Home
last modified time | relevance | path

Searched +full:cargo +full:- +full:fuzz (Results 1 – 25 of 110) sorted by relevance

12345

/external/rust/crates/libfuzzer-sys/ci/
Dscript.sh3 set -eux
8 cargo test --doc
11 cargo fuzz build
12 cargo fuzz build --dev
13 (! cargo fuzz run bananas -- -runs=100000)
17 cargo fuzz build
18 cargo fuzz build --dev
19 (! cargo fuzz run rgb -- -runs=10000000)
21 cargo fuzz run rgb \
22 $(ls ./fuzz/artifacts/rgb/crash-* | head -n 1)
[all …]
/external/oss-fuzz/docs/getting-started/new-project-guide/
Drust_lang.md1 ---
7 permalink: /getting-started/new-project-guide/rust-lang/
8 ---
13 - TOC
15 ---
17 The process of integrating a project written in Rust with OSS-Fuzz is very
19 }}/getting-started/new-project-guide/) process. The key specifics of integrating
22 ## cargo-fuzz support
24 Rust integration with OSS-Fuzz is expected to use [`cargo
25 fuzz`](https://github.com/rust-fuzz/cargo-fuzz) to build fuzzers. The `cargo
[all …]
/external/rust/crates/smallvec/.github/workflows/
Dmain.yml17 os: [ubuntu-latest]
19 - toolchain: stable
20 fuzz: 1
21 - toolchain: beta
22 fuzz: 1
23 - os: windows-latest
26 runs-on: ${{ matrix.os }}
29 - uses: actions/checkout@v4
31 - name: Install packages for fuzzing
32 if: runner.os == 'Linux' && matrix.fuzz == 1
[all …]
/external/rust/crates/libfuzzer-sys/
DREADME.md1 # The `libfuzzer-sys` Crate
5 The CPP parts are extracted from compiler-rt git repository with `git filter-branch`.
7 … The Rust compiler has built-in support for LLVM sanitizer support, for now, it's limited to Linux…
11 ### Use `cargo fuzz`!
13 [The recommended way to use this crate with `cargo fuzz`!][cargo-fuzz].
15 [cargo-fuzz]: https://github.com/rust-fuzz/cargo-fuzz
21 First create a new cargo project:
24 $ cargo new --bin fuzzed
28 Then add a dependency on the `fuzzer-sys` crate and your own crate:
32 libfuzzer-sys = "0.4.0"
[all …]
/external/rust/beto-rust/nearby/src/
Dfuzzers.rs7 // http://www.apache.org/licenses/LICENSE-2.0
18 pub(crate) fn run_rust_fuzzers(root: &path::Path) -> anyhow::Result<()> { in run_rust_fuzzers()
22 "cargo +nightly fuzz run xts_roundtrip -- -runs=10000 -max_total_time=60", in run_rust_fuzzers()
26 "cargo +nightly fuzz run ldt_roundtrip -- -runs=10000 -max_total_time=60", in run_rust_fuzzers()
30 "cargo +nightly fuzz run ldt_np_decrypt -- -runs=10000 -max_total_time=60", in run_rust_fuzzers()
34 "cargo +nightly fuzz run ldt_np_roundtrip -- -runs=10000 -max_total_time=60", in run_rust_fuzzers()
38 "cargo +nightly fuzz run fuzz_connection -- -runs=10000 -max_total_time=60", in run_rust_fuzzers()
42 "cargo +nightly fuzz run fuzz_from_saved_session -- -runs=10000 -max_total_time=60", in run_rust_fuzzers()
46 "cargo +nightly fuzz run fuzz_handshake -- -runs=10000 -max_total_time=60", in run_rust_fuzzers()
50 "cargo +nightly fuzz run fuzz_p256 -- -runs=10000 -max_total_time=60", in run_rust_fuzzers()
[all …]
/external/rust/beto-rust/common/derive_fuzztest/src/
Dlib.rs7 // http://www.apache.org/licenses/LICENSE-2.0
15 //! Derive macros that generates both a fuzz target for use with `cargo fuzz`, and a property test
16 //! (via `quickcheck` or `proptest`) for use with `cargo test`.
48 //! cargo test
53 //! cargo +nightly fuzz run <binary name>
58 //! If you use `#[fuzz]` or `#[fuzztest]`, the fuzz target imposes the following requirements:
60 //! * The target must be in a separate `[[bin]]` target that only contains a single fuzz target.
61 //! * The crate containing the bin target has `[package.metadata] cargo-fuzz = true`
64 //! The recommended structure for your crate `foo` is to put your tests under `foo/fuzz/src/bin`:
68 //! ├── fuzz
[all …]
/external/rust/crates/proc-macro2/.github/workflows/
Dci.yml13 RUSTFLAGS: -Dwarnings
23 runs-on: ubuntu-latest
25 fail-fast: false
28 timeout-minutes: 45
30 - uses: actions/checkout@v3
31 - uses: dtolnay/rust-toolchain@master
34 components: rust-src
35 - run: cargo test
36 - run: cargo test --no-default-features
37 - run: cargo test --features span-locations
[all …]
/external/rust/crates/arbitrary/.github/workflows/
Drust.yml8 runs-on: ubuntu-latest
10 - uses: actions/checkout@v3
11 - run: rustup update
12 - name: Build
13 run: cargo build --verbose --all
14 - name: Run tests
15 run: cargo test --verbose --all
18 runs-on: ubuntu-latest
20 - uses: actions/checkout@v3
21 - run: rustup update
[all …]
/external/crosvm/docs/book/src/testing/
Dfuzzing.md3 Crosvm contains several [fuzz testing](https://en.wikipedia.org/wiki/Fuzzing) programs that are
5 uncover bugs that were not found by human-written unit tests.
7 The source code for the fuzzer target programs can be found in [`fuzz/fuzz_targets`] in the crosvm
10 ## OSS-Fuzz
12 Crosvm makes use of the OSS-Fuzz service, which automatically builds and runs fuzzers for many open
16 - [crosvm oss-fuzz configuration]
17 - [crosvm oss-fuzz build status]
24 To build and run a specific fuzz target, install [`cargo fuzz`], then run it in the crosvm source
25 tree, specifying the desired fuzz target to run. If you have a testcase provided by the automated
30 # Run virtqueue_fuzzer with randomly-generated input.
[all …]
/external/rust/crates/itoa/.github/workflows/
Dci.yml13 RUSTFLAGS: -Dwarnings
23 runs-on: ubuntu-latest
25 fail-fast: false
28 timeout-minutes: 45
30 - uses: actions/checkout@v4
31 - uses: dtolnay/rust-toolchain@master
34 - name: Enable type layout randomization
35 run: echo RUSTFLAGS=${RUSTFLAGS}\ -Zrandomize-layout >> $GITHUB_ENV
37 - run: cargo build
38 - run: cargo test
[all …]
/external/rust/crates/ryu/.github/workflows/
Dci.yml13 RUSTFLAGS: -Dwarnings
23 runs-on: ubuntu-latest
25 fail-fast: false
28 timeout-minutes: 45
30 - uses: actions/checkout@v4
31 - uses: dtolnay/rust-toolchain@master
34 - name: Enable type layout randomization
35 run: echo RUSTFLAGS=${RUSTFLAGS}\ -Zrandomize-layout >> $GITHUB_ENV
37 - run: cargo test
38 - run: cargo test --features small
[all …]
/external/rust/crates/serde_yaml/.github/workflows/
Dci.yml13 RUSTFLAGS: -Dwarnings
23 runs-on: ubuntu-latest
25 fail-fast: false
28 timeout-minutes: 45
30 - uses: actions/checkout@v4
31 - uses: dtolnay/rust-toolchain@master
34 - name: Enable type layout randomization
35 run: echo RUSTFLAGS=${RUSTFLAGS}\ -Zrandomize-layout >> $GITHUB_ENV
37 - run: cargo build
38 - run: cargo test
[all …]
/external/rust/crates/zip/
DREADME.md1 zip-rs
4 … Status](https://img.shields.io/github/workflow/status/zip-rs/zip/CI)](https://github.com/zip-rs/z…
11 ----
26 * Multi-disk
29 -----
42 zip = { version = "0.6.6", default-features = false }
47 * `aes-crypto`: Enables decryption of files which were encrypted with AES. Supports AE-1 and AE-2 m…
50 * `time`: Enables features using the [time](https://github.com/rust-lang-deprecated/time) crate.
56 ----
61 - We will always support the latest four minor Rust versions. This gives you a 6
[all …]
/external/rust/crates/semver/.github/workflows/
Dci.yml13 RUSTFLAGS: -Dwarnings
23 runs-on: ubuntu-latest
25 fail-fast: false
28 timeout-minutes: 45
30 - uses: actions/checkout@v4
31 - uses: dtolnay/rust-toolchain@master
34 - name: Enable type layout randomization
35 run: echo RUSTFLAGS=${RUSTFLAGS}\ -Zrandomize-layout >> $GITHUB_ENV
37 - run: cargo test
38 - run: cargo check --no-default-features
[all …]
/external/rust/crates/unsafe-libyaml/.github/workflows/
Dci.yml13 RUSTFLAGS: -Dwarnings
23 runs-on: ubuntu-latest
25 fail-fast: false
28 timeout-minutes: 45
30 - uses: actions/checkout@v4
31 - uses: dtolnay/rust-toolchain@master
34 - name: Enable type layout randomization
35 run: echo RUSTFLAGS=${RUSTFLAGS}\ -Zrandomize-layout >> $GITHUB_ENV
37 - run: cargo test
43 runs-on: ubuntu-latest
[all …]
/external/rust/beto-rust/nearby/
DREADME.md19 ### Cargo subsection
21 Install [`cargo-deny`](https://github.com/EmbarkStudios/cargo-deny)
22 and [`cargo-fuzz`](https://github.com/rust-fuzz/cargo-fuzz):
25 cargo install --locked cargo-deny
26 cargo install cargo-fuzz
38 sudo docker build -t nearby_rust:v1.0 .
39 sudo docker run --rm -it nearby_rust:v1.0
46 Running the image runs `cargo run -- check-everything` to verify all of the targets can
52 sudo docker run -it nearby_rust:v1.0 bash
56 …iner on a remote host](https://code.visualstudio.com/remote/advancedcontainers/develop-remote-host)
[all …]
/external/rust/crates/serde_json/.github/workflows/
Dci.yml12 RUSTFLAGS: -Dwarnings
17 runs-on: ${{matrix.os}}-latest
19 fail-fast: false
22 timeout-minutes: 45
24 - uses: actions/checkout@v3
25 - uses: dtolnay/rust-toolchain@nightly
26 - run: cargo test
27 - run: cargo test --features preserve_order --tests -- --skip ui --exact
28 - run: cargo test --features float_roundtrip --tests -- --skip ui --exact
29 - run: cargo test --features arbitrary_precision --tests -- --skip ui --exact
[all …]
/external/oss-fuzz/infra/base-images/base-builder/
Dcargo1 #!/bin/bash -eu
8 # http://www.apache.org/licenses/LICENSE-2.0
16 # This is a wrapper around calling cargo
18 # We need this until https://github.com/rust-lang/cargo/issues/5450 is merged
19 # because cargo uses relative paths for the current crate
26 crate_src_abspath=`cargo metadata --no-deps --format-version 1 | jq -r '.workspace_root'`
27 export RUSTFLAGS="$RUSTFLAGS --remap-path-prefix src=$crate_src_abspath/src"
30 if [ "$SANITIZER" = "coverage" ] && [ $1 = "fuzz" ] && [ $2 = "build" ]
32 # hack to turn cargo fuzz build into cargo build so as to get coverage
33 # cargo fuzz adds "--target" "x86_64-unknown-linux-gnu"
[all …]
/external/rust/crates/prettyplease/.github/workflows/
Dci.yml13 RUSTFLAGS: -Dwarnings
23 runs-on: ubuntu-latest
25 fail-fast: false
28 timeout-minutes: 45
30 - uses: actions/checkout@v3
31 - uses: dtolnay/rust-toolchain@master
34 - run: cargo check
35 - run: cargo check --features verbatim
36 - run: cargo test
38 RUSTFLAGS: ${{env.RUSTFLAGS}} ${{matrix.rust == 'nightly' && '--cfg exhaustive' || ''}}
[all …]
/external/rust/crates/base64/.circleci/
Dconfig.yml7 - build:
11 …# Yes, a single-parameter axis, but means it can be referred to as a cache parameter easily without
13 … # The default rust images (not -slim or -alpine) are based on buildpack-deps. Hopefully this will
23 '1.70.0', # minimum needed to build dev-dependencies
37 - image: << parameters.rust_img >>
39 - checkout
40 - restore_cache:
41 …key: project-cache-v5-<< parameters.rust_img >>-<< parameters.toolchain_override >>-{{ checksum "C…
42 - run:
50 - run:
[all …]
/external/rust/crates/zip/.github/workflows/
Dci.yaml7 - master
10 RUSTFLAGS: -Dwarnings
15 runs-on: ${{ matrix.os }}
18 os: [ubuntu-latest, macOS-latest, windows-latest]
22 - uses: actions/checkout@master
24 - name: Install ${{ matrix.rust }}
25 uses: actions-rs/toolchain@v1
30 - name: check
31 uses: actions-rs/cargo@v1
34 args: --all --bins --examples
[all …]
/external/rust/crates/lz4_flex/
DREADME.md9 … implementation in Rust. Originally based on [redox-os' lz4 compression](https://crates.io/crates/…
12 AMD Ryzen 7 5900HX, rustc 1.69.0 (84c898d65 2023-04-16), Manjaro, CPU Boost Disabled, CPU Governor:…
16 |----------------------|-------------|---------------|---------------|
26 |----------------------|-------------|---------------|---------------|
35 - Very good logo
36 - LZ4 Block format
37 - LZ4 Frame format (thanks @arthurprs)
38 - High performance
39 - 1,5s clean release build time
40 - Feature flags to configure safe/unsafe code usage
[all …]
/external/rust/crates/rustc-demangle/.github/workflows/
Dmain.yml7 runs-on: ubuntu-latest
12 - uses: actions/checkout@v2
13 - name: Install Rust
15 - run: cargo build --all
16 - run: cargo test --all
17 - run: cargo build --features std
20 name: Fuzz Targets
21 runs-on: ubuntu-latest
23 - uses: actions/checkout@v2
26 - run: rustup update nightly && rustup default nightly
[all …]
/external/rust/crates/base64/
DREADME.md3-base64/tree/master.svg?style=shield)](https://circleci.com/gh/marshallpierce/rust-base64/tree/mas…
5 <a href="https://www.jetbrains.com/?from=rust-base64"><img src="/icon_CLion.svg" height="40px"/></a>
23 Remove non-base64 characters from your input before decoding.
25 If you have a `Vec` of base64, [retain](https://doc.rust-lang.org/std/vec/struct.Vec.html#method.re…
30 - Use [iter_read](https://crates.io/crates/iter-read) together with `Read`'s `bytes()` to filter ou…
31 - Implement `Read` with a `read()` impl that delegates to your actual `Read`, and then drops any by…
33 ### I need to line-wrap base64, e.g. for MIME/PEM.
35 [line-wrap](https://crates.io/crates/line-wrap) does just that.
44 There are two opportunities for non-canonical encoding (and thus, detection of the same during deco…
53 The `=` pad bytes, on the other hand, are entirely a self-own by the Base64 standard. They do not a…
[all …]
/external/oss-fuzz/projects/libra/
Dbuild.sh1 #!/bin/bash -eux
8 # http://www.apache.org/licenses/LICENSE-2.0
18 # Note: This project creates Rust fuzz targets exclusively
21 # -------
26 # reset flags of OSS-Fuzz
27 export CFLAGS="-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODU…
28 export CXXFLAGS_EXTRA="-stdlib=libc++"
32 cd $SRC/libra/testsuite/libra-fuzzer
35 cargo fetch
38 sed -i "s/link_cpp(&mut build)/build.cpp_link_stdlib(None)/" \
[all …]

12345