Date: Fri, 14 Mar 2014 14:17:41 GMT From: "Jukka A. Ukkonen" <jau@iki.fi> To: freebsd-gnats-submit@FreeBSD.org Subject: ports/187576: Yet another general purpose fuzzer for FreeBSD Message-ID: <201403141417.s2EEHfS6069680@cgiserv.freebsd.org> Resent-Message-ID: <201403141420.s2EEK1s4015058@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 187576 >Category: ports >Synopsis: Yet another general purpose fuzzer for FreeBSD >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: maintainer-update >Submitter-Id: current-users >Arrival-Date: Fri Mar 14 14:20:01 UTC 2014 >Closed-Date: >Last-Modified: >Originator: Jukka A. Ukkonen >Release: 10.0-STABLE >Organization: ----- >Environment: FreeBSD sleipnir 10.0-STABLE FreeBSD 10.0-STABLE #0 r263107M: Thu Mar 13 10:11:00 EET 2014 root@sleipnir:/usr/obj/usr/src-10.0/sys/Sleipnir amd64 >Description: Since FreeBSD ports seemed to be missing this particular fuzzer, I simply decided to create the ports kit. >How-To-Repeat: No problem really, just a nice add-on tool. >Fix: Add the included ports kit to the common ports tree. Patch attached with submission follows: # This is a shell archive. Save it in a file, remove anything before # this line, and then unpack it by entering "sh file". Note, it may # create directories; files and directories will be owned by you and # have default permissions. # # This archive contains: # # radamsa/Makefile # radamsa/distinfo # radamsa/files # radamsa/pkg-descr # echo x - radamsa/Makefile sed 's/^X//' >radamsa/Makefile << 'f20206d22787ea2ed2447b1fa0402ea8' X# Created by: Jukka Ukkonen <jau@iki.fi> X# $FreeBSD: head/security/radamsa/Makefile 347629 2014-03-09 14:42:14Z jau $ X XPORTNAME= radamsa XPORTVERSION= 0.3 XCATEGORIES= security XMASTER_SITES= http://caca.zoy.org/raw-attachment/wiki/zzuf/ X XMAINTAINER= jau@iki.fi XCOMMENT= A general purpose fuzzer X X.include <bsd.port.mk> f20206d22787ea2ed2447b1fa0402ea8 echo x - radamsa/distinfo sed 's/^X//' >radamsa/distinfo << '3daef87ee7ce64d22c45f297d49b1986' XSHA256 (radamsa-0.3.tar.gz) = 17131a19fb28e5c97c28bf0b407a82744c251aa8aedfa507967a92438cd803be XSIZE (radamsa-0.3.tar.gz) = 116399 3daef87ee7ce64d22c45f297d49b1986 echo c - radamsa/files mkdir -p radamsa/files > /dev/null 2>&1 echo x - radamsa/pkg-descr sed 's/^X//' >radamsa/pkg-descr << 'd7b727fc80203c26c42e717296048e16' XRadamsa is a generic test case generator for robustness testing, aka a fuzzer. XIt can be used to test how well a program can stand malformed and potentially Xmalicious inputs. It operates on given sample inputs and thus requires minimal Xeffort to set up. d7b727fc80203c26c42e717296048e16 exit >Release-Note: >Audit-Trail: >Unformatted:
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201403141417.s2EEHfS6069680>