diff --git a/eth2/utils/eth2_hashing/fuzz/.gitignore b/eth2/utils/eth2_hashing/fuzz/.gitignore deleted file mode 100644 index 572e03bdf..000000000 --- a/eth2/utils/eth2_hashing/fuzz/.gitignore +++ /dev/null @@ -1,4 +0,0 @@ - -target -corpus -artifacts diff --git a/eth2/utils/eth2_hashing/fuzz/Cargo.toml b/eth2/utils/eth2_hashing/fuzz/Cargo.toml deleted file mode 100644 index 57e0172eb..000000000 --- a/eth2/utils/eth2_hashing/fuzz/Cargo.toml +++ /dev/null @@ -1,22 +0,0 @@ - -[package] -name = "hashing-fuzz" -version = "0.0.1" -authors = ["Automatically generated"] -publish = false - -[package.metadata] -cargo-fuzz = true - -[dependencies.hashing] -path = ".." -[dependencies.libfuzzer-sys] -git = "https://github.com/rust-fuzz/libfuzzer-sys.git" - -# Prevent this from interfering with workspaces -[workspace] -members = ["."] - -[[bin]] -name = "fuzz_target_hash" -path = "fuzz_targets/fuzz_target_hash.rs" diff --git a/eth2/utils/eth2_hashing/fuzz/fuzz_targets/fuzz_target_hash.rs b/eth2/utils/eth2_hashing/fuzz/fuzz_targets/fuzz_target_hash.rs deleted file mode 100644 index dd78d1ac8..000000000 --- a/eth2/utils/eth2_hashing/fuzz/fuzz_targets/fuzz_target_hash.rs +++ /dev/null @@ -1,9 +0,0 @@ -#![no_main] -#[macro_use] extern crate libfuzzer_sys; -extern crate hashing; - -use hashing::hash; - -fuzz_target!(|data: &[u8]| { - let _result = hash(data); -}); diff --git a/eth2/utils/ssz/fuzz/.gitignore b/eth2/utils/ssz/fuzz/.gitignore deleted file mode 100644 index 572e03bdf..000000000 --- a/eth2/utils/ssz/fuzz/.gitignore +++ /dev/null @@ -1,4 +0,0 @@ - -target -corpus -artifacts diff --git a/eth2/utils/ssz/fuzz/Cargo.toml b/eth2/utils/ssz/fuzz/Cargo.toml deleted file mode 100644 index 3c922bac9..000000000 --- a/eth2/utils/ssz/fuzz/Cargo.toml +++ /dev/null @@ -1,105 +0,0 @@ - -[package] -name = "ssz-fuzz" -version = "0.0.1" -authors = ["Automatically generated"] -publish = false - -[package.metadata] -cargo-fuzz = true - -[dependencies] -ethereum-types = "0.6" - -[dependencies.ssz] -path = ".." -[dependencies.libfuzzer-sys] -git = "https://github.com/rust-fuzz/libfuzzer-sys.git" - -# Prevent this from interfering with workspaces -[workspace] -members = ["."] - -[[bin]] -name = "fuzz_target_bool_decode" -path = "fuzz_targets/fuzz_target_bool_decode.rs" - -[[bin]] -name = "fuzz_target_bool_encode" -path = "fuzz_targets/fuzz_target_bool_encode.rs" - -[[bin]] -name = "fuzz_target_u8_decode" -path = "fuzz_targets/fuzz_target_u8_decode.rs" - -[[bin]] -name = "fuzz_target_u8_encode" -path = "fuzz_targets/fuzz_target_u8_encode.rs" - -[[bin]] -name = "fuzz_target_u16_decode" -path = "fuzz_targets/fuzz_target_u16_decode.rs" - -[[bin]] -name = "fuzz_target_u16_encode" -path = "fuzz_targets/fuzz_target_u16_encode.rs" - -[[bin]] -name = "fuzz_target_u32_decode" -path = "fuzz_targets/fuzz_target_u32_decode.rs" - -[[bin]] -name = "fuzz_target_u32_encode" -path = "fuzz_targets/fuzz_target_u32_encode.rs" - -[[bin]] -name = "fuzz_target_u64_decode" -path = "fuzz_targets/fuzz_target_u64_decode.rs" - -[[bin]] -name = "fuzz_target_u64_encode" -path = "fuzz_targets/fuzz_target_u64_encode.rs" - -[[bin]] -name = "fuzz_target_usize_decode" -path = "fuzz_targets/fuzz_target_usize_decode.rs" - -[[bin]] -name = "fuzz_target_usize_encode" -path = "fuzz_targets/fuzz_target_usize_encode.rs" - -[[bin]] -name = "fuzz_target_hash256_decode" -path = "fuzz_targets/fuzz_target_hash256_decode.rs" - -[[bin]] -name = "fuzz_target_hash256_encode" -path = "fuzz_targets/fuzz_target_hash256_encode.rs" - -[[bin]] -name = "fuzz_target_address_decode" -path = "fuzz_targets/fuzz_target_address_decode.rs" - -[[bin]] -name = "fuzz_target_address_encode" -path = "fuzz_targets/fuzz_target_address_encode.rs" - -[[bin]] -name = "fuzz_target_vec_address_decode" -path = "fuzz_targets/fuzz_target_vec_address_decode.rs" - -[[bin]] -name = "fuzz_target_vec_bool_decode" -path = "fuzz_targets/fuzz_target_vec_bool_decode.rs" - -[[bin]] -name = "fuzz_target_vec_decode" -path = "fuzz_targets/fuzz_target_vec_decode.rs" - -[[bin]] -name = "fuzz_target_vec_encode" -path = "fuzz_targets/fuzz_target_vec_encode.rs" - -[[bin]] -name = "fuzz_target_vec_u64_decode" -path = "fuzz_targets/fuzz_target_vec_u64_decode.rs" diff --git a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_address_decode.rs b/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_address_decode.rs deleted file mode 100644 index 03ec386ad..000000000 --- a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_address_decode.rs +++ /dev/null @@ -1,20 +0,0 @@ -#![no_main] -#[macro_use] extern crate libfuzzer_sys; -extern crate ethereum_types; -extern crate ssz; - -use ethereum_types::Address; -use ssz::{DecodeError, decode}; - -// Fuzz ssz_decode() -fuzz_target!(|data: &[u8]| { - let result: Result = decode(data); - if data.len() == 20 { - // Should have valid result - let address = result.unwrap(); - assert_eq!(address, Address::from_slice(&data[..20])); - } else { - // Length of less than 32 should return error - assert!(result.is_err()); - } -}); diff --git a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_address_encode.rs b/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_address_encode.rs deleted file mode 100644 index 0e51e00ac..000000000 --- a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_address_encode.rs +++ /dev/null @@ -1,20 +0,0 @@ -#![no_main] -#[macro_use] extern crate libfuzzer_sys; -extern crate ethereum_types; -extern crate ssz; - -use ethereum_types::Address; -use ssz::SszStream; - -// Fuzz ssz_encode (via ssz_append) -fuzz_target!(|data: &[u8]| { - let mut ssz = SszStream::new(); - if data.len() >= 20 { - let hash = Address::from_slice(&data[..20]); - ssz.append(&hash); - let ssz = ssz.drain(); - - assert_eq!(data[..20], ssz[..20]); - assert_eq!(ssz.len(), 20); - } -}); diff --git a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_bool_decode.rs b/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_bool_decode.rs deleted file mode 100644 index fe555385c..000000000 --- a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_bool_decode.rs +++ /dev/null @@ -1,24 +0,0 @@ -#![no_main] -#[macro_use] extern crate libfuzzer_sys; -extern crate ssz; - -use ssz::{DecodeError, decode}; - -// Fuzz ssz_decode() -fuzz_target!(|data: &[u8]| { - let result: Result = decode(data); - if data.len() == 1 { - if data[0] == 1 { - let val_bool = result.unwrap(); - assert!(val_bool); - } else if data[0] == 0 { - let val_bool = result.unwrap(); - assert!(!val_bool); - } else { - assert_eq!(result, Err(DecodeError::Invalid)); - } - } else { - // Length of 0 should return error - assert!(result.is_err()); - } -}); diff --git a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_bool_encode.rs b/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_bool_encode.rs deleted file mode 100644 index 516551538..000000000 --- a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_bool_encode.rs +++ /dev/null @@ -1,20 +0,0 @@ -#![no_main] -#[macro_use] extern crate libfuzzer_sys; -extern crate ssz; - -use ssz::SszStream; - -// Fuzz ssz_encode (via ssz_append) -fuzz_target!(|data: &[u8]| { - let mut ssz = SszStream::new(); - let mut val_bool = 0; - if data.len() >= 1 { - val_bool = data[0] % u8::pow(2, 6); - } - - ssz.append(&val_bool); - let ssz = ssz.drain(); - - assert_eq!(val_bool, ssz[0]); - assert_eq!(ssz.len(), 1); -}); diff --git a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_hash256_decode.rs b/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_hash256_decode.rs deleted file mode 100644 index fd34844d8..000000000 --- a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_hash256_decode.rs +++ /dev/null @@ -1,20 +0,0 @@ -#![no_main] -#[macro_use] extern crate libfuzzer_sys; -extern crate ethereum_types; -extern crate ssz; - -use ethereum_types::H256; -use ssz::{DecodeError, decode}; - -// Fuzz ssz_decode() -fuzz_target!(|data: &[u8]| { - let result: Result = decode(data); - if data.len() == 32 { - // Should have valid result - let hash = result.unwrap(); - assert_eq!(hash, H256::from_slice(&data[..32])); - } else { - // Length of less than 32 should return error - assert!(result.is_err()); - } -}); diff --git a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_hash256_encode.rs b/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_hash256_encode.rs deleted file mode 100644 index 537d9cdf9..000000000 --- a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_hash256_encode.rs +++ /dev/null @@ -1,20 +0,0 @@ -#![no_main] -#[macro_use] extern crate libfuzzer_sys; -extern crate ethereum_types; -extern crate ssz; - -use ethereum_types::H256; -use ssz::SszStream; - -// Fuzz ssz_encode (via ssz_append) -fuzz_target!(|data: &[u8]| { - let mut ssz = SszStream::new(); - if data.len() >= 32 { - let hash = H256::from_slice(&data[..32]); - ssz.append(&hash); - let ssz = ssz.drain(); - - assert_eq!(data[..32], ssz[..32]); - assert_eq!(ssz.len(), 32); - } -}); diff --git a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_u16_decode.rs b/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_u16_decode.rs deleted file mode 100644 index e5f24ea88..000000000 --- a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_u16_decode.rs +++ /dev/null @@ -1,19 +0,0 @@ -#![no_main] -#[macro_use] extern crate libfuzzer_sys; -extern crate ssz; - -use ssz::{DecodeError, decode}; - -// Fuzz ssz_decode() -fuzz_target!(|data: &[u8]| { - let result: Result = decode(data); - if data.len() == 2 { - // Valid result - let number_u16 = result.unwrap(); - let val = u16::from_le_bytes([data[0], data[1]]); - assert_eq!(number_u16, val); - } else { - // Length of 0 or 1 should return error - assert!(result.is_err()); - } -}); diff --git a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_u16_encode.rs b/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_u16_encode.rs deleted file mode 100644 index 2dea8bb73..000000000 --- a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_u16_encode.rs +++ /dev/null @@ -1,20 +0,0 @@ -#![no_main] -#[macro_use] extern crate libfuzzer_sys; -extern crate ssz; - -use ssz::SszStream; - -// Fuzz ssz_encode (via ssz_append) -fuzz_target!(|data: &[u8]| { - let mut ssz = SszStream::new(); - let mut number_u16 = 0; - if data.len() >= 2 { - number_u16 = u16::from_be_bytes([data[0], data[1]]); - } - - ssz.append(&number_u16); - let ssz = ssz.drain(); - - assert_eq!(ssz.len(), 2); - assert_eq!(number_u16, u16::from_le_bytes([ssz[0], ssz[1]])); -}); diff --git a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_u32_decode.rs b/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_u32_decode.rs deleted file mode 100644 index f00c338fc..000000000 --- a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_u32_decode.rs +++ /dev/null @@ -1,19 +0,0 @@ -#![no_main] -#[macro_use] extern crate libfuzzer_sys; -extern crate ssz; - -use ssz::{DecodeError, decode}; - -// Fuzz ssz_decode() -fuzz_target!(|data: &[u8]| { - let result: Result = decode(data); - if data.len() == 4 { - // Valid result - let number_u32 = result.unwrap(); - let val = u32::from_le_bytes([data[0], data[1], data[2], data[3]]); - assert_eq!(number_u32, val); - } else { - // Length not 4 should return error - assert!(result.is_err()); - } -}); diff --git a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_u32_encode.rs b/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_u32_encode.rs deleted file mode 100644 index db3b750a7..000000000 --- a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_u32_encode.rs +++ /dev/null @@ -1,20 +0,0 @@ -#![no_main] -#[macro_use] extern crate libfuzzer_sys; -extern crate ssz; - -use ssz::SszStream; - -// Fuzz ssz_encode (via ssz_append) -fuzz_target!(|data: &[u8]| { - let mut ssz = SszStream::new(); - let mut number_u32 = 0; - if data.len() >= 4 { - number_u32 = u32::from_be_bytes([data[0], data[1], data[2], data[3]]); - } - - ssz.append(&number_u32); - let ssz = ssz.drain(); - - assert_eq!(ssz.len(), 4); - assert_eq!(number_u32, u32::from_le_bytes([ssz[0], ssz[1], ssz[2], ssz[3]])); -}); diff --git a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_u64_decode.rs b/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_u64_decode.rs deleted file mode 100644 index f5c2794da..000000000 --- a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_u64_decode.rs +++ /dev/null @@ -1,28 +0,0 @@ -#![no_main] -#[macro_use] extern crate libfuzzer_sys; -extern crate ssz; - -use ssz::{DecodeError, decode}; - -// Fuzz ssz_decode() -fuzz_target!(|data: &[u8]| { - let result: Result = decode(data); - if data.len() == 8 { - // Valid result - let number_u64 = result.unwrap(); - let val = u64::from_le_bytes([ - data[0], - data[1], - data[2], - data[3], - data[4], - data[5], - data[6], - data[7], - ]); - assert_eq!(number_u64, val); - } else { - // Length not 8 should return error - assert!(result.is_err()); - } -}); diff --git a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_u64_encode.rs b/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_u64_encode.rs deleted file mode 100644 index 6301fa86b..000000000 --- a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_u64_encode.rs +++ /dev/null @@ -1,38 +0,0 @@ -#![no_main] -#[macro_use] extern crate libfuzzer_sys; -extern crate ssz; - -use ssz::SszStream; - -// Fuzz ssz_encode (via ssz_append) -fuzz_target!(|data: &[u8]| { - let mut ssz = SszStream::new(); - let mut number_u64 = 0; - if data.len() >= 8 { - number_u64 = u64::from_le_bytes([ - data[0], - data[1], - data[2], - data[3], - data[4], - data[5], - data[6], - data[7], - ]); - } - - ssz.append(&number_u64); - let ssz = ssz.drain(); - - assert_eq!(ssz.len(), 8); - assert_eq!(number_u64, u64::from_le_bytes([ - ssz[0], - ssz[1], - ssz[2], - ssz[3], - ssz[4], - ssz[5], - ssz[6], - ssz[7], - ])); -}); diff --git a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_u8_decode.rs b/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_u8_decode.rs deleted file mode 100644 index 4fcf9e220..000000000 --- a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_u8_decode.rs +++ /dev/null @@ -1,18 +0,0 @@ -#![no_main] -#[macro_use] extern crate libfuzzer_sys; -extern crate ssz; - -use ssz::{DecodeError, decode}; - -// Fuzz ssz_decode() -fuzz_target!(|data: &[u8]| { - let result: Result = decode(data); - if data.len() == 1 { - // Should have valid result - let number_u8 = result.unwrap(); - assert_eq!(number_u8, data[0]); - } else { - // Length not 1 should return error - assert!(result.is_err()); - } -}); diff --git a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_u8_encode.rs b/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_u8_encode.rs deleted file mode 100644 index fa1437948..000000000 --- a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_u8_encode.rs +++ /dev/null @@ -1,20 +0,0 @@ -#![no_main] -#[macro_use] extern crate libfuzzer_sys; -extern crate ssz; - -use ssz::SszStream; - -// Fuzz ssz_encode (via ssz_append) -fuzz_target!(|data: &[u8]| { - let mut ssz = SszStream::new(); - let mut number_u8 = 0; - if data.len() >= 1 { - number_u8 = data[0]; - } - - ssz.append(&number_u8); - let ssz = ssz.drain(); - - assert_eq!(number_u8, ssz[0]); - assert_eq!(ssz.len(), 1); -}); diff --git a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_usize_decode.rs b/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_usize_decode.rs deleted file mode 100644 index 89ac62dce..000000000 --- a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_usize_decode.rs +++ /dev/null @@ -1,29 +0,0 @@ -#![no_main] -#[macro_use] extern crate libfuzzer_sys; -extern crate ssz; - -use ssz::{DecodeError, decode}; - -// Fuzz decode() -fuzz_target!(|data: &[u8]| { - // Note: we assume architecture is 64 bit -> usize == 64 bits - let result: Result = decode(data); - if data.len() == 8 { - // Valid result - let number_usize = result.unwrap(); - let val = u64::from_le_bytes([ - data[0], - data[1], - data[2], - data[3], - data[4], - data[5], - data[6], - data[7], - ]); - assert_eq!(number_usize, val as usize); - } else { - // Length less then 8 should return error - assert!(result.is_err()); - } -}); diff --git a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_usize_encode.rs b/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_usize_encode.rs deleted file mode 100644 index a2c804311..000000000 --- a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_usize_encode.rs +++ /dev/null @@ -1,38 +0,0 @@ -#![no_main] -#[macro_use] extern crate libfuzzer_sys; -extern crate ssz; - -use ssz::SszStream; - -// Fuzz ssz_encode (via ssz_append) -fuzz_target!(|data: &[u8]| { - let mut ssz = SszStream::new(); - let mut number_usize = 0; - if data.len() >= 8 { - number_usize = u64::from_le_bytes([ - data[0], - data[1], - data[2], - data[3], - data[4], - data[5], - data[6], - data[7], - ]) as usize; - } - - ssz.append(&number_usize); - let ssz = ssz.drain(); - - assert_eq!(ssz.len(), 8); - assert_eq!(number_usize, u64::from_le_bytes([ - ssz[0], - ssz[1], - ssz[2], - ssz[3], - ssz[4], - ssz[5], - ssz[6], - ssz[7], - ]) as usize); -}); diff --git a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_vec_address_decode.rs b/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_vec_address_decode.rs deleted file mode 100644 index 6b78862a2..000000000 --- a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_vec_address_decode.rs +++ /dev/null @@ -1,12 +0,0 @@ -#![no_main] -#[macro_use] extern crate libfuzzer_sys; -extern crate ethereum_types; -extern crate ssz; - -use ethereum_types::{Address}; -use ssz::{decode, DecodeError}; - -// Fuzz ssz_decode() -fuzz_target!(|data: &[u8]| { - let _result: Result, DecodeError> = decode(data); -}); diff --git a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_vec_bool_decode.rs b/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_vec_bool_decode.rs deleted file mode 100644 index ceff2652f..000000000 --- a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_vec_bool_decode.rs +++ /dev/null @@ -1,10 +0,0 @@ -#![no_main] -#[macro_use] extern crate libfuzzer_sys; -extern crate ssz; - -use ssz::{decode, DecodeError}; - -// Fuzz ssz_decode() -fuzz_target!(|data: &[u8]| { - let _result: Result, DecodeError> = decode(data); -}); diff --git a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_vec_decode.rs b/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_vec_decode.rs deleted file mode 100644 index 0605a011b..000000000 --- a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_vec_decode.rs +++ /dev/null @@ -1,11 +0,0 @@ -#![no_main] -#[macro_use] extern crate libfuzzer_sys; -extern crate ethereum_types; -extern crate ssz; - -use ssz::{decode, DecodeError, Decodable}; - -// Fuzz ssz_decode() -fuzz_target!(|data: &[u8]| { - let _result: Result, DecodeError> = decode(data); -}); diff --git a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_vec_encode.rs b/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_vec_encode.rs deleted file mode 100644 index 4b56aa60b..000000000 --- a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_vec_encode.rs +++ /dev/null @@ -1,14 +0,0 @@ -#![no_main] -#[macro_use] extern crate libfuzzer_sys; -extern crate ethereum_types; -extern crate ssz; - -use ssz::SszStream; - -// Fuzz ssz_encode() -fuzz_target!(|data: &[u8]| { - - let mut ssz = SszStream::new(); - let data_vec = data.to_vec(); - ssz.append(&data_vec); -}); diff --git a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_vec_u64_decode.rs b/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_vec_u64_decode.rs deleted file mode 100644 index 56f808f36..000000000 --- a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_vec_u64_decode.rs +++ /dev/null @@ -1,10 +0,0 @@ -#![no_main] -#[macro_use] extern crate libfuzzer_sys; -extern crate ssz; - -use ssz::{decode, DecodeError}; - -// Fuzz ssz_decode() -fuzz_target!(|data: &[u8]| { - let _result: Result, DecodeError> = decode(data); -});