Home
last modified time | relevance | path

Searched +full:cargo +full:- +full:fuzz (Results 1 – 25 of 91) sorted by relevance

1234

/external/rust/crates/libfuzzer-sys/ci/
Dscript.sh3 set -eux
8 cargo test --doc
11 cargo fuzz build
12 cargo fuzz build --dev
13 (! cargo fuzz run bananas -- -runs=100000)
17 cargo fuzz build
18 cargo fuzz build --dev
19 (! cargo fuzz run rgb -- -runs=10000000)
21 cargo fuzz run rgb \
22 $(ls ./fuzz/artifacts/rgb/crash-* | head -n 1)
[all …]
/external/oss-fuzz/docs/getting-started/new-project-guide/
Drust_lang.md1 ---
7 permalink: /getting-started/new-project-guide/rust-lang/
8 ---
13 - TOC
15 ---
17 The process of integrating a project written in Rust with OSS-Fuzz is very
19 }}/getting-started/new-project-guide/) process. The key specifics of integrating
22 ## cargo-fuzz support
24 Rust integration with OSS-Fuzz is expected to use [`cargo
25 fuzz`](https://github.com/rust-fuzz/cargo-fuzz) to build fuzzers. The `cargo
[all …]
/external/rust/crates/arbitrary/.github/workflows/
Drust.yml8 runs-on: ubuntu-latest
10 - uses: actions/checkout@v3
11 - run: rustup update
12 - name: Build
13 run: cargo build --verbose --all
14 - name: Run tests
15 run: cargo test --verbose --all
18 runs-on: ubuntu-latest
20 - uses: actions/checkout@v3
21 - run: rustup update
[all …]
/external/rust/crates/libfuzzer-sys/
DREADME.md1 # The `libfuzzer-sys` Crate
5 The CPP parts are extracted from compiler-rt git repository with `git filter-branch`.
7 … The Rust compiler has built-in support for LLVM sanitizer support, for now, it's limited to Linux…
11 ### Use `cargo fuzz`!
13 [The recommended way to use this crate with `cargo fuzz`!][cargo-fuzz].
15 [cargo-fuzz]: https://github.com/rust-fuzz/cargo-fuzz
21 First create a new cargo project:
24 $ cargo new --bin fuzzed
28 Then add a dependency on the `fuzzer-sys` crate and your own crate:
32 libfuzzer-sys = "0.4.0"
[all …]
DCargo.toml1 # THIS FILE IS AUTOMATICALLY GENERATED BY CARGO
3 # When uploading crates to the registry Cargo will automatically
4 # "normalize" Cargo.toml files for maximal compatibility
5 # with all versions of Cargo and also rewrite `path` dependencies
8 # If you are reading this file be aware that the original Cargo.toml
10 # See Cargo.toml.orig for the original contents.
14 name = "libfuzzer-sys"
16 authors = ["The rust-fuzz Project Developers"]
19 license = "MIT/Apache-2.0/NCSA"
20 repository = "https://github.com/rust-fuzz/libfuzzer"
[all …]
/external/rust/crates/itoa/.github/workflows/
Dci.yml12 RUSTFLAGS: -Dwarnings
17 runs-on: ubuntu-latest
19 fail-fast: false
22 timeout-minutes: 45
24 - uses: actions/checkout@v3
25 - uses: dtolnay/rust-toolchain@master
28 - run: cargo build
29 - run: cargo test
30 - run: cargo test --release
31 - run: cargo build --no-default-features
[all …]
/external/rust/crates/semver/.github/workflows/
Dci.yml13 RUSTFLAGS: -Dwarnings
23 runs-on: ubuntu-latest
25 fail-fast: false
28 timeout-minutes: 45
30 - uses: actions/checkout@v3
31 - uses: dtolnay/rust-toolchain@master
34 - name: Enable type layout randomization
35 run: echo RUSTFLAGS=${RUSTFLAGS}\ -Zrandomize-layout >> $GITHUB_ENV
37 - run: cargo test
38 - run: cargo check --no-default-features
[all …]
/external/rust/crates/proc-macro2/.github/workflows/
Dci.yml13 RUSTFLAGS: -Dwarnings
23 runs-on: ubuntu-latest
25 fail-fast: false
28 timeout-minutes: 45
30 - uses: actions/checkout@v3
31 - uses: dtolnay/rust-toolchain@master
34 - run: cargo test
35 - run: cargo test --no-default-features
36 - run: cargo test --features span-locations
37 - name: RUSTFLAGS='--cfg procmacro2_semver_exempt' cargo test
[all …]
/external/rust/crates/ryu/.github/workflows/
Dci.yml13 RUSTFLAGS: -Dwarnings
23 runs-on: ubuntu-latest
25 fail-fast: false
28 timeout-minutes: 45
30 - uses: actions/checkout@v3
31 - uses: dtolnay/rust-toolchain@master
34 - name: Enable type layout randomization
35 run: echo RUSTFLAGS=${RUSTFLAGS}\ -Zrandomize-layout >> $GITHUB_ENV
37 - run: cargo test
38 - run: cargo test --features small
[all …]
/external/rust/crates/serde_json/.github/workflows/
Dci.yml12 RUSTFLAGS: -Dwarnings
17 runs-on: ${{matrix.os}}-latest
19 fail-fast: false
22 timeout-minutes: 45
24 - uses: actions/checkout@v3
25 - uses: dtolnay/rust-toolchain@nightly
26 - run: cargo test
27 - run: cargo test --features preserve_order --tests -- --skip ui --exact
28 - run: cargo test --features float_roundtrip --tests -- --skip ui --exact
29 - run: cargo test --features arbitrary_precision --tests -- --skip ui --exact
[all …]
/external/rust/crates/zip/
DREADME.md1 zip-rs
4 … Status](https://img.shields.io/github/workflow/status/zip-rs/zip/CI)](https://github.com/zip-rs/z…
14 ----
29 * Multi-disk
32 -----
45 zip = { version = "0.6.4", default-features = false }
50 * `aes-crypto`: Enables decryption of files which were encrypted with AES. Supports AE-1 and AE-2 m…
53 * `time`: Enables features using the [time](https://github.com/rust-lang-deprecated/time) crate.
59 ----
64 - We will always support the latest four minor Rust versions. This gives you a 6
[all …]
/external/oss-fuzz/infra/base-images/base-builder/
Dcargo1 #!/bin/bash -eu
8 # http://www.apache.org/licenses/LICENSE-2.0
16 # This is a wrapper around calling cargo
18 # We need this until https://github.com/rust-lang/cargo/issues/5450 is merged
19 # because cargo uses relative paths for the current crate
26 crate_src_abspath=`cargo metadata --no-deps --format-version 1 | jq -r '.workspace_root'`
27 export RUSTFLAGS="$RUSTFLAGS --remap-path-prefix src=$crate_src_abspath/src"
30 if [ "$SANITIZER" = "coverage" ] && [ $1 = "fuzz" ] && [ $2 = "build" ]
32 # hack to turn cargo fuzz build into cargo build so as to get coverage
33 # cargo fuzz adds "--target" "x86_64-unknown-linux-gnu"
[all …]
/external/rust/crates/base64/.circleci/
Dconfig.yml7 - build:
11 …# Yes, a single-parameter axis, but means it can be referred to as a cache parameter easily without
13 … # The default rust images (not -slim or -alpine) are based on buildpack-deps. Hopefully this will
35 - image: << parameters.rust_img >>
37 - checkout
38 - restore_cache:
39 …key: project-cache-v5-<< parameters.rust_img >>-<< parameters.toolchain_override >>-{{ checksum "C…
40 - run:
48 - run:
50 command: rustc --version
[all …]
/external/rust/beto-rust/nearby/
DREADME.md19 ### Cargo subsection
21 Install [`cargo-deny`](https://github.com/EmbarkStudios/cargo-deny)
22 and [`cargo-fuzz`](https://github.com/rust-fuzz/cargo-fuzz):
25 cargo install --locked cargo-deny
26 cargo install cargo-fuzz
38 sudo docker build -t nearby_rust:v1.0 .
39 sudo docker run --rm -it nearby_rust:v1.0
46 Running the image runs check-everything.sh to verify all of the targets can
52 sudo docker run -it nearby_rust:v1.0 bash
56 …iner on a remote host](https://code.visualstudio.com/remote/advancedcontainers/develop-remote-host)
[all …]
/external/rust/crates/zip/.github/workflows/
Dci.yaml7 - master
10 RUSTFLAGS: -Dwarnings
15 runs-on: ${{ matrix.os }}
18 os: [ubuntu-latest, macOS-latest, windows-latest]
22 - uses: actions/checkout@master
24 - name: Install ${{ matrix.rust }}
25 uses: actions-rs/toolchain@v1
30 - name: check
31 uses: actions-rs/cargo@v1
34 args: --all --bins --examples
[all …]
/external/rust/crates/rustc-demangle/.github/workflows/
Dmain.yml7 runs-on: ubuntu-latest
12 - uses: actions/checkout@v2
13 - name: Install Rust
15 - run: cargo build --all
16 - run: cargo test --all
17 - run: cargo build --features std
20 name: Fuzz Targets
21 runs-on: ubuntu-latest
23 - uses: actions/checkout@v2
26 - run: rustup update nightly && rustup default nightly
[all …]
/external/rust/crates/base64/
DREADME.md3-base64/tree/master.svg?style=shield)](https://circleci.com/gh/marshallpierce/rust-base64/tree/mas…
5 <a href="https://www.jetbrains.com/?from=rust-base64"><img src="/icon_CLion.svg" height="40px"/></a>
23 Remove non-base64 characters from your input before decoding.
25 If you have a `Vec` of base64, [retain](https://doc.rust-lang.org/std/vec/struct.Vec.html#method.re…
30 - Use [iter_read](https://crates.io/crates/iter-read) together with `Read`'s `bytes()` to filter ou…
31 - Implement `Read` with a `read()` impl that delegates to your actual `Read`, and then drops any by…
33 ### I need to line-wrap base64, e.g. for MIME/PEM.
35 [line-wrap](https://crates.io/crates/line-wrap) does just that.
44 There are two opportunities for non-canonical encoding (and thus, detection of the same during deco…
53 The `=` pad bytes, on the other hand, are entirely a self-own by the Base64 standard. They do not a…
[all …]
/external/oss-fuzz/projects/libra/
Dbuild.sh1 #!/bin/bash -eux
8 # http://www.apache.org/licenses/LICENSE-2.0
18 # Note: This project creates Rust fuzz targets exclusively
21 # -------
26 # reset flags of OSS-Fuzz
27 export CFLAGS="-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODU…
28 export CXXFLAGS_EXTRA="-stdlib=libc++"
32 cd $SRC/libra/testsuite/libra-fuzzer
35 cargo fetch
38 sed -i "s/link_cpp(&mut build)/build.cpp_link_stdlib(None)/" \
[all …]
/external/rust/crates/smallvec/.github/workflows/
Dmain.yml15 os: [ubuntu-latest]
17 - toolchain: stable
20 - toolchain: beta
23 - os: windows-latest
26 runs-on: ${{ matrix.os }}
29 - uses: actions/checkout@v2
31 - name: Install packages
32 if: matrix.os == 'ubuntu-latest'
33 …run: sudo apt-get install -y binutils-dev libunwind8-dev libcurl4-openssl-dev libelf-dev libdw-dev…
35 - name: Install toolchain
[all …]
/external/rust/crates/arbitrary/
DREADME.md7 …<img alt="GitHub Actions Status" src="https://github.com/rust-fuzz/rust_arbitrary/workflows/Rust/b…
16 and `cargo-fuzz`](https://github.com/rust-fuzz/cargo-fuzz) or
17 [AFL](https://github.com/rust-fuzz/afl.rs), and to help you turn the raw,
18 untyped byte buffers that they produce into well-typed, valid, structured
19 values. This allows you to combine structure-aware test case generation with
20 coverage-guided, mutation-based fuzzers.
39 Automatically deriving `Arbitrary` requires you to enable the `"derive"` cargo
43 # Cargo.toml
81 // fn(&mut Unstructured) -> arbitrary::Result<T>
92 fn arbitrary_b(u: &mut Unstructured) -> arbitrary::Result<u8> {
[all …]
DCargo.toml1 # THIS FILE IS AUTOMATICALLY GENERATED BY CARGO
3 # When uploading crates to the registry Cargo will automatically
4 # "normalize" Cargo.toml files for maximal compatibility
5 # with all versions of Cargo and also rewrite `path` dependencies
8 # If you are reading this file be aware that the original Cargo.toml
10 # See Cargo.toml.orig for the original contents.
14 rust-version = "1.63.0"
18 "The Rust-Fuzz Project Developers",
32 categories = ["development-tools::testing"]
33 license = "MIT OR Apache-2.0"
[all …]
/external/rust/crates/derive_arbitrary/
DCargo.toml1 # THIS FILE IS AUTOMATICALLY GENERATED BY CARGO
3 # When uploading crates to the registry Cargo will automatically
4 # "normalize" Cargo.toml files for maximal compatibility
5 # with all versions of Cargo and also rewrite `path` dependencies
8 # If you are reading this file be aware that the original Cargo.toml
10 # See Cargo.toml.orig for the original contents.
14 rust-version = "1.63.0"
18 "The Rust-Fuzz Project Developers",
33 categories = ["development-tools::testing"]
34 license = "MIT/Apache-2.0"
[all …]
/external/oss-fuzz/projects/servo/
Dbuild.sh1 #!/bin/bash -eu
8 # http://www.apache.org/licenses/LICENSE-2.0
19 cargo fuzz build -O
20 cp fuzz/target/x86_64-unknown-linux-gnu/release/fuzz_document_parse $OUT/
22 cd $SRC/rust-url/url
23 cargo fuzz build -O
24 cp fuzz/target/x86_64-unknown-linux-gnu/release/parse $OUT/fuzz-url-parse
/external/oss-fuzz/projects/hyperium/
Dbuild.sh1 #!/bin/bash -eu
8 # http://www.apache.org/licenses/LICENSE-2.0
19 cargo fuzz build -O
20 cp ./fuzz/target/x86_64-unknown-linux-gnu/release/fuzz_http $OUT/
23 cargo fuzz build -O
24 cp ./fuzz/target/x86_64-unknown-linux-gnu/release/fuzz_client $OUT/
25 cp ./fuzz/target/x86_64-unknown-linux-gnu/release/fuzz_e2e $OUT/
26 cp ./fuzz/target/x86_64-unknown-linux-gnu/release/fuzz_hpack $OUT/
/external/oss-fuzz/projects/unicode-rs/
Dbuild.sh1 #!/bin/bash -eu
8 # http://www.apache.org/licenses/LICENSE-2.0
20 cd $SRC/unicode-normalization
21 cargo fuzz build -O
22 …cp fuzz/target/x86_64-unknown-linux-gnu/release/unicode-normalization $OUT/unicode-normalization-n…
23 cp fuzz/target/x86_64-unknown-linux-gnu/release/streaming $OUT/unicode-normalization-streaming
26 cd $SRC/unicode-segmentation/
27 cargo fuzz build -O
28 cp ./fuzz/target/x86_64-unknown-linux-gnu/release/fuzz_target_1 $OUT/unicode-segmentation-fuzzer

1234