diff --git a/fuzzers/FRET/Cargo.toml b/fuzzers/FRET/Cargo.toml index 4002869e5c..58b66de041 100644 --- a/fuzzers/FRET/Cargo.toml +++ b/fuzzers/FRET/Cargo.toml @@ -23,4 +23,5 @@ libafl_qemu = { path = "../../libafl_qemu/", features = ["arm", "systemmode"] } serde = { version = "1.0", default-features = false, features = ["alloc"] } # serialization lib hashbrown = { version = "0.12", features = ["serde", "ahash-compile-time-rng"] } # A faster hashmap, nostd compatible petgraph = { version="0.6.0", features = ["serde-1"] } -ron = "0.7" # write serialized data - including hashmaps \ No newline at end of file +ron = "0.7" # write serialized data - including hashmaps +rand = "0.5" \ No newline at end of file diff --git a/fuzzers/FRET/src/fuzzer.rs b/fuzzers/FRET/src/fuzzer.rs index 1e05eca309..05d47ec0dd 100644 --- a/fuzzers/FRET/src/fuzzer.rs +++ b/fuzzers/FRET/src/fuzzer.rs @@ -340,11 +340,13 @@ pub fn fuzz() { let num = str::parse::(&t).expect("FUZZ_ITERS was not a number"); if let Ok(_) = env::var("FUZZ_RANDOM") { unsafe { println!("Random Fuzzing, ignore corpus"); - let mut generator = RandBytesGenerator::new(MAX_INPUT_SIZE); + // let mut generator = RandBytesGenerator::new(MAX_INPUT_SIZE); let target_duration = Duration::from_secs(num); let start_time = std::time::Instant::now(); while start_time.elapsed() < target_duration { - let inp = generator.generate(&mut state).unwrap(); + // let inp = generator.generate(&mut state).unwrap(); + // libafl's generator is too slow + let inp = BytesInput::new(vec![rand::random::(); MAX_INPUT_SIZE]); fuzzer.evaluate_input(&mut state, &mut executor, &mut mgr, inp).unwrap(); } }} else {