| /external/rust/crates/libfuzzer-sys/ci/ |
| D | script.sh | 3 set -eux 8 cargo test --doc 11 cargo fuzz build 12 cargo fuzz build --dev 13 (! cargo fuzz run bananas -- -runs=100000) 17 cargo fuzz build 18 cargo fuzz build --dev 19 (! cargo fuzz run rgb -- -runs=10000000) 21 cargo fuzz run rgb \ 22 $(ls ./fuzz/artifacts/rgb/crash-* | head -n 1) [all …]
|
| /external/oss-fuzz/docs/getting-started/new-project-guide/ |
| D | rust_lang.md | 1 --- 7 permalink: /getting-started/new-project-guide/rust-lang/ 8 --- 13 - TOC 15 --- 17 The process of integrating a project written in Rust with OSS-Fuzz is very 19 }}/getting-started/new-project-guide/) process. The key specifics of integrating 22 ## cargo-fuzz support 24 Rust integration with OSS-Fuzz is expected to use [`cargo 25 fuzz`](https://github.com/rust-fuzz/cargo-fuzz) to build fuzzers. The `cargo [all …]
|
| /external/rust/crates/smallvec/.github/workflows/ |
| D | main.yml | 17 os: [ubuntu-latest] 19 - toolchain: stable 20 fuzz: 1 21 - toolchain: beta 22 fuzz: 1 23 - os: windows-latest 26 runs-on: ${{ matrix.os }} 29 - uses: actions/checkout@v4 31 - name: Install packages for fuzzing 32 if: runner.os == 'Linux' && matrix.fuzz == 1 [all …]
|
| /external/rust/crates/libfuzzer-sys/ |
| D | README.md | 1 # The `libfuzzer-sys` Crate 5 The CPP parts are extracted from compiler-rt git repository with `git filter-branch`. 7 … The Rust compiler has built-in support for LLVM sanitizer support, for now, it's limited to Linux… 11 ### Use `cargo fuzz`! 13 [The recommended way to use this crate with `cargo fuzz`!][cargo-fuzz]. 15 [cargo-fuzz]: https://github.com/rust-fuzz/cargo-fuzz 21 First create a new cargo project: 24 $ cargo new --bin fuzzed 28 Then add a dependency on the `fuzzer-sys` crate and your own crate: 32 libfuzzer-sys = "0.4.0" [all …]
|
| /external/rust/beto-rust/nearby/src/ |
| D | fuzzers.rs | 7 // http://www.apache.org/licenses/LICENSE-2.0 18 pub(crate) fn run_rust_fuzzers(root: &path::Path) -> anyhow::Result<()> { in run_rust_fuzzers() 22 "cargo +nightly fuzz run xts_roundtrip -- -runs=10000 -max_total_time=60", in run_rust_fuzzers() 26 "cargo +nightly fuzz run ldt_roundtrip -- -runs=10000 -max_total_time=60", in run_rust_fuzzers() 30 "cargo +nightly fuzz run ldt_np_decrypt -- -runs=10000 -max_total_time=60", in run_rust_fuzzers() 34 "cargo +nightly fuzz run ldt_np_roundtrip -- -runs=10000 -max_total_time=60", in run_rust_fuzzers() 38 "cargo +nightly fuzz run fuzz_connection -- -runs=10000 -max_total_time=60", in run_rust_fuzzers() 42 "cargo +nightly fuzz run fuzz_from_saved_session -- -runs=10000 -max_total_time=60", in run_rust_fuzzers() 46 "cargo +nightly fuzz run fuzz_handshake -- -runs=10000 -max_total_time=60", in run_rust_fuzzers() 50 "cargo +nightly fuzz run fuzz_p256 -- -runs=10000 -max_total_time=60", in run_rust_fuzzers() [all …]
|
| /external/rust/beto-rust/common/derive_fuzztest/src/ |
| D | lib.rs | 7 // http://www.apache.org/licenses/LICENSE-2.0 15 //! Derive macros that generates both a fuzz target for use with `cargo fuzz`, and a property test 16 //! (via `quickcheck` or `proptest`) for use with `cargo test`. 48 //! cargo test 53 //! cargo +nightly fuzz run <binary name> 58 //! If you use `#[fuzz]` or `#[fuzztest]`, the fuzz target imposes the following requirements: 60 //! * The target must be in a separate `[[bin]]` target that only contains a single fuzz target. 61 //! * The crate containing the bin target has `[package.metadata] cargo-fuzz = true` 64 //! The recommended structure for your crate `foo` is to put your tests under `foo/fuzz/src/bin`: 68 //! ├── fuzz [all …]
|
| /external/rust/crates/proc-macro2/.github/workflows/ |
| D | ci.yml | 13 RUSTFLAGS: -Dwarnings 23 runs-on: ubuntu-latest 25 fail-fast: false 28 timeout-minutes: 45 30 - uses: actions/checkout@v3 31 - uses: dtolnay/rust-toolchain@master 34 components: rust-src 35 - run: cargo test 36 - run: cargo test --no-default-features 37 - run: cargo test --features span-locations [all …]
|
| /external/rust/crates/arbitrary/.github/workflows/ |
| D | rust.yml | 8 runs-on: ubuntu-latest 10 - uses: actions/checkout@v3 11 - run: rustup update 12 - name: Build 13 run: cargo build --verbose --all 14 - name: Run tests 15 run: cargo test --verbose --all 18 runs-on: ubuntu-latest 20 - uses: actions/checkout@v3 21 - run: rustup update [all …]
|
| /external/crosvm/docs/book/src/testing/ |
| D | fuzzing.md | 3 Crosvm contains several [fuzz testing](https://en.wikipedia.org/wiki/Fuzzing) programs that are 5 uncover bugs that were not found by human-written unit tests. 7 The source code for the fuzzer target programs can be found in [`fuzz/fuzz_targets`] in the crosvm 10 ## OSS-Fuzz 12 Crosvm makes use of the OSS-Fuzz service, which automatically builds and runs fuzzers for many open 16 - [crosvm oss-fuzz configuration] 17 - [crosvm oss-fuzz build status] 24 To build and run a specific fuzz target, install [`cargo fuzz`], then run it in the crosvm source 25 tree, specifying the desired fuzz target to run. If you have a testcase provided by the automated 30 # Run virtqueue_fuzzer with randomly-generated input. [all …]
|
| /external/rust/crates/itoa/.github/workflows/ |
| D | ci.yml | 13 RUSTFLAGS: -Dwarnings 23 runs-on: ubuntu-latest 25 fail-fast: false 28 timeout-minutes: 45 30 - uses: actions/checkout@v4 31 - uses: dtolnay/rust-toolchain@master 34 - name: Enable type layout randomization 35 run: echo RUSTFLAGS=${RUSTFLAGS}\ -Zrandomize-layout >> $GITHUB_ENV 37 - run: cargo build 38 - run: cargo test [all …]
|
| /external/rust/crates/ryu/.github/workflows/ |
| D | ci.yml | 13 RUSTFLAGS: -Dwarnings 23 runs-on: ubuntu-latest 25 fail-fast: false 28 timeout-minutes: 45 30 - uses: actions/checkout@v4 31 - uses: dtolnay/rust-toolchain@master 34 - name: Enable type layout randomization 35 run: echo RUSTFLAGS=${RUSTFLAGS}\ -Zrandomize-layout >> $GITHUB_ENV 37 - run: cargo test 38 - run: cargo test --features small [all …]
|
| /external/rust/crates/serde_yaml/.github/workflows/ |
| D | ci.yml | 13 RUSTFLAGS: -Dwarnings 23 runs-on: ubuntu-latest 25 fail-fast: false 28 timeout-minutes: 45 30 - uses: actions/checkout@v4 31 - uses: dtolnay/rust-toolchain@master 34 - name: Enable type layout randomization 35 run: echo RUSTFLAGS=${RUSTFLAGS}\ -Zrandomize-layout >> $GITHUB_ENV 37 - run: cargo build 38 - run: cargo test [all …]
|
| /external/rust/crates/zip/ |
| D | README.md | 1 zip-rs 4 … Status](https://img.shields.io/github/workflow/status/zip-rs/zip/CI)](https://github.com/zip-rs/z… 11 ---- 26 * Multi-disk 29 ----- 42 zip = { version = "0.6.6", default-features = false } 47 * `aes-crypto`: Enables decryption of files which were encrypted with AES. Supports AE-1 and AE-2 m… 50 * `time`: Enables features using the [time](https://github.com/rust-lang-deprecated/time) crate. 56 ---- 61 - We will always support the latest four minor Rust versions. This gives you a 6 [all …]
|
| /external/rust/crates/semver/.github/workflows/ |
| D | ci.yml | 13 RUSTFLAGS: -Dwarnings 23 runs-on: ubuntu-latest 25 fail-fast: false 28 timeout-minutes: 45 30 - uses: actions/checkout@v4 31 - uses: dtolnay/rust-toolchain@master 34 - name: Enable type layout randomization 35 run: echo RUSTFLAGS=${RUSTFLAGS}\ -Zrandomize-layout >> $GITHUB_ENV 37 - run: cargo test 38 - run: cargo check --no-default-features [all …]
|
| /external/rust/crates/unsafe-libyaml/.github/workflows/ |
| D | ci.yml | 13 RUSTFLAGS: -Dwarnings 23 runs-on: ubuntu-latest 25 fail-fast: false 28 timeout-minutes: 45 30 - uses: actions/checkout@v4 31 - uses: dtolnay/rust-toolchain@master 34 - name: Enable type layout randomization 35 run: echo RUSTFLAGS=${RUSTFLAGS}\ -Zrandomize-layout >> $GITHUB_ENV 37 - run: cargo test 43 runs-on: ubuntu-latest [all …]
|
| /external/rust/beto-rust/nearby/ |
| D | README.md | 19 ### Cargo subsection 21 Install [`cargo-deny`](https://github.com/EmbarkStudios/cargo-deny) 22 and [`cargo-fuzz`](https://github.com/rust-fuzz/cargo-fuzz): 25 cargo install --locked cargo-deny 26 cargo install cargo-fuzz 38 sudo docker build -t nearby_rust:v1.0 . 39 sudo docker run --rm -it nearby_rust:v1.0 46 Running the image runs `cargo run -- check-everything` to verify all of the targets can 52 sudo docker run -it nearby_rust:v1.0 bash 56 …iner on a remote host](https://code.visualstudio.com/remote/advancedcontainers/develop-remote-host) [all …]
|
| /external/rust/crates/serde_json/.github/workflows/ |
| D | ci.yml | 12 RUSTFLAGS: -Dwarnings 17 runs-on: ${{matrix.os}}-latest 19 fail-fast: false 22 timeout-minutes: 45 24 - uses: actions/checkout@v3 25 - uses: dtolnay/rust-toolchain@nightly 26 - run: cargo test 27 - run: cargo test --features preserve_order --tests -- --skip ui --exact 28 - run: cargo test --features float_roundtrip --tests -- --skip ui --exact 29 - run: cargo test --features arbitrary_precision --tests -- --skip ui --exact [all …]
|
| /external/oss-fuzz/infra/base-images/base-builder/ |
| D | cargo | 1 #!/bin/bash -eu 8 # http://www.apache.org/licenses/LICENSE-2.0 16 # This is a wrapper around calling cargo 18 # We need this until https://github.com/rust-lang/cargo/issues/5450 is merged 19 # because cargo uses relative paths for the current crate 26 crate_src_abspath=`cargo metadata --no-deps --format-version 1 | jq -r '.workspace_root'` 27 export RUSTFLAGS="$RUSTFLAGS --remap-path-prefix src=$crate_src_abspath/src" 30 if [ "$SANITIZER" = "coverage" ] && [ $1 = "fuzz" ] && [ $2 = "build" ] 32 # hack to turn cargo fuzz build into cargo build so as to get coverage 33 # cargo fuzz adds "--target" "x86_64-unknown-linux-gnu" [all …]
|
| /external/rust/crates/prettyplease/.github/workflows/ |
| D | ci.yml | 13 RUSTFLAGS: -Dwarnings 23 runs-on: ubuntu-latest 25 fail-fast: false 28 timeout-minutes: 45 30 - uses: actions/checkout@v3 31 - uses: dtolnay/rust-toolchain@master 34 - run: cargo check 35 - run: cargo check --features verbatim 36 - run: cargo test 38 RUSTFLAGS: ${{env.RUSTFLAGS}} ${{matrix.rust == 'nightly' && '--cfg exhaustive' || ''}} [all …]
|
| /external/rust/crates/base64/.circleci/ |
| D | config.yml | 7 - build: 11 …# Yes, a single-parameter axis, but means it can be referred to as a cache parameter easily without 13 … # The default rust images (not -slim or -alpine) are based on buildpack-deps. Hopefully this will 23 '1.70.0', # minimum needed to build dev-dependencies 37 - image: << parameters.rust_img >> 39 - checkout 40 - restore_cache: 41 …key: project-cache-v5-<< parameters.rust_img >>-<< parameters.toolchain_override >>-{{ checksum "C… 42 - run: 50 - run: [all …]
|
| /external/rust/crates/zip/.github/workflows/ |
| D | ci.yaml | 7 - master 10 RUSTFLAGS: -Dwarnings 15 runs-on: ${{ matrix.os }} 18 os: [ubuntu-latest, macOS-latest, windows-latest] 22 - uses: actions/checkout@master 24 - name: Install ${{ matrix.rust }} 25 uses: actions-rs/toolchain@v1 30 - name: check 31 uses: actions-rs/cargo@v1 34 args: --all --bins --examples [all …]
|
| /external/rust/crates/lz4_flex/ |
| D | README.md | 9 … implementation in Rust. Originally based on [redox-os' lz4 compression](https://crates.io/crates/… 12 AMD Ryzen 7 5900HX, rustc 1.69.0 (84c898d65 2023-04-16), Manjaro, CPU Boost Disabled, CPU Governor:… 16 |----------------------|-------------|---------------|---------------| 26 |----------------------|-------------|---------------|---------------| 35 - Very good logo 36 - LZ4 Block format 37 - LZ4 Frame format (thanks @arthurprs) 38 - High performance 39 - 1,5s clean release build time 40 - Feature flags to configure safe/unsafe code usage [all …]
|
| /external/rust/crates/rustc-demangle/.github/workflows/ |
| D | main.yml | 7 runs-on: ubuntu-latest 12 - uses: actions/checkout@v2 13 - name: Install Rust 15 - run: cargo build --all 16 - run: cargo test --all 17 - run: cargo build --features std 20 name: Fuzz Targets 21 runs-on: ubuntu-latest 23 - uses: actions/checkout@v2 26 - run: rustup update nightly && rustup default nightly [all …]
|
| /external/rust/crates/base64/ |
| D | README.md | 3 …-base64/tree/master.svg?style=shield)](https://circleci.com/gh/marshallpierce/rust-base64/tree/mas… 5 <a href="https://www.jetbrains.com/?from=rust-base64"><img src="/icon_CLion.svg" height="40px"/></a> 23 Remove non-base64 characters from your input before decoding. 25 If you have a `Vec` of base64, [retain](https://doc.rust-lang.org/std/vec/struct.Vec.html#method.re… 30 - Use [iter_read](https://crates.io/crates/iter-read) together with `Read`'s `bytes()` to filter ou… 31 - Implement `Read` with a `read()` impl that delegates to your actual `Read`, and then drops any by… 33 ### I need to line-wrap base64, e.g. for MIME/PEM. 35 [line-wrap](https://crates.io/crates/line-wrap) does just that. 44 There are two opportunities for non-canonical encoding (and thus, detection of the same during deco… 53 The `=` pad bytes, on the other hand, are entirely a self-own by the Base64 standard. They do not a… [all …]
|
| /external/oss-fuzz/projects/libra/ |
| D | build.sh | 1 #!/bin/bash -eux 8 # http://www.apache.org/licenses/LICENSE-2.0 18 # Note: This project creates Rust fuzz targets exclusively 21 # ------- 26 # reset flags of OSS-Fuzz 27 export CFLAGS="-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODU… 28 export CXXFLAGS_EXTRA="-stdlib=libc++" 32 cd $SRC/libra/testsuite/libra-fuzzer 35 cargo fetch 38 sed -i "s/link_cpp(&mut build)/build.cpp_link_stdlib(None)/" \ [all …]
|