SHA256
1
0
forked from pool/afl
afl/afl.spec
Marcus Meissner 2427a0aecf Accepting request 832521 from home:msmeissn:branches:devel:tools
- updated to 2.68c
  - added the GSoC excellent afl++ grammar mutator by Shengtuo to our                                                                                                                        
    custom_mutators/ (see custom_mutators/README.md) - or get it here:                                                                                                                       
    https://github.com/AFLplusplus/Grammar-Mutator                                                                                                                                           
  - a few QOL changes for Apple and its outdated gmake                                                                                                                                       
  - afl-fuzz:                                                                                                                                                                                
    - fix for auto dictionary entries found during fuzzing to not throw out                                                                                                                  
      a -x dictionary                                                                                                                                                                        
    - added total execs done to plot file                                                                                                                                                    
    - AFL_MAX_DET_EXTRAS env variable added to control the amount of                                                                                                                         
      deterministic dict entries without recompiling.                                                                                                                                        
    - AFL_FORKSRV_INIT_TMOUT env variable added to control the time to wait                                                                                                                  
      for the forkserver to come up without the need to increase the overall                                                                                                                 
      timeout.                                                                                                                                                                               
    - bugfix for cmplog that results in a heap overflow based on target data                                                                                                                 
      (thanks to the magma team for reporting!)                                                                                                                                              
    - write fuzzing setup into out/fuzzer_setup (environment variables and                                                                                                                   
      command line)                                                                                                                                                                          
  - custom mutators:                                                                                                                                                                         
    - added afl_custom_fuzz_count/fuzz_count function to allow specifying                                                                                                                    
      the number of fuzz attempts for custom_fuzz                                                                                                                                            
  - llvm_mode:                                                                                                                                                                               
    - ported SanCov to LTO, and made it the default for LTO. better                                                                                                                          
      instrumentation locations                                                                                                                                                              
    - Further llvm 12 support (fast moving target like afl++ :-) )                                                                                                                           
    - deprecated LLVM SKIPSINGLEBLOCK env environment

OBS-URL: https://build.opensuse.org/request/show/832521
OBS-URL: https://build.opensuse.org/package/show/devel:tools/afl?expand=0&rev=121
2020-09-05 17:30:51 +00:00

82 lines
2.8 KiB
RPMSpec

#
# spec file for package afl
#
# Copyright (c) 2020 SUSE LLC
#
# All modifications and additions to the file contributed by third parties
# remain the property of their copyright owners, unless otherwise agreed
# upon. The license for this file, and modifications and additions to the
# file, is the same license as for the pristine package itself (unless the
# license for the pristine package is not an Open Source License, in which
# case the license is the MIT License). An "Open Source License" is a
# license that conforms to the Open Source Definition (Version 1.9)
# published by the Open Source Initiative.
# Please submit bugfixes or comments via https://bugs.opensuse.org/
#
Name: afl
Version: 2.68c
Release: 0
Summary: American fuzzy lop is a security-oriented fuzzer
License: Apache-2.0
URL: http://lcamtuf.coredump.cx/afl/
Source: https://github.com/vanhauser-thc/AFLplusplus/archive/%{version}.tar.gz
Source1: afl-rpmlintrc
Patch1: afl-2.63c-fix-paths.patch
BuildRequires: gcc-c++
%description
American fuzzy lop is a security-oriented fuzzer that employs a novel type
of compile-time instrumentation and genetic algorithms to automatically
discover clean, interesting test cases that trigger new internal states in
the targeted binary. This substantially improves the functional coverage
for the fuzzed code. The compact synthesized corpora produced by the tool
are also useful for seeding other, more labor- or resource-intensive
testing regimes down the road.
Compared to other instrumented fuzzers, afl-fuzz is designed to be
practical: it has modest performance overhead, uses a variety of highly
effective fuzzing strategies and effort minimization tricks, requires
essentially no configuration, and seamlessly handles complex, real-world
use cases - say, common image parsing or file compression libraries.
%prep
%setup -q -n AFLplusplus-%version
%patch1 -p1
sed -i 's|#!/usr/bin/env bash|#!/bin/bash|g' afl-cmin
%build
export CFLAGS="$CFLAGS %{optflags}"
%ifnarch %{ix86} x86_64
export AFL_NO_X86=1
%endif
make %{?_smp_mflags} PREFIX=%{_prefix} LIBEXEC_DIR=%{_libexecdir} DOC_DIR=%{_docdir}
# make radamsa
%install
%ifnarch %{ix86} x86_64
export AFL_NO_X86=1
%endif
make %{?_smp_mflags} PREFIX=%{_prefix} LIBEXEC_DIR=%{_libexecdir} DOC_DIR=%{_docdir} MAN_PATH=%{_mandir}/man8 DESTDIR=%{buildroot} install
%files
%license docs/COPYING LICENSE
%doc /usr/share/doc/packages/%name/
%{_bindir}/%{name}-*
%dir %{_libexecdir}/%{name}
%{_libexecdir}/%{name}/%{name}-as
%{_libexecdir}/%{name}/as
#{_libexecdir}/%{name}/argvfuzz*.so
#{_libexecdir}/%{name}/socketfuzz*.so
#{_libexecdir}/%{name}/libradamsa.so
%dir %{_datadir}/%{name}
%dir %{_datadir}/%{name}/testcases
%{_datadir}/%{name}/testcases/*
%dir %{_datadir}/afl/dictionaries/
%{_datadir}/afl/dictionaries/*
%{_mandir}/man8/afl*.8*
%changelog