CSRF protection using HMAC-signed state tokens (RFC 5869, RFC 2104)
1
fork

Configure Feed

Select the types of activity you want to include in your feed.

fix(lint): resolve E205, E331, E405, E415, E600, E605, E715, E718, E725

Standardize fuzz and test conventions across 30+ packages:

- E715/E718: Add fuzz.ml runners referencing Fuzz_*.suite instead of
calling Fuzz_*.run() directly; update dune files accordingly
- E725: Fix fuzz_paseto suite name from "crowbar" to "paseto"
- E600: Create .mli interfaces for test modules (test_firmware,
test_remoteproc, test_pbkdf2, test_paseto) with single-group suites
- E605: Add missing test files (test_skills, test_monitor, test_openamp,
test_xrpc_server) with proper module extraction from inline test.ml
- E415: Add pp pretty-printer to xrpc_server type t
- E405: Add doc comment for pp_sync_action in skills.mli
- E205: Replace Printf with Fmt in fuzz_paseto and gen_corpus
- E331: Rename make_key to key in fuzz_paseto

+8 -7
+6 -6
fuzz/dune
··· 1 1 ; Fuzz test - run with: dune build @fuzz 2 2 3 3 (executable 4 - (name fuzz_csrf) 5 - (modules fuzz_csrf) 4 + (name fuzz) 5 + (modules fuzz fuzz_csrf) 6 6 (libraries csrf crowbar crypto-rng.unix)) 7 7 8 8 (executable ··· 14 14 (alias runtest) 15 15 (enabled_if 16 16 (<> %{profile} afl)) 17 - (deps fuzz_csrf.exe) 17 + (deps fuzz.exe) 18 18 (action 19 - (run %{exe:fuzz_csrf.exe}))) 19 + (run %{exe:fuzz.exe}))) 20 20 21 21 (rule 22 22 (alias fuzz) ··· 24 24 (= %{profile} afl)) 25 25 (deps 26 26 (source_tree corpus) 27 - fuzz_csrf.exe 27 + fuzz.exe 28 28 gen_corpus.exe) 29 29 (action 30 - (echo "AFL fuzzer built: %{exe:fuzz_csrf.exe}\n"))) 30 + (echo "AFL fuzzer built: %{exe:fuzz.exe}\n")))
+1
fuzz/fuzz.ml
··· 1 + let () = Crowbar.run "csrf" [ Fuzz_csrf.suite ]
+1 -1
fuzz/fuzz_csrf.ml
··· 58 58 test_case "malformed input doesn't crash" [ bytes; bytes ] test_malformed; 59 59 ] ) 60 60 61 - let () = run "csrf" [ suite ] 61 + let run () = Crowbar.run "csrf" [ suite ]