summaryrefslogtreecommitdiff
path: root/security/radamsa
diff options
context:
space:
mode:
Diffstat (limited to 'security/radamsa')
-rw-r--r--security/radamsa/Makefile33
-rw-r--r--security/radamsa/distinfo5
-rw-r--r--security/radamsa/pkg-descr4
3 files changed, 42 insertions, 0 deletions
diff --git a/security/radamsa/Makefile b/security/radamsa/Makefile
new file mode 100644
index 000000000000..ddbd52cfc379
--- /dev/null
+++ b/security/radamsa/Makefile
@@ -0,0 +1,33 @@
+PORTNAME= radamsa
+PORTVERSION= 0.7
+DISTVERSIONPREFIX= v
+CATEGORIES= security
+
+MAINTAINER= arrowd@FreeBSD.org
+COMMENT= General purpose fuzzer
+
+LICENSE= MIT
+LICENSE_FILE= ${WRKSRC}/LICENCE
+
+BUILD_DEPENDS= ol:lang/owl-lisp
+
+USE_GITLAB= yes
+GL_ACCOUNT= akihe
+GL_TUPLE= owl-lisp:hex:e95ebd38e4f7ef8e3d4e653f432e43ce0a804ca6:hex_dep/lib/hex
+
+ALL_TARGET= everything
+
+PLIST_FILES= bin/radamsa \
+ share/man/man1/radamsa.1.gz
+
+post-extract:
+ ${MKDIR} ${WRKSRC}/bin
+ ${LN} -s ${LOCALBASE}/bin/ol ${WRKSRC}/bin/ol
+
+post-patch:
+ ${REINPLACE_CMD} -e 's|PREFIX=/usr|PREFIX=${PREFIX}|' ${WRKSRC}/Makefile
+
+post-install:
+ ${STRIP_CMD} ${STAGEDIR}${PREFIX}/bin/radamsa
+
+.include <bsd.port.mk>
diff --git a/security/radamsa/distinfo b/security/radamsa/distinfo
new file mode 100644
index 000000000000..f14d295b8eaf
--- /dev/null
+++ b/security/radamsa/distinfo
@@ -0,0 +1,5 @@
+TIMESTAMP = 1763390628
+SHA256 (radamsa-v0.7.tar.bz2) = 6ead9c50c5e1da83d9f3b18e39a4a30adc0ec43c1061e178cd2e6d885cd71703
+SIZE (radamsa-v0.7.tar.bz2) = 49194
+SHA256 (owl-lisp-hex-e95ebd38e4f7ef8e3d4e653f432e43ce0a804ca6_GL0.tar.gz) = ee349b23a3426f46037174e78dd0dd3eb7f334da7f196f3a0d3279f9cba5879d
+SIZE (owl-lisp-hex-e95ebd38e4f7ef8e3d4e653f432e43ce0a804ca6_GL0.tar.gz) = 1597
diff --git a/security/radamsa/pkg-descr b/security/radamsa/pkg-descr
new file mode 100644
index 000000000000..03250b49855a
--- /dev/null
+++ b/security/radamsa/pkg-descr
@@ -0,0 +1,4 @@
+Radamsa is a generic test case generator for robustness testing, aka a fuzzer.
+It can be used to test how well a program can stand malformed and potentially
+malicious inputs. It operates on given sample inputs and thus requires minimal
+effort to set up.