. They do not a… [all …]
|
| /external/oss-fuzz/projects/libra/ |
| D | build.sh | 1 #!/bin/bash -eux 8 # http://www.apache.org/licenses/LICENSE-2.0 18 # Note: This project creates Rust fuzz targets exclusively 21 # ------- 26 # reset flags of OSS-Fuzz 27 export CFLAGS="-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODU… 28 export CXXFLAGS_EXTRA="-stdlib=libc++" 32 cd $SRC/libra/testsuite/libra-fuzzer 35 cargo fetch 38 sed -i "s/link_cpp(&mut build)/build.cpp_link_stdlib(None)/" \ [all …]
|
| /external/rust/crates/smallvec/.github/workflows/ |
| D | main.yml | 15 os: [ubuntu-latest] 17 - toolchain: stable 20 - toolchain: beta 23 - os: windows-latest 26 runs-on: ${{ matrix.os }} 29 - uses: actions/checkout@v2 31 - name: Install packages 32 if: matrix.os == 'ubuntu-latest' 33 …run: sudo apt-get install -y binutils-dev libunwind8-dev libcurl4-openssl-dev libelf-dev libdw-dev… 35 - name: Install toolchain [all …]
|
| /external/rust/crates/arbitrary/ |
| D | README.md | 7 …<img alt="GitHub Actions Status" src="https://github.com/rust-fuzz/rust_arbitrary/workflows/Rust/b… 16 and `cargo-fuzz`](https://github.com/rust-fuzz/cargo-fuzz) or 17 [AFL](https://github.com/rust-fuzz/afl.rs), and to help you turn the raw, 18 untyped byte buffers that they produce into well-typed, valid, structured 19 values. This allows you to combine structure-aware test case generation with 20 coverage-guided, mutation-based fuzzers. 39 Automatically deriving `Arbitrary` requires you to enable the `"derive"` cargo 43 # Cargo.toml 81 // fn(&mut Unstructured) -> arbitrary::Result<T> 92 fn arbitrary_b(u: &mut Unstructured) -> arbitrary::Result<u8> { [all …]
|
| D | Cargo.toml | 1 # THIS FILE IS AUTOMATICALLY GENERATED BY CARGO 3 # When uploading crates to the registry Cargo will automatically 4 # "normalize" Cargo.toml files for maximal compatibility 5 # with all versions of Cargo and also rewrite `path` dependencies 8 # If you are reading this file be aware that the original Cargo.toml 10 # See Cargo.toml.orig for the original contents. 14 rust-version = "1.63.0" 18 "The Rust-Fuzz Project Developers", 32 categories = ["development-tools::testing"] 33 license = "MIT OR Apache-2.0" [all …]
|
| /external/rust/crates/derive_arbitrary/ |
| D | Cargo.toml | 1 # THIS FILE IS AUTOMATICALLY GENERATED BY CARGO 3 # When uploading crates to the registry Cargo will automatically 4 # "normalize" Cargo.toml files for maximal compatibility 5 # with all versions of Cargo and also rewrite `path` dependencies 8 # If you are reading this file be aware that the original Cargo.toml 10 # See Cargo.toml.orig for the original contents. 14 rust-version = "1.63.0" 18 "The Rust-Fuzz Project Developers", 33 categories = ["development-tools::testing"] 34 license = "MIT/Apache-2.0" [all …]
|
| /external/oss-fuzz/projects/servo/ |
| D | build.sh | 1 #!/bin/bash -eu 8 # http://www.apache.org/licenses/LICENSE-2.0 19 cargo fuzz build -O 20 cp fuzz/target/x86_64-unknown-linux-gnu/release/fuzz_document_parse $OUT/ 22 cd $SRC/rust-url/url 23 cargo fuzz build -O 24 cp fuzz/target/x86_64-unknown-linux-gnu/release/parse $OUT/fuzz-url-parse
|
| /external/oss-fuzz/projects/hyperium/ |
| D | build.sh | 1 #!/bin/bash -eu 8 # http://www.apache.org/licenses/LICENSE-2.0 19 cargo fuzz build -O 20 cp ./fuzz/target/x86_64-unknown-linux-gnu/release/fuzz_http $OUT/ 23 cargo fuzz build -O 24 cp ./fuzz/target/x86_64-unknown-linux-gnu/release/fuzz_client $OUT/ 25 cp ./fuzz/target/x86_64-unknown-linux-gnu/release/fuzz_e2e $OUT/ 26 cp ./fuzz/target/x86_64-unknown-linux-gnu/release/fuzz_hpack $OUT/
|
| /external/oss-fuzz/projects/unicode-rs/ |
| D | build.sh | 1 #!/bin/bash -eu 8 # http://www.apache.org/licenses/LICENSE-2.0 20 cd $SRC/unicode-normalization 21 cargo fuzz build -O 22 …cp fuzz/target/x86_64-unknown-linux-gnu/release/unicode-normalization $OUT/unicode-normalization-n… 23 cp fuzz/target/x86_64-unknown-linux-gnu/release/streaming $OUT/unicode-normalization-streaming 26 cd $SRC/unicode-segmentation/ 27 cargo fuzz build -O 28 cp ./fuzz/target/x86_64-unknown-linux-gnu/release/fuzz_target_1 $OUT/unicode-segmentation-fuzzer
|
1234