starting build "71cc1cb6-4cc4-4355-9d56-5f4d566b445c" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 5.632kB Step #1: Step 1/4 : FROM gcr.io/oss-fuzz-base/base-builder-rust Step #1: latest: Pulling from oss-fuzz-base/base-builder-rust Step #1: b549f31133a9: Pulling fs layer Step #1: 3d710c687d00: Pulling fs layer Step #1: 5871c999bb7f: Pulling fs layer Step #1: 49000c630162: Pulling fs layer Step #1: 5392ce741eff: Pulling fs layer Step #1: 263734d12e9c: Pulling fs layer Step #1: 7306bd1f392c: Pulling fs layer Step #1: 4e4e8971c238: Pulling fs layer Step #1: ab58def3c482: Pulling fs layer Step #1: bf2fdf6c64d4: Pulling fs layer Step #1: 19538d0a2442: Pulling fs layer Step #1: 7810f4e9fe4d: Pulling fs layer Step #1: 9d66997e22ca: Pulling fs layer Step #1: 2ffeb66e248c: Pulling fs layer Step #1: e931b1039fcc: Pulling fs layer Step #1: 68e5052c5cfe: Pulling fs layer Step #1: 872fbc0da05e: Pulling fs layer Step #1: 5392ce741eff: Waiting Step #1: 0c63282fb394: Pulling fs layer Step #1: 9e5473413b08: Pulling fs layer Step #1: e57b519feb8f: Pulling fs layer Step #1: 7bb19315c9db: Pulling fs layer Step #1: 4e4e8971c238: Waiting Step #1: 7ebdcf9f783d: Pulling fs layer Step #1: ababc272d73e: Pulling fs layer Step #1: 7306bd1f392c: Waiting Step #1: 263734d12e9c: Waiting Step #1: ab58def3c482: Waiting Step #1: 9b86524e6f04: Pulling fs layer Step #1: b686b4d27010: Pulling fs layer Step #1: bf2fdf6c64d4: Waiting Step #1: 41bd949d07dc: Pulling fs layer Step #1: 752af61ae2bf: Pulling fs layer Step #1: 19538d0a2442: Waiting Step #1: 9b3040955b60: Pulling fs layer Step #1: 7810f4e9fe4d: Waiting Step #1: acb248606d61: Pulling fs layer Step #1: 4daa157fbf24: Pulling fs layer Step #1: a691504df577: Pulling fs layer Step #1: c4c6ca34d89b: Pulling fs layer Step #1: 68e5052c5cfe: Waiting Step #1: 0a1b9407b7db: Pulling fs layer Step #1: 9d66997e22ca: Waiting Step #1: 872fbc0da05e: Waiting Step #1: 2ffeb66e248c: Waiting Step #1: 7bb19315c9db: Waiting Step #1: e931b1039fcc: Waiting Step #1: 0c63282fb394: Waiting Step #1: 9e5473413b08: Waiting Step #1: e57b519feb8f: Waiting Step #1: 49000c630162: Waiting Step #1: 7ebdcf9f783d: Waiting Step #1: ababc272d73e: Waiting Step #1: acb248606d61: Waiting Step #1: c4c6ca34d89b: Waiting Step #1: 4daa157fbf24: Waiting Step #1: 9b86524e6f04: Waiting Step #1: a691504df577: Waiting Step #1: 0a1b9407b7db: Waiting Step #1: 752af61ae2bf: Waiting Step #1: b686b4d27010: Waiting Step #1: 41bd949d07dc: Waiting Step #1: 5871c999bb7f: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: 5392ce741eff: Verifying Checksum Step #1: 5392ce741eff: Download complete Step #1: 49000c630162: Verifying Checksum Step #1: 49000c630162: Download complete Step #1: 263734d12e9c: Download complete Step #1: 3d710c687d00: Verifying Checksum Step #1: 3d710c687d00: Download complete Step #1: 4e4e8971c238: Verifying Checksum Step #1: 4e4e8971c238: Download complete Step #1: ab58def3c482: Verifying Checksum Step #1: ab58def3c482: Download complete Step #1: b549f31133a9: Pull complete Step #1: 19538d0a2442: Verifying Checksum Step #1: 19538d0a2442: Download complete Step #1: 7810f4e9fe4d: Verifying Checksum Step #1: 7810f4e9fe4d: Download complete Step #1: 9d66997e22ca: Verifying Checksum Step #1: 9d66997e22ca: Download complete Step #1: 2ffeb66e248c: Verifying Checksum Step #1: 2ffeb66e248c: Download complete Step #1: e931b1039fcc: Verifying Checksum Step #1: e931b1039fcc: Download complete Step #1: 68e5052c5cfe: Verifying Checksum Step #1: 68e5052c5cfe: Download complete Step #1: 872fbc0da05e: Download complete Step #1: bf2fdf6c64d4: Verifying Checksum Step #1: bf2fdf6c64d4: Download complete Step #1: 0c63282fb394: Verifying Checksum Step #1: 0c63282fb394: Download complete Step #1: 9e5473413b08: Verifying Checksum Step #1: 9e5473413b08: Download complete Step #1: e57b519feb8f: Verifying Checksum Step #1: e57b519feb8f: Download complete Step #1: 7bb19315c9db: Download complete Step #1: 7306bd1f392c: Verifying Checksum Step #1: 7306bd1f392c: Download complete Step #1: ababc272d73e: Download complete Step #1: 9b86524e6f04: Verifying Checksum Step #1: 7ebdcf9f783d: Verifying Checksum Step #1: 7ebdcf9f783d: Download complete Step #1: b686b4d27010: Verifying Checksum Step #1: b686b4d27010: Download complete Step #1: 752af61ae2bf: Download complete Step #1: 41bd949d07dc: Verifying Checksum Step #1: 41bd949d07dc: Download complete Step #1: 9b3040955b60: Verifying Checksum Step #1: 9b3040955b60: Download complete Step #1: 3d710c687d00: Pull complete Step #1: 4daa157fbf24: Verifying Checksum Step #1: 4daa157fbf24: Download complete Step #1: acb248606d61: Verifying Checksum Step #1: acb248606d61: Download complete Step #1: 5871c999bb7f: Pull complete Step #1: a691504df577: Verifying Checksum Step #1: a691504df577: Download complete Step #1: c4c6ca34d89b: Verifying Checksum Step #1: c4c6ca34d89b: Download complete Step #1: 49000c630162: Pull complete Step #1: 5392ce741eff: Pull complete Step #1: 263734d12e9c: Pull complete Step #1: 0a1b9407b7db: Verifying Checksum Step #1: 0a1b9407b7db: Download complete Step #1: 7306bd1f392c: Pull complete Step #1: 4e4e8971c238: Pull complete Step #1: ab58def3c482: Pull complete Step #1: bf2fdf6c64d4: Pull complete Step #1: 19538d0a2442: Pull complete Step #1: 7810f4e9fe4d: Pull complete Step #1: 9d66997e22ca: Pull complete Step #1: 2ffeb66e248c: Pull complete Step #1: e931b1039fcc: Pull complete Step #1: 68e5052c5cfe: Pull complete Step #1: 872fbc0da05e: Pull complete Step #1: 0c63282fb394: Pull complete Step #1: 9e5473413b08: Pull complete Step #1: e57b519feb8f: Pull complete Step #1: 7bb19315c9db: Pull complete Step #1: 7ebdcf9f783d: Pull complete Step #1: ababc272d73e: Pull complete Step #1: 9b86524e6f04: Pull complete Step #1: b686b4d27010: Pull complete Step #1: 41bd949d07dc: Pull complete Step #1: 752af61ae2bf: Pull complete Step #1: 9b3040955b60: Pull complete Step #1: acb248606d61: Pull complete Step #1: 4daa157fbf24: Pull complete Step #1: a691504df577: Pull complete Step #1: c4c6ca34d89b: Pull complete Step #1: 0a1b9407b7db: Pull complete Step #1: Digest: sha256:b2bd947f8b500a75894c7648cd7c546b73e452b5a5e5791f44681001bddb0ffe Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-rust:latest Step #1: ---> fb700f40653f Step #1: Step 2/4 : RUN git clone --depth 1 --recursive https://github.com/ccc-spdm-tools/spdm-rs.git Step #1: ---> Running in df5b4c103262 Step #1: Cloning into 'spdm-rs'... Step #1: Submodule 'external/ring' (https://github.com/briansmith/ring.git) registered for path 'external/ring' Step #1: Submodule 'external/webpki' (https://github.com/briansmith/webpki.git) registered for path 'external/webpki' Step #1: Cloning into '/src/spdm-rs/external/ring'... Step #1: Cloning into '/src/spdm-rs/external/webpki'... Step #1: Submodule path 'external/ring': checked out '464d367252354418a2c17feb806876d4d89a8508' Step #1: Submodule path 'external/webpki': checked out 'f84a538a5cd281ba1ffc0d54bbe5824cf5969703' Step #1: Removing intermediate container df5b4c103262 Step #1: ---> e0091ebc3c10 Step #1: Step 3/4 : COPY build.sh $SRC/ Step #1: ---> 9d48b6638a04 Step #1: Step 4/4 : WORKDIR $SRC/spdm-rs Step #1: ---> Running in 40a5fbcb4cae Step #1: Removing intermediate container 40a5fbcb4cae Step #1: ---> 3b56db7b006b Step #1: Successfully built 3b56db7b006b Step #1: Successfully tagged gcr.io/oss-fuzz/spdm-rs:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/spdm-rs Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/fileZ580kN Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ rust == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/spdm-rs/.git Step #2 - "srcmap": + GIT_DIR=/src/spdm-rs Step #2 - "srcmap": + cd /src/spdm-rs Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/ccc-spdm-tools/spdm-rs.git Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=ee0aae0ab62fb90bf15424d0ca83ca3679b6ac44 Step #2 - "srcmap": + jq_inplace /tmp/fileZ580kN '."/src/spdm-rs" = { type: "git", url: "https://github.com/ccc-spdm-tools/spdm-rs.git", rev: "ee0aae0ab62fb90bf15424d0ca83ca3679b6ac44" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filetc2yTa Step #2 - "srcmap": + cat /tmp/fileZ580kN Step #2 - "srcmap": + jq '."/src/spdm-rs" = { type: "git", url: "https://github.com/ccc-spdm-tools/spdm-rs.git", rev: "ee0aae0ab62fb90bf15424d0ca83ca3679b6ac44" }' Step #2 - "srcmap": + mv /tmp/filetc2yTa /tmp/fileZ580kN Step #2 - "srcmap": ++ find /src -name .svn -type d Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/fileZ580kN Step #2 - "srcmap": + rm /tmp/fileZ580kN Step #2 - "srcmap": { Step #2 - "srcmap": "/src/spdm-rs": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/ccc-spdm-tools/spdm-rs.git", Step #2 - "srcmap": "rev": "ee0aae0ab62fb90bf15424d0ca83ca3679b6ac44" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + set -eox pipefail Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd /src/spdm-rs Step #3 - "compile-libfuzzer-coverage-x86_64": /src/spdm-rs /src/spdm-rs Step #3 - "compile-libfuzzer-coverage-x86_64": + export CARGO_TARGET_DIR=/src/spdm-rs/target Step #3 - "compile-libfuzzer-coverage-x86_64": + CARGO_TARGET_DIR=/src/spdm-rs/target Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_TARGET_OUTPUT_DIR=/src/spdm-rs/target/x86_64-unknown-linux-gnu/release Step #3 - "compile-libfuzzer-coverage-x86_64": + bash sh_script/pre-build.sh Step #3 - "compile-libfuzzer-coverage-x86_64": /src/spdm-rs/external/ring /src/spdm-rs Step #3 - "compile-libfuzzer-coverage-x86_64": HEAD is now at 464d36725 0.17.6. Step #3 - "compile-libfuzzer-coverage-x86_64": /src/spdm-rs Step #3 - "compile-libfuzzer-coverage-x86_64": /src/spdm-rs/external/webpki /src/spdm-rs Step #3 - "compile-libfuzzer-coverage-x86_64": HEAD is now at f84a538 0.22.4. Step #3 - "compile-libfuzzer-coverage-x86_64": /src/spdm-rs Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd spdmlib Step #3 - "compile-libfuzzer-coverage-x86_64": /src/spdm-rs/spdmlib /src/spdm-rs /src/spdm-rs Step #3 - "compile-libfuzzer-coverage-x86_64": + cargo fuzz build --release Step #3 - "compile-libfuzzer-coverage-x86_64":  Updating crates.io index Step #3 - "compile-libfuzzer-coverage-x86_64": warning: Patch `mbedtls-platform-support v0.1.1 (/src/spdm-rs/spdmlib_crypto_mbedtls/mbedtls-platform-support)` was not used in the crate graph. Step #3 - "compile-libfuzzer-coverage-x86_64": Check that the patched package version and available features are compatible Step #3 - "compile-libfuzzer-coverage-x86_64": with the dependency requirements. If the patch has a different version from Step #3 - "compile-libfuzzer-coverage-x86_64": what is locked in the Cargo.lock file, run `cargo update` to use the new Step #3 - "compile-libfuzzer-coverage-x86_64": version. This may also occur with an optional dependency that is not enabled. Step #3 - "compile-libfuzzer-coverage-x86_64":  Locking 115 packages to latest compatible versions Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding bitflags v1.3.2 (latest: v2.6.0) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding conquer-once v0.3.2 (latest: v0.4.0) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding flexi_logger v0.27.4 (latest: v0.29.2) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding nu-ansi-term v0.49.0 (latest: v0.50.1) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding serde v1.0.198 (latest: v1.0.210) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding serde_derive v1.0.198 (latest: v1.0.210) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding simple_logger v4.3.3 (latest: v5.0.0) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding volatile v0.4.6 (latest: v0.6.1) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding wasi v0.11.0+wasi-snapshot-preview1 (latest: v0.13.2+wasi-0.2.1) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding windows-core v0.52.0 (latest: v0.58.0) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding windows-sys v0.48.0 (latest: v0.59.0) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding windows-sys v0.52.0 (latest: v0.59.0) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding windows-targets v0.48.5 (latest: v0.52.6) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding windows_aarch64_gnullvm v0.48.5 (latest: v0.52.6) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding windows_aarch64_msvc v0.48.5 (latest: v0.52.6) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding windows_i686_gnu v0.48.5 (latest: v0.52.6) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding windows_i686_msvc v0.48.5 (latest: v0.52.6) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding windows_x86_64_gnu v0.48.5 (latest: v0.52.6) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding windows_x86_64_gnullvm v0.48.5 (latest: v0.52.6) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding windows_x86_64_msvc v0.48.5 (latest: v0.52.6) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding x86_64 v0.14.12 (latest: v0.15.1) Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloading crates ... Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded async-trait v0.1.83 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded bitflags v1.3.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded autocfg v1.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded num_threads v0.1.7 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded pin-utils v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded futures-sink v0.3.31 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded num-conv v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded arbitrary v1.3.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded itoa v1.0.11 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded zeroize v1.8.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded time-core v0.1.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded zeroize_derive v1.4.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded time-macros v0.2.18 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded proc-macro2 v1.0.87 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded unicode-ident v1.0.13 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded log v0.4.22 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded serde v1.0.198 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded time v0.3.36 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded memchr v2.7.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded serde_json v1.0.128 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded libfuzzer-sys v0.4.7 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded futures-util v0.3.31 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded futures v0.3.31 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded flexi_logger v0.27.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded chrono v0.4.38 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded cc v1.1.28 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded regex v1.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded syn v2.0.79 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded bytes v1.7.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded serde_derive v1.0.198 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded once_cell v1.20.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded regex-syntax v0.8.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded num-traits v0.2.19 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded lock_api v0.4.12 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded jobserver v0.1.32 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded pin-project-lite v0.2.14 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded aho-corasick v1.1.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded spin v0.9.8 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded ryu v1.0.18 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded nu-ansi-term v0.49.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded conquer-once v0.3.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded regex-automata v0.4.8 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded woke v0.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded thiserror-impl v1.0.64 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded powerfmt v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded maybe-async v0.2.10 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded glob v0.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded futures-core v0.3.31 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded thiserror v1.0.64 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded simple_logger v4.3.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded scopeguard v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded libc v0.2.159 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded quote v1.0.37 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded is-terminal v0.4.13 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded iana-time-zone v0.1.61 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded getrandom v0.2.15 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded futures-channel v0.3.31 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded deranged v0.3.11 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded untrusted v0.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded shlex v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded futures-task v0.3.31 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded futures-io v0.3.31 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded conquer-util v0.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded colored v2.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded cfg-if v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded lazy_static v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded async-recursion v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling libc v0.2.159 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling proc-macro2 v1.0.87 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling autocfg v1.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling unicode-ident v1.0.13 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling scopeguard v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling shlex v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling memchr v2.7.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling itoa v1.0.11 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling serde v1.0.198 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling futures-sink v0.3.31 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling serde_json v1.0.128 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling futures-core v0.3.31 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling ryu v1.0.18 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling futures-task v0.3.31 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling pin-project-lite v0.2.14 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling pin-utils v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling cfg-if v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling untrusted v0.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling log v0.4.22 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling futures-io v0.3.31 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling conquer-util v0.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling bytes v1.7.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling powerfmt v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling num-conv v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling bitflags v1.3.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling thiserror v1.0.64 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling regex-syntax v0.8.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling codec v0.2.2 (/src/spdm-rs/codec) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling time-core v0.1.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling num_threads v0.1.7 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling iana-time-zone v0.1.61 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling woke v0.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling nu-ansi-term v0.49.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling glob v0.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling once_cell v1.20.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling arbitrary v1.3.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling futures-util v0.3.31 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling futures-channel v0.3.31 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling conquer-once v0.3.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling deranged v0.3.11 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling time-macros v0.2.18 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling lock_api v0.4.12 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling num-traits v0.2.19 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling aho-corasick v1.1.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling spin v0.9.8 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling quote v1.0.37 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling jobserver v0.1.32 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling getrandom v0.2.15 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling is-terminal v0.4.13 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling lazy_static v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling colored v2.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling syn v2.0.79 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling cc v1.1.28 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling chrono v0.4.38 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling time v0.3.36 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling futures v0.3.31 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling executor v0.1.0 (/src/spdm-rs/executor) Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unexpected `cfg` condition value: `std` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/executor/src/lib.rs:8:7 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 8 | #[cfg(feature = "std")] Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^ help: remove the condition Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: no expected values for `feature` Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: consider adding `std` as a feature in `Cargo.toml` Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: see for more information about checking conditional configuration Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(unexpected_cfgs)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: `executor` (lib) generated 1 warning Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling regex-automata v0.4.8 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling ring v0.17.6 (/src/spdm-rs/external/ring) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling libfuzzer-sys v0.4.7 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling simple_logger v4.3.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling regex v1.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling serde_derive v1.0.198 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling zeroize_derive v1.4.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling maybe-async v0.2.10 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling async-trait v0.1.83 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling thiserror-impl v1.0.64 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling async-recursion v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unexpected `cfg` condition name: `pregenerate_asm_only` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/external/ring/src/lib.rs:47:12 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 47 | #![cfg(not(pregenerate_asm_only))] Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: expected names are: `clippy`, `debug_assertions`, `doc`, `docsrs`, `doctest`, `feature`, `miri`, `overflow_checks`, `panic`, `proc_macro`, `relocation_model`, `rustfmt`, `sanitize`, `sanitizer_cfi_generalize_pointers`, `sanitizer_cfi_normalize_integers`, `target_abi`, `target_arch`, `target_endian`, `target_env`, `target_family`, `target_feature`, `target_has_atomic`, `target_has_atomic_equal_alignment`, `target_has_atomic_load_store`, `target_os`, `target_pointer_width`, `target_thread_local`, `target_vendor`, `test`, `ub_checks`, `unix`, and `windows` Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: consider using a Cargo feature instead Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: Step #3 - "compile-libfuzzer-coverage-x86_64":  [lints.rust] Step #3 - "compile-libfuzzer-coverage-x86_64":  unexpected_cfgs = { level = "warn", check-cfg = ['cfg(pregenerate_asm_only)'] } Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(pregenerate_asm_only)");` to the top of the `build.rs` Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: see for more information about checking conditional configuration Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(unexpected_cfgs)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unexpected `cfg` condition value: `aarc64` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/external/ring/src/prefixed.rs:45:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 45 |  target_arch = "aarc64", Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^-------- Step #3 - "compile-libfuzzer-coverage-x86_64":  | | Step #3 - "compile-libfuzzer-coverage-x86_64":  | help: there is a expected value with a similar name: `"aarch64"` Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: expected values for `target_arch` are: `aarch64`, `arm`, `arm64ec`, `avr`, `bpf`, `csky`, `hexagon`, `loongarch64`, `m68k`, `mips`, `mips32r6`, `mips64`, `mips64r6`, `msp430`, `nvptx64`, `powerpc`, `powerpc64`, `riscv32`, `riscv64`, `s390x`, `sparc`, `sparc64`, `wasm32`, `wasm64`, `x86`, `x86_64`, and `xtensa` Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: see for more information about checking conditional configuration Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused imports: `PKCS1` and `PSS` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/external/ring/src/rsa/padding.rs:21:13 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 21 |  pkcs1::{PKCS1, RSA_PKCS1_SHA256, RSA_PKCS1_SHA384, RSA_PKCS1_SHA512}, Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": 22 |  pss::{PSS, RSA_PSS_SHA256, RSA_PSS_SHA384, RSA_PSS_SHA512}, Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling zeroize v1.8.1 Step #3 - "compile-libfuzzer-coverage-x86_64": warning: associated constant `ZERO` is never used Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/external/ring/src/endian.rs:11:11 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 7 | pub trait Encoding: From + Into Step #3 - "compile-libfuzzer-coverage-x86_64":  | -------- associated constant in this trait Step #3 - "compile-libfuzzer-coverage-x86_64": ... Step #3 - "compile-libfuzzer-coverage-x86_64": 11 |  const ZERO: Self; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(dead_code)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling flexi_logger v0.27.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling webpki v0.22.4 (/src/spdm-rs/external/webpki) Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `CONSTRUCTED` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/external/webpki/src/der.rs:17:24 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 17 |  der::{nested, Tag, CONSTRUCTED}, Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: `ring` (lib) generated 4 warnings (run `cargo fix --lib -p ring` to apply 1 suggestion) Step #3 - "compile-libfuzzer-coverage-x86_64": warning: `webpki` (lib) generated 1 warning (run `cargo fix --lib -p webpki` to apply 1 suggestion) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling spdmlib v0.1.0 (/src/spdm-rs/spdmlib) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling pcidoe_transport v0.1.0 (/src/spdm-rs/pcidoe_transport) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling spdmlib-test v0.1.0 (/src/spdm-rs/test/spdmlib-test) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling fuzzlib v0.1.0 (/src/spdm-rs/fuzz-target/fuzzlib) Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `crate::spdmlib::error::SPDM_STATUS_SEND_FAIL` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/fuzz-target/fuzzlib/src/fake_device_io.rs:8:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 8 | use crate::spdmlib::error::SPDM_STATUS_SEND_FAIL; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `core::borrow::BorrowMut` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/fuzz-target/fuzzlib/src/fake_device_io.rs:16:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 16 | use core::borrow::BorrowMut; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused variable: `buffer` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/fuzz-target/fuzzlib/src/fake_device_io.rs:84:30 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 84 |  async fn send(&mut self, buffer: Arc<&[u8]>) -> SpdmResult { Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^ help: if this is intentional, prefix it with an underscore: `_buffer` Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(unused_variables)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: `fuzzlib` (lib) generated 3 warnings (run `cargo fix --lib -p fuzzlib` to apply 2 suggestions) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling spdmlib-fuzz v0.0.0 (/src/spdm-rs/spdmlib/fuzz) Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `spdmlib::common::SpdmConnectionState` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/requester/algorithm_req/src/main.rs:6:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 6 | use spdmlib::common::SpdmConnectionState; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `alloc::boxed::Box` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/responder/measurement_rsp/src/main.rs:13:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 13 | use alloc::boxed::Box; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `alloc::boxed::Box` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/responder/finish_rsp/src/main.rs:13:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 13 | use alloc::boxed::Box; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `core::ops::DerefMut` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/responder/measurement_rsp/src/main.rs:15:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 15 | use core::ops::DerefMut; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `alloc::boxed::Box` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/requester/encapsulated_request_digest_req/src/main.rs:12:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 12 | use alloc::boxed::Box; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `alloc::boxed::Box` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/responder/get_encapsulated_request_rsp/src/main.rs:10:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 10 | use alloc::boxed::Box; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `alloc::boxed::Box` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/requester/algorithm_req/src/main.rs:9:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 9 | use alloc::boxed::Box; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `core::ops::DerefMut` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/responder/finish_rsp/src/main.rs:15:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 15 | use core::ops::DerefMut; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `core::ops::DerefMut` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/requester/algorithm_req/src/main.rs:11:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 11 | use core::ops::DerefMut; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `core::ops::DerefMut` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/requester/encapsulated_request_digest_req/src/main.rs:14:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 14 | use core::ops::DerefMut; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `core::ops::DerefMut` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/responder/get_encapsulated_request_rsp/src/main.rs:12:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 12 | use core::ops::DerefMut; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `alloc::boxed::Box` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/responder/vendor_rsp/src/main.rs:15:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 15 | use alloc::boxed::Box; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `alloc::boxed::Box` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/responder/digest_rsp/src/main.rs:11:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 11 | use alloc::boxed::Box; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `core::ops::DerefMut` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/responder/vendor_rsp/src/main.rs:17:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 17 | use core::ops::DerefMut; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `core::ops::DerefMut` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/responder/digest_rsp/src/main.rs:13:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 13 | use core::ops::DerefMut; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unexpected `cfg` condition value: `fuzzlogfile` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/requester/algorithm_req/src/main.rs:39:15 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 39 |  #[cfg(all(feature = "fuzzlogfile", feature = "fuzz"))] Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: expected values for `feature` are: `default`, `hashed-transcript-data`, and `use_libfuzzer` Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: consider adding `fuzzlogfile` as a feature in `Cargo.toml` Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: see for more information about checking conditional configuration Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(unexpected_cfgs)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unexpected `cfg` condition value: `fuzzlogfile` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/responder/finish_rsp/src/main.rs:373:15 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 373 |  #[cfg(all(feature = "fuzzlogfile", feature = "fuzz"))] Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: expected values for `feature` are: `default`, `hashed-transcript-data`, and `use_libfuzzer` Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: consider adding `fuzzlogfile` as a feature in `Cargo.toml` Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: see for more information about checking conditional configuration Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(unexpected_cfgs)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unexpected `cfg` condition value: `fuzz` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/requester/algorithm_req/src/main.rs:39:40 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 39 |  #[cfg(all(feature = "fuzzlogfile", feature = "fuzz"))] Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: expected values for `feature` are: `default`, `hashed-transcript-data`, and `use_libfuzzer` Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: consider adding `fuzz` as a feature in `Cargo.toml` Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: see for more information about checking conditional configuration Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unexpected `cfg` condition value: `fuzz` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/requester/algorithm_req/src/main.rs:54:15 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 54 |  #[cfg(not(feature = "fuzz"))] Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: expected values for `feature` are: `default`, `hashed-transcript-data`, and `use_libfuzzer` Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: consider adding `fuzz` as a feature in `Cargo.toml` Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: see for more information about checking conditional configuration Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unexpected `cfg` condition value: `fuzz` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/responder/finish_rsp/src/main.rs:373:40 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 373 |  #[cfg(all(feature = "fuzzlogfile", feature = "fuzz"))] Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: expected values for `feature` are: `default`, `hashed-transcript-data`, and `use_libfuzzer` Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: consider adding `fuzz` as a feature in `Cargo.toml` Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: see for more information about checking conditional configuration Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unexpected `cfg` condition value: `fuzz` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/requester/algorithm_req/src/main.rs:72:11 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 72 |  #[cfg(feature = "fuzz")] Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: expected values for `feature` are: `default`, `hashed-transcript-data`, and `use_libfuzzer` Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: consider adding `fuzz` as a feature in `Cargo.toml` Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: see for more information about checking conditional configuration Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unexpected `cfg` condition value: `fuzz` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/responder/finish_rsp/src/main.rs:388:15 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 388 |  #[cfg(not(feature = "fuzz"))] Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: expected values for `feature` are: `default`, `hashed-transcript-data`, and `use_libfuzzer` Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: consider adding `fuzz` as a feature in `Cargo.toml` Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: see for more information about checking conditional configuration Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unexpected `cfg` condition value: `fuzz` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/responder/finish_rsp/src/main.rs:406:11 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 406 |  #[cfg(feature = "fuzz")] Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: expected values for `feature` are: `default`, `hashed-transcript-data`, and `use_libfuzzer` Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: consider adding `fuzz` as a feature in `Cargo.toml` Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: see for more information about checking conditional configuration Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused variable: `pcidoe_transport_encap` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/requester/algorithm_req/src/main.rs:18:9 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 18 |  let pcidoe_transport_encap = &mut PciDoeTransportEncap {}; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_pcidoe_transport_encap` Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(unused_variables)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `spdmlib::common::SpdmConnectionState` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/requester/key_exchange_req/src/main.rs:6:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 6 | use spdmlib::common::SpdmConnectionState; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `alloc::boxed::Box` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/responder/key_update_rsp/src/main.rs:12:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 12 | use alloc::boxed::Box; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `alloc::boxed::Box` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/responder/keyexchange_rsp/src/main.rs:10:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 10 | use alloc::boxed::Box; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `core::ops::DerefMut` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/responder/keyexchange_rsp/src/main.rs:12:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 12 | use core::ops::DerefMut; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `alloc::boxed::Box` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/requester/key_exchange_req/src/main.rs:11:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 11 | use alloc::boxed::Box; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `core::ops::DerefMut` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/responder/key_update_rsp/src/main.rs:14:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 14 | use core::ops::DerefMut; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `core::ops::DerefMut` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/requester/key_exchange_req/src/main.rs:13:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 13 | use core::ops::DerefMut; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `spdmlib::common::SpdmConnectionState` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/requester/psk_exchange_req/src/main.rs:6:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 6 | use spdmlib::common::SpdmConnectionState; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `alloc::boxed::Box` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/requester/psk_exchange_req/src/main.rs:10:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 10 | use alloc::boxed::Box; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `core::ops::DerefMut` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/requester/psk_exchange_req/src/main.rs:12:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 12 | use core::ops::DerefMut; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `alloc::boxed::Box` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/requester/key_update_req/src/main.rs:13:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 13 | use alloc::boxed::Box; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `core::ops::DerefMut` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/requester/key_update_req/src/main.rs:15:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 15 | use core::ops::DerefMut; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `alloc::boxed::Box` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/requester/psk_finish_req/src/main.rs:12:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 12 | use alloc::boxed::Box; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `core::ops::DerefMut` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/requester/psk_finish_req/src/main.rs:14:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 14 | use core::ops::DerefMut; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `spdmlib::common::SpdmConnectionState` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/requester/capability_req/src/main.rs:6:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 6 | use spdmlib::common::SpdmConnectionState; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `alloc::boxed::Box` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/requester/capability_req/src/main.rs:9:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 9 | use alloc::boxed::Box; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `core::ops::DerefMut` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/requester/capability_req/src/main.rs:11:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 11 | use core::ops::DerefMut; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `alloc::boxed::Box` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/responder/pskexchange_rsp/src/main.rs:11:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 11 | use alloc::boxed::Box; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `core::ops::DerefMut` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/responder/pskexchange_rsp/src/main.rs:13:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 13 | use core::ops::DerefMut; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unexpected `cfg` condition value: `fuzzlogfile` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/responder/pskexchange_rsp/src/main.rs:198:15 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 198 |  #[cfg(all(feature = "fuzzlogfile", feature = "fuzz"))] Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: expected values for `feature` are: `default`, `hashed-transcript-data`, and `use_libfuzzer` Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: consider adding `fuzzlogfile` as a feature in `Cargo.toml` Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: see for more information about checking conditional configuration Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(unexpected_cfgs)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unexpected `cfg` condition value: `fuzz` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/responder/pskexchange_rsp/src/main.rs:198:40 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 198 |  #[cfg(all(feature = "fuzzlogfile", feature = "fuzz"))] Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: expected values for `feature` are: `default`, `hashed-transcript-data`, and `use_libfuzzer` Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: consider adding `fuzz` as a feature in `Cargo.toml` Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: see for more information about checking conditional configuration Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unexpected `cfg` condition value: `fuzz` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/responder/pskexchange_rsp/src/main.rs:213:15 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 213 |  #[cfg(not(feature = "fuzz"))] Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: expected values for `feature` are: `default`, `hashed-transcript-data`, and `use_libfuzzer` Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: consider adding `fuzz` as a feature in `Cargo.toml` Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: see for more information about checking conditional configuration Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unexpected `cfg` condition value: `fuzz` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/responder/pskexchange_rsp/src/main.rs:226:11 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 226 |  #[cfg(feature = "fuzz")] Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: expected values for `feature` are: `default`, `hashed-transcript-data`, and `use_libfuzzer` Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: consider adding `fuzz` as a feature in `Cargo.toml` Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: see for more information about checking conditional configuration Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `alloc::boxed::Box` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/responder/capability_rsp/src/main.rs:9:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 9 | use alloc::boxed::Box; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: function `main` is never used Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/requester/algorithm_req/src/main.rs:38:4 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 38 | fn main() { Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(dead_code)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `core::ops::DerefMut` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/responder/capability_rsp/src/main.rs:11:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 11 | use core::ops::DerefMut; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `alloc::boxed::Box` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/responder/deliver_encapsulated_response_rsp/src/main.rs:10:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 10 | use alloc::boxed::Box; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `core::ops::DerefMut` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/responder/deliver_encapsulated_response_rsp/src/main.rs:12:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 12 | use core::ops::DerefMut; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `alloc::boxed::Box` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/responder/deliver_encapsulated_response_digest_rsp/src/main.rs:10:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 10 | use alloc::boxed::Box; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `core::ops::DerefMut` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/responder/deliver_encapsulated_response_digest_rsp/src/main.rs:12:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 12 | use core::ops::DerefMut; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `alloc::boxed::Box` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/responder/end_session_rsp/src/main.rs:12:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 12 | use alloc::boxed::Box; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `core::ops::DerefMut` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/responder/end_session_rsp/src/main.rs:14:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 14 | use core::ops::DerefMut; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `alloc::boxed::Box` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/responder/version_rsp/src/main.rs:8:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 8 | use alloc::boxed::Box; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `alloc::boxed::Box` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/responder/certificate_rsp/src/main.rs:13:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 13 | use alloc::boxed::Box; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `spdmlib::common::SpdmConnectionState` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/requester/digest_req/src/main.rs:5:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 5 | use spdmlib::common::SpdmConnectionState; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `alloc::boxed::Box` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/requester/digest_req/src/main.rs:9:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 9 | use alloc::boxed::Box; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `core::ops::DerefMut` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/requester/digest_req/src/main.rs:11:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 11 | use core::ops::DerefMut; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `alloc::boxed::Box` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/requester/finish_req/src/main.rs:15:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 15 | use alloc::boxed::Box; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `core::ops::DerefMut` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/requester/finish_req/src/main.rs:17:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 17 | use core::ops::DerefMut; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `core::ops::DerefMut` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/responder/certificate_rsp/src/main.rs:15:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 15 | use core::ops::DerefMut; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: private item shadows public glob re-export Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../src/crypto/x509v3.rs:5:20 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 5 | use crate::error::{SpdmResult, SPDM_STATUS_VERIF_FAIL}; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": note: the name `SpdmResult` in the type namespace is supposed to be publicly re-exported here Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/fuzz_x509v3.rs:9:9 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 9 | pub use fuzzlib::*; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": note: but the private item here shadows it Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../src/crypto/x509v3.rs:5:20 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 5 | use crate::error::{SpdmResult, SPDM_STATUS_VERIF_FAIL}; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(hidden_glob_reexports)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `alloc::boxed::Box` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/requester/certificate_req/src/main.rs:10:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 10 | use alloc::boxed::Box; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `core::ops::DerefMut` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/requester/certificate_req/src/main.rs:12:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 12 | use core::ops::DerefMut; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `alloc::boxed::Box` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/responder/challenge_rsp/src/main.rs:10:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 10 | use alloc::boxed::Box; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `core::ops::DerefMut` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/responder/challenge_rsp/src/main.rs:12:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 12 | use core::ops::DerefMut; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: function `main` is never used Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/responder/finish_rsp/src/main.rs:372:4 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 372 | fn main() { Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(dead_code)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `alloc::boxed::Box` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/responder/psk_finish_rsp/src/main.rs:12:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 12 | use alloc::boxed::Box; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `alloc::boxed::Box` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/responder/heartbeat_rsp/src/main.rs:12:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 12 | use alloc::boxed::Box; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `alloc::boxed::Box` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/requester/encapsulated_request_req/src/main.rs:11:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 11 | use alloc::boxed::Box; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `core::ops::DerefMut` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/responder/psk_finish_rsp/src/main.rs:14:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 14 | use core::ops::DerefMut; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `core::ops::DerefMut` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/requester/encapsulated_request_req/src/main.rs:13:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 13 | use core::ops::DerefMut; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `core::ops::DerefMut` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/responder/heartbeat_rsp/src/main.rs:14:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 14 | use core::ops::DerefMut; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: function `main` is never used Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/responder/pskexchange_rsp/src/main.rs:197:4 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 197 | fn main() { Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(dead_code)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `spdmlib::common::SpdmConnectionState` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/requester/measurement_req/src/main.rs:10:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 10 | use spdmlib::common::SpdmConnectionState; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `alloc::boxed::Box` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/requester/measurement_req/src/main.rs:16:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 16 | use alloc::boxed::Box; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `core::borrow::BorrowMut` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/requester/measurement_req/src/main.rs:18:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 18 | use core::borrow::BorrowMut; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `core::ops::DerefMut` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/requester/measurement_req/src/main.rs:19:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 19 | use core::ops::DerefMut; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `alloc::boxed::Box` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/requester/heartbeat_req/src/main.rs:14:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 14 | use alloc::boxed::Box; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `core::ops::DerefMut` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/requester/heartbeat_req/src/main.rs:16:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 16 | use core::ops::DerefMut; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `alloc::boxed::Box` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/requester/end_session_req/src/main.rs:12:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 12 | use alloc::boxed::Box; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `core::ops::DerefMut` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/requester/end_session_req/src/main.rs:14:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 14 | use core::ops::DerefMut; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused variable: `status` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/responder/psk_finish_rsp/src/main.rs:64:14 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 64 |  let (status, send_buffer) = context.handle_spdm_psk_finish(4294836221, &data, &mut writer); Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^ help: if this is intentional, prefix it with an underscore: `_status` Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(unused_variables)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused variable: `send_buffer` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/responder/psk_finish_rsp/src/main.rs:64:22 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 64 |  let (status, send_buffer) = context.handle_spdm_psk_finish(4294836221, &data, &mut writer); Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_send_buffer` Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused variable: `status` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/responder/psk_finish_rsp/src/main.rs:158:14 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 158 |  let (status, send_buffer) = context.handle_spdm_psk_finish(4294836221, &data, &mut writer); Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^ help: if this is intentional, prefix it with an underscore: `_status` Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused variable: `send_buffer` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/responder/psk_finish_rsp/src/main.rs:158:22 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 158 |  let (status, send_buffer) = context.handle_spdm_psk_finish(4294836221, &data, &mut writer); Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_send_buffer` Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: `spdmlib-fuzz` (bin "get_encapsulated_request_rsp") generated 2 warnings (run `cargo fix --bin "get_encapsulated_request_rsp"` to apply 2 suggestions) Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `fuzzlib::config::MAX_SPDM_MSG_SIZE` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/responder/algorithm_rsp/src/main.rs:5:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 5 | use fuzzlib::config::MAX_SPDM_MSG_SIZE; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `alloc::boxed::Box` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/responder/algorithm_rsp/src/main.rs:10:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 10 | use alloc::boxed::Box; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `core::ops::DerefMut` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/responder/algorithm_rsp/src/main.rs:12:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 12 | use core::ops::DerefMut; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: `spdmlib-fuzz` (bin "keyexchange_rsp") generated 2 warnings (run `cargo fix --bin "keyexchange_rsp"` to apply 2 suggestions) Step #3 - "compile-libfuzzer-coverage-x86_64": warning: `spdmlib-fuzz` (bin "vendor_rsp") generated 2 warnings (run `cargo fix --bin "vendor_rsp"` to apply 2 suggestions) Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `spdmlib::common::SpdmConnectionState` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/requester/vendor_req/src/main.rs:6:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 6 | use spdmlib::common::SpdmConnectionState; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `alloc::boxed::Box` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/requester/vendor_req/src/main.rs:14:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 14 | use alloc::boxed::Box; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `core::ops::DerefMut` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/requester/vendor_req/src/main.rs:16:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 16 | use core::ops::DerefMut; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: `spdmlib-fuzz` (bin "encapsulated_request_digest_req") generated 2 warnings (run `cargo fix --bin "encapsulated_request_digest_req"` to apply 2 suggestions) Step #3 - "compile-libfuzzer-coverage-x86_64": warning: `spdmlib-fuzz` (bin "key_update_rsp") generated 2 warnings (run `cargo fix --bin "key_update_rsp"` to apply 2 suggestions) Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `alloc::boxed::Box` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/requester/challenge_req/src/main.rs:9:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 9 | use alloc::boxed::Box; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `core::ops::DerefMut` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/requester/challenge_req/src/main.rs:11:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 11 | use core::ops::DerefMut; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: `spdmlib-fuzz` (bin "algorithm_req") generated 9 warnings (run `cargo fix --bin "algorithm_req"` to apply 3 suggestions) Step #3 - "compile-libfuzzer-coverage-x86_64": warning: `spdmlib-fuzz` (bin "digest_rsp") generated 2 warnings (run `cargo fix --bin "digest_rsp"` to apply 2 suggestions) Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `alloc::boxed::Box` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/requester/encapsulated_request_certificate_req/src/main.rs:12:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 12 | use alloc::boxed::Box; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `core::ops::DerefMut` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/requester/encapsulated_request_certificate_req/src/main.rs:14:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 14 | use core::ops::DerefMut; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused imports: `FakeSpdmDeviceIo`, `SECRET_ASYM_IMPL_INSTANCE`, `spdmlib`, and `time::SPDM_TIME_IMPL` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/requester/version_req/src/main.rs:6:28 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 6 |  fake_device_io::{self, FakeSpdmDeviceIo}, Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": 7 |  req_create_info, spdmlib, Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": ... Step #3 - "compile-libfuzzer-coverage-x86_64": 10 |  time::SPDM_TIME_IMPL, Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": 11 |  Mutex, PciDoeTransportEncap, SharedBuffer, SECRET_ASYM_IMPL_INSTANCE, Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `alloc::boxed::Box` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/requester/version_req/src/main.rs:18:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 18 | use alloc::boxed::Box; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `core::ops::DerefMut` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/requester/version_req/src/main.rs:20:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 20 | use core::ops::DerefMut; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `alloc::boxed::Box` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/responder/deliver_encapsulated_response_certificate_rsp/src/main.rs:10:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 10 | use alloc::boxed::Box; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `core::ops::DerefMut` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/spdm-rs/spdmlib/fuzz/fuzz_targets/../../../fuzz-target/responder/deliver_encapsulated_response_certificate_rsp/src/main.rs:12:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 12 | use core::ops::DerefMut; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: `spdmlib-fuzz` (bin "pskexchange_rsp") generated 7 warnings (run `cargo fix --bin "pskexchange_rsp"` to apply 2 suggestions) Step #3 - "compile-libfuzzer-coverage-x86_64": warning: `spdmlib-fuzz` (bin "digest_req") generated 3 warnings (run `cargo fix --bin "digest_req"` to apply 3 suggestions) Step #3 - "compile-libfuzzer-coverage-x86_64": warning: `spdmlib-fuzz` (bin "deliver_encapsulated_response_digest_rsp") generated 2 warnings (run `cargo fix --bin "deliver_encapsulated_response_digest_rsp"` to apply 2 suggestions) Step #3 - "compile-libfuzzer-coverage-x86_64": warning: `spdmlib-fuzz` (bin "psk_finish_req") generated 2 warnings (run `cargo fix --bin "psk_finish_req"` to apply 2 suggestions) Step #3 - "compile-libfuzzer-coverage-x86_64": warning: `spdmlib-fuzz` (bin "certificate_rsp") generated 2 warnings (run `cargo fix --bin "certificate_rsp"` to apply 2 suggestions) Step #3 - "compile-libfuzzer-coverage-x86_64": warning: `spdmlib-fuzz` (bin "finish_rsp") generated 7 warnings (run `cargo fix --bin "finish_rsp"` to apply 2 suggestions) Step #3 - "compile-libfuzzer-coverage-x86_64": warning: `spdmlib-fuzz` (bin "deliver_encapsulated_response_rsp") generated 2 warnings (run `cargo fix --bin "deliver_encapsulated_response_rsp"` to apply 2 suggestions) Step #3 - "compile-libfuzzer-coverage-x86_64": warning: `spdmlib-fuzz` (bin "capability_rsp") generated 2 warnings (run `cargo fix --bin "capability_rsp"` to apply 2 suggestions) Step #3 - "compile-libfuzzer-coverage-x86_64": warning: `spdmlib-fuzz` (bin "end_session_rsp") generated 2 warnings (run `cargo fix --bin "end_session_rsp"` to apply 2 suggestions) Step #3 - "compile-libfuzzer-coverage-x86_64": warning: `spdmlib-fuzz` (bin "measurement_rsp") generated 2 warnings (run `cargo fix --bin "measurement_rsp"` to apply 2 suggestions) Step #3 - "compile-libfuzzer-coverage-x86_64": warning: `spdmlib-fuzz` (bin "heartbeat_req") generated 2 warnings (run `cargo fix --bin "heartbeat_req"` to apply 2 suggestions) Step #3 - "compile-libfuzzer-coverage-x86_64": warning: `spdmlib-fuzz` (bin "challenge_rsp") generated 2 warnings (run `cargo fix --bin "challenge_rsp"` to apply 2 suggestions) Step #3 - "compile-libfuzzer-coverage-x86_64": warning: `spdmlib-fuzz` (bin "key_exchange_req") generated 3 warnings (run `cargo fix --bin "key_exchange_req"` to apply 3 suggestions) Step #3 - "compile-libfuzzer-coverage-x86_64": warning: `spdmlib-fuzz` (bin "psk_finish_rsp") generated 6 warnings (run `cargo fix --bin "psk_finish_rsp"` to apply 2 suggestions) Step #3 - "compile-libfuzzer-coverage-x86_64": warning: `spdmlib-fuzz` (bin "certificate_req") generated 2 warnings (run `cargo fix --bin "certificate_req"` to apply 2 suggestions) Step #3 - "compile-libfuzzer-coverage-x86_64": warning: `spdmlib-fuzz` (bin "capability_req") generated 3 warnings (run `cargo fix --bin "capability_req"` to apply 3 suggestions) Step #3 - "compile-libfuzzer-coverage-x86_64": warning: `spdmlib-fuzz` (bin "key_update_req") generated 2 warnings (run `cargo fix --bin "key_update_req"` to apply 2 suggestions) Step #3 - "compile-libfuzzer-coverage-x86_64": warning: `spdmlib-fuzz` (bin "finish_req") generated 2 warnings (run `cargo fix --bin "finish_req"` to apply 2 suggestions) Step #3 - "compile-libfuzzer-coverage-x86_64": warning: `spdmlib-fuzz` (bin "heartbeat_rsp") generated 2 warnings (run `cargo fix --bin "heartbeat_rsp"` to apply 2 suggestions) Step #3 - "compile-libfuzzer-coverage-x86_64": warning: `spdmlib-fuzz` (bin "encapsulated_request_req") generated 2 warnings (run `cargo fix --bin "encapsulated_request_req"` to apply 2 suggestions) Step #3 - "compile-libfuzzer-coverage-x86_64": warning: `spdmlib-fuzz` (bin "measurement_req") generated 4 warnings (run `cargo fix --bin "measurement_req"` to apply 4 suggestions) Step #3 - "compile-libfuzzer-coverage-x86_64": warning: `spdmlib-fuzz` (bin "end_session_req") generated 2 warnings (run `cargo fix --bin "end_session_req"` to apply 2 suggestions) Step #3 - "compile-libfuzzer-coverage-x86_64": warning: `spdmlib-fuzz` (bin "psk_exchange_req") generated 3 warnings (run `cargo fix --bin "psk_exchange_req"` to apply 3 suggestions) Step #3 - "compile-libfuzzer-coverage-x86_64": warning: `spdmlib-fuzz` (bin "version_rsp") generated 1 warning (run `cargo fix --bin "version_rsp"` to apply 1 suggestion) Step #3 - "compile-libfuzzer-coverage-x86_64": warning: `spdmlib-fuzz` (bin "fuzz_x509v3") generated 1 warning Step #3 - "compile-libfuzzer-coverage-x86_64": warning: `spdmlib-fuzz` (bin "algorithm_rsp") generated 3 warnings (run `cargo fix --bin "algorithm_rsp"` to apply 3 suggestions) Step #3 - "compile-libfuzzer-coverage-x86_64": warning: `spdmlib-fuzz` (bin "encapsulated_request_certificate_req") generated 2 warnings (run `cargo fix --bin "encapsulated_request_certificate_req"` to apply 2 suggestions) Step #3 - "compile-libfuzzer-coverage-x86_64": warning: `spdmlib-fuzz` (bin "challenge_req") generated 2 warnings (run `cargo fix --bin "challenge_req"` to apply 2 suggestions) Step #3 - "compile-libfuzzer-coverage-x86_64": warning: `spdmlib-fuzz` (bin "vendor_req") generated 3 warnings (run `cargo fix --bin "vendor_req"` to apply 3 suggestions) Step #3 - "compile-libfuzzer-coverage-x86_64": warning: `spdmlib-fuzz` (bin "version_req") generated 3 warnings (run `cargo fix --bin "version_req"` to apply 3 suggestions) Step #3 - "compile-libfuzzer-coverage-x86_64": warning: `spdmlib-fuzz` (bin "deliver_encapsulated_response_certificate_rsp") generated 2 warnings (run `cargo fix --bin "deliver_encapsulated_response_certificate_rsp"` to apply 2 suggestions) Step #3 - "compile-libfuzzer-coverage-x86_64":  Finished `dev` profile [unoptimized + debuginfo] target(s) in 17.80s Step #3 - "compile-libfuzzer-coverage-x86_64": + for f in fuzz/fuzz_targets/*.rs Step #3 - "compile-libfuzzer-coverage-x86_64": ++ basename fuzz/fuzz_targets/algorithm_req Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_TARGET_NAME=algorithm_req Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/spdm-rs/target/x86_64-unknown-linux-gnu/release/algorithm_req /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + for f in fuzz/fuzz_targets/*.rs Step #3 - "compile-libfuzzer-coverage-x86_64": ++ basename fuzz/fuzz_targets/algorithm_rsp Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_TARGET_NAME=algorithm_rsp Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/spdm-rs/target/x86_64-unknown-linux-gnu/release/algorithm_rsp /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + for f in fuzz/fuzz_targets/*.rs Step #3 - "compile-libfuzzer-coverage-x86_64": ++ basename fuzz/fuzz_targets/capability_req Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_TARGET_NAME=capability_req Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/spdm-rs/target/x86_64-unknown-linux-gnu/release/capability_req /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + for f in fuzz/fuzz_targets/*.rs Step #3 - "compile-libfuzzer-coverage-x86_64": ++ basename fuzz/fuzz_targets/capability_rsp Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_TARGET_NAME=capability_rsp Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/spdm-rs/target/x86_64-unknown-linux-gnu/release/capability_rsp /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + for f in fuzz/fuzz_targets/*.rs Step #3 - "compile-libfuzzer-coverage-x86_64": ++ basename fuzz/fuzz_targets/certificate_req Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_TARGET_NAME=certificate_req Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/spdm-rs/target/x86_64-unknown-linux-gnu/release/certificate_req /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + for f in fuzz/fuzz_targets/*.rs Step #3 - "compile-libfuzzer-coverage-x86_64": ++ basename fuzz/fuzz_targets/certificate_rsp Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_TARGET_NAME=certificate_rsp Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/spdm-rs/target/x86_64-unknown-linux-gnu/release/certificate_rsp /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + for f in fuzz/fuzz_targets/*.rs Step #3 - "compile-libfuzzer-coverage-x86_64": ++ basename fuzz/fuzz_targets/challenge_req Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_TARGET_NAME=challenge_req Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/spdm-rs/target/x86_64-unknown-linux-gnu/release/challenge_req /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + for f in fuzz/fuzz_targets/*.rs Step #3 - "compile-libfuzzer-coverage-x86_64": ++ basename fuzz/fuzz_targets/challenge_rsp Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_TARGET_NAME=challenge_rsp Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/spdm-rs/target/x86_64-unknown-linux-gnu/release/challenge_rsp /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + for f in fuzz/fuzz_targets/*.rs Step #3 - "compile-libfuzzer-coverage-x86_64": ++ basename fuzz/fuzz_targets/deliver_encapsulated_response_certificate_rsp Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_TARGET_NAME=deliver_encapsulated_response_certificate_rsp Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/spdm-rs/target/x86_64-unknown-linux-gnu/release/deliver_encapsulated_response_certificate_rsp /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + for f in fuzz/fuzz_targets/*.rs Step #3 - "compile-libfuzzer-coverage-x86_64": ++ basename fuzz/fuzz_targets/deliver_encapsulated_response_digest_rsp Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_TARGET_NAME=deliver_encapsulated_response_digest_rsp Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/spdm-rs/target/x86_64-unknown-linux-gnu/release/deliver_encapsulated_response_digest_rsp /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + for f in fuzz/fuzz_targets/*.rs Step #3 - "compile-libfuzzer-coverage-x86_64": ++ basename fuzz/fuzz_targets/deliver_encapsulated_response_rsp Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_TARGET_NAME=deliver_encapsulated_response_rsp Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/spdm-rs/target/x86_64-unknown-linux-gnu/release/deliver_encapsulated_response_rsp /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + for f in fuzz/fuzz_targets/*.rs Step #3 - "compile-libfuzzer-coverage-x86_64": ++ basename fuzz/fuzz_targets/digest_req Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_TARGET_NAME=digest_req Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/spdm-rs/target/x86_64-unknown-linux-gnu/release/digest_req /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + for f in fuzz/fuzz_targets/*.rs Step #3 - "compile-libfuzzer-coverage-x86_64": ++ basename fuzz/fuzz_targets/digest_rsp Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_TARGET_NAME=digest_rsp Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/spdm-rs/target/x86_64-unknown-linux-gnu/release/digest_rsp /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + for f in fuzz/fuzz_targets/*.rs Step #3 - "compile-libfuzzer-coverage-x86_64": ++ basename fuzz/fuzz_targets/encapsulated_request_certificate_req Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_TARGET_NAME=encapsulated_request_certificate_req Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/spdm-rs/target/x86_64-unknown-linux-gnu/release/encapsulated_request_certificate_req /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + for f in fuzz/fuzz_targets/*.rs Step #3 - "compile-libfuzzer-coverage-x86_64": ++ basename fuzz/fuzz_targets/encapsulated_request_digest_req Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_TARGET_NAME=encapsulated_request_digest_req Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/spdm-rs/target/x86_64-unknown-linux-gnu/release/encapsulated_request_digest_req /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + for f in fuzz/fuzz_targets/*.rs Step #3 - "compile-libfuzzer-coverage-x86_64": ++ basename fuzz/fuzz_targets/encapsulated_request_req Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_TARGET_NAME=encapsulated_request_req Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/spdm-rs/target/x86_64-unknown-linux-gnu/release/encapsulated_request_req /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + for f in fuzz/fuzz_targets/*.rs Step #3 - "compile-libfuzzer-coverage-x86_64": ++ basename fuzz/fuzz_targets/end_session_req Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_TARGET_NAME=end_session_req Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/spdm-rs/target/x86_64-unknown-linux-gnu/release/end_session_req /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + for f in fuzz/fuzz_targets/*.rs Step #3 - "compile-libfuzzer-coverage-x86_64": ++ basename fuzz/fuzz_targets/end_session_rsp Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_TARGET_NAME=end_session_rsp Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/spdm-rs/target/x86_64-unknown-linux-gnu/release/end_session_rsp /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + for f in fuzz/fuzz_targets/*.rs Step #3 - "compile-libfuzzer-coverage-x86_64": ++ basename fuzz/fuzz_targets/finish_req Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_TARGET_NAME=finish_req Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/spdm-rs/target/x86_64-unknown-linux-gnu/release/finish_req /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + for f in fuzz/fuzz_targets/*.rs Step #3 - "compile-libfuzzer-coverage-x86_64": ++ basename fuzz/fuzz_targets/finish_rsp Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_TARGET_NAME=finish_rsp Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/spdm-rs/target/x86_64-unknown-linux-gnu/release/finish_rsp /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + for f in fuzz/fuzz_targets/*.rs Step #3 - "compile-libfuzzer-coverage-x86_64": ++ basename fuzz/fuzz_targets/fuzz_x509v3 Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_TARGET_NAME=fuzz_x509v3 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/spdm-rs/target/x86_64-unknown-linux-gnu/release/fuzz_x509v3 /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + for f in fuzz/fuzz_targets/*.rs Step #3 - "compile-libfuzzer-coverage-x86_64": ++ basename fuzz/fuzz_targets/get_encapsulated_request_rsp Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_TARGET_NAME=get_encapsulated_request_rsp Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/spdm-rs/target/x86_64-unknown-linux-gnu/release/get_encapsulated_request_rsp /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + for f in fuzz/fuzz_targets/*.rs Step #3 - "compile-libfuzzer-coverage-x86_64": ++ basename fuzz/fuzz_targets/heartbeat_req Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_TARGET_NAME=heartbeat_req Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/spdm-rs/target/x86_64-unknown-linux-gnu/release/heartbeat_req /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + for f in fuzz/fuzz_targets/*.rs Step #3 - "compile-libfuzzer-coverage-x86_64": ++ basename fuzz/fuzz_targets/heartbeat_rsp Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_TARGET_NAME=heartbeat_rsp Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/spdm-rs/target/x86_64-unknown-linux-gnu/release/heartbeat_rsp /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + for f in fuzz/fuzz_targets/*.rs Step #3 - "compile-libfuzzer-coverage-x86_64": ++ basename fuzz/fuzz_targets/key_exchange_req Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_TARGET_NAME=key_exchange_req Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/spdm-rs/target/x86_64-unknown-linux-gnu/release/key_exchange_req /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + for f in fuzz/fuzz_targets/*.rs Step #3 - "compile-libfuzzer-coverage-x86_64": ++ basename fuzz/fuzz_targets/key_update_req Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_TARGET_NAME=key_update_req Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/spdm-rs/target/x86_64-unknown-linux-gnu/release/key_update_req /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + for f in fuzz/fuzz_targets/*.rs Step #3 - "compile-libfuzzer-coverage-x86_64": ++ basename fuzz/fuzz_targets/key_update_rsp Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_TARGET_NAME=key_update_rsp Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/spdm-rs/target/x86_64-unknown-linux-gnu/release/key_update_rsp /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + for f in fuzz/fuzz_targets/*.rs Step #3 - "compile-libfuzzer-coverage-x86_64": ++ basename fuzz/fuzz_targets/keyexchange_rsp Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_TARGET_NAME=keyexchange_rsp Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/spdm-rs/target/x86_64-unknown-linux-gnu/release/keyexchange_rsp /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + for f in fuzz/fuzz_targets/*.rs Step #3 - "compile-libfuzzer-coverage-x86_64": ++ basename fuzz/fuzz_targets/measurement_req Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_TARGET_NAME=measurement_req Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/spdm-rs/target/x86_64-unknown-linux-gnu/release/measurement_req /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + for f in fuzz/fuzz_targets/*.rs Step #3 - "compile-libfuzzer-coverage-x86_64": ++ basename fuzz/fuzz_targets/measurement_rsp Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_TARGET_NAME=measurement_rsp Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/spdm-rs/target/x86_64-unknown-linux-gnu/release/measurement_rsp /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + for f in fuzz/fuzz_targets/*.rs Step #3 - "compile-libfuzzer-coverage-x86_64": ++ basename fuzz/fuzz_targets/psk_exchange_req Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_TARGET_NAME=psk_exchange_req Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/spdm-rs/target/x86_64-unknown-linux-gnu/release/psk_exchange_req /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + for f in fuzz/fuzz_targets/*.rs Step #3 - "compile-libfuzzer-coverage-x86_64": ++ basename fuzz/fuzz_targets/psk_finish_req Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_TARGET_NAME=psk_finish_req Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/spdm-rs/target/x86_64-unknown-linux-gnu/release/psk_finish_req /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + for f in fuzz/fuzz_targets/*.rs Step #3 - "compile-libfuzzer-coverage-x86_64": ++ basename fuzz/fuzz_targets/psk_finish_rsp Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_TARGET_NAME=psk_finish_rsp Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/spdm-rs/target/x86_64-unknown-linux-gnu/release/psk_finish_rsp /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + for f in fuzz/fuzz_targets/*.rs Step #3 - "compile-libfuzzer-coverage-x86_64": ++ basename fuzz/fuzz_targets/pskexchange_rsp Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_TARGET_NAME=pskexchange_rsp Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/spdm-rs/target/x86_64-unknown-linux-gnu/release/pskexchange_rsp /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + for f in fuzz/fuzz_targets/*.rs Step #3 - "compile-libfuzzer-coverage-x86_64": ++ basename fuzz/fuzz_targets/vendor_req Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_TARGET_NAME=vendor_req Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/spdm-rs/target/x86_64-unknown-linux-gnu/release/vendor_req /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + for f in fuzz/fuzz_targets/*.rs Step #3 - "compile-libfuzzer-coverage-x86_64": ++ basename fuzz/fuzz_targets/vendor_rsp Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_TARGET_NAME=vendor_rsp Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/spdm-rs/target/x86_64-unknown-linux-gnu/release/vendor_rsp /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + for f in fuzz/fuzz_targets/*.rs Step #3 - "compile-libfuzzer-coverage-x86_64": ++ basename fuzz/fuzz_targets/version_req Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_TARGET_NAME=version_req Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/spdm-rs/target/x86_64-unknown-linux-gnu/release/version_req /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + for f in fuzz/fuzz_targets/*.rs Step #3 - "compile-libfuzzer-coverage-x86_64": ++ basename fuzz/fuzz_targets/version_rsp Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_TARGET_NAME=version_rsp Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/spdm-rs/target/x86_64-unknown-linux-gnu/release/version_rsp /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + popd Step #3 - "compile-libfuzzer-coverage-x86_64": /src/spdm-rs /src/spdm-rs Step #3 - "compile-libfuzzer-coverage-x86_64": + popd Step #3 - "compile-libfuzzer-coverage-x86_64": /src/spdm-rs Finished Step #3 - "compile-libfuzzer-coverage-x86_64" Starting Step #4 Step #4: Pulling image: gcr.io/oss-fuzz-base/base-runner Step #4: Using default tag: latest Step #4: latest: Pulling from oss-fuzz-base/base-runner Step #4: b549f31133a9: Already exists Step #4: 3d710c687d00: Already exists Step #4: 5871c999bb7f: Already exists Step #4: ad204a766461: Pulling fs layer Step #4: aa4d922892b9: Pulling fs layer Step #4: c20c0e93a575: Pulling fs layer Step #4: c3498e8f92bf: Pulling fs layer Step #4: ea12bf4d758c: Pulling fs layer Step #4: 1c528096599d: Pulling fs layer Step #4: 22eae4685097: Pulling fs layer Step #4: 0b0b70aeae3e: Pulling fs layer Step #4: a11f70ce01e7: Pulling fs layer Step #4: 7864dd364e73: Pulling fs layer Step #4: 677db1e5ca03: Pulling fs layer Step #4: a5be37c75947: Pulling fs layer Step #4: c074acbeeb6b: Pulling fs layer Step #4: 815b2ed18259: Pulling fs layer Step #4: 4065e4da32a0: Pulling fs layer Step #4: a5114ccc782f: Pulling fs layer Step #4: 2e062109d3b1: Pulling fs layer Step #4: a5be37c75947: Waiting Step #4: ea12bf4d758c: Waiting Step #4: 1c528096599d: Waiting Step #4: c074acbeeb6b: Waiting Step #4: a5114ccc782f: Waiting Step #4: 2e062109d3b1: Waiting Step #4: 815b2ed18259: Waiting Step #4: 4065e4da32a0: Waiting Step #4: 22eae4685097: Waiting Step #4: 0b0b70aeae3e: Waiting Step #4: c3498e8f92bf: Waiting Step #4: a11f70ce01e7: Waiting Step #4: 7864dd364e73: Waiting Step #4: 677db1e5ca03: Waiting Step #4: ad204a766461: Verifying Checksum Step #4: ad204a766461: Download complete Step #4: c20c0e93a575: Verifying Checksum Step #4: c20c0e93a575: Download complete Step #4: aa4d922892b9: Verifying Checksum Step #4: aa4d922892b9: Download complete Step #4: ad204a766461: Pull complete Step #4: ea12bf4d758c: Verifying Checksum Step #4: ea12bf4d758c: Download complete Step #4: 1c528096599d: Verifying Checksum Step #4: 1c528096599d: Download complete Step #4: 22eae4685097: Download complete Step #4: aa4d922892b9: Pull complete Step #4: c20c0e93a575: Pull complete Step #4: a11f70ce01e7: Verifying Checksum Step #4: a11f70ce01e7: Download complete Step #4: 0b0b70aeae3e: Verifying Checksum Step #4: 0b0b70aeae3e: Download complete Step #4: c3498e8f92bf: Verifying Checksum Step #4: c3498e8f92bf: Download complete Step #4: 677db1e5ca03: Verifying Checksum Step #4: 677db1e5ca03: Download complete Step #4: a5be37c75947: Verifying Checksum Step #4: a5be37c75947: Download complete Step #4: c074acbeeb6b: Verifying Checksum Step #4: c074acbeeb6b: Download complete Step #4: 4065e4da32a0: Verifying Checksum Step #4: 4065e4da32a0: Download complete Step #4: 815b2ed18259: Verifying Checksum Step #4: 815b2ed18259: Download complete Step #4: a5114ccc782f: Download complete Step #4: 2e062109d3b1: Verifying Checksum Step #4: 2e062109d3b1: Download complete Step #4: 7864dd364e73: Verifying Checksum Step #4: 7864dd364e73: Download complete Step #4: c3498e8f92bf: Pull complete Step #4: ea12bf4d758c: Pull complete Step #4: 1c528096599d: Pull complete Step #4: 22eae4685097: Pull complete Step #4: 0b0b70aeae3e: Pull complete Step #4: a11f70ce01e7: Pull complete Step #4: 7864dd364e73: Pull complete Step #4: 677db1e5ca03: Pull complete Step #4: a5be37c75947: Pull complete Step #4: c074acbeeb6b: Pull complete Step #4: 815b2ed18259: Pull complete Step #4: 4065e4da32a0: Pull complete Step #4: a5114ccc782f: Pull complete Step #4: 2e062109d3b1: Pull complete Step #4: Digest: sha256:76043b923f3c4981587d31e2bac9d2d15c5e61786163ddce20c96e78a301caa7 Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4: gcr.io/oss-fuzz-base/base-runner:latest Finished Step #4 Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Step #5: [/corpus/algorithm_req.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/algorithm_req.zip or Step #5: /corpus/algorithm_req.zip.zip, and cannot find /corpus/algorithm_req.zip.ZIP, period. Step #5: Failed to unpack the corpus for algorithm_req. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/algorithm_rsp.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/algorithm_rsp.zip or Step #5: /corpus/algorithm_rsp.zip.zip, and cannot find /corpus/algorithm_rsp.zip.ZIP, period. Step #5: Failed to unpack the corpus for algorithm_rsp. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/capability_req.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/capability_req.zip or Step #5: /corpus/capability_req.zip.zip, and cannot find /corpus/capability_req.zip.ZIP, period. Step #5: Failed to unpack the corpus for capability_req. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/capability_rsp.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/capability_rsp.zip or Step #5: /corpus/capability_rsp.zip.zip, and cannot find /corpus/capability_rsp.zip.ZIP, period. Step #5: Failed to unpack the corpus for capability_rsp. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/certificate_req.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/certificate_req.zip or Step #5: /corpus/certificate_req.zip.zip, and cannot find /corpus/certificate_req.zip.ZIP, period. Step #5: Failed to unpack the corpus for certificate_req. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/certificate_rsp.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/certificate_rsp.zip or Step #5: /corpus/certificate_rsp.zip.zip, and cannot find /corpus/certificate_rsp.zip.ZIP, period. Step #5: Failed to unpack the corpus for certificate_rsp. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/challenge_req.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/challenge_req.zip or Step #5: /corpus/challenge_req.zip.zip, and cannot find /corpus/challenge_req.zip.ZIP, period. Step #5: Failed to unpack the corpus for challenge_req. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/challenge_rsp.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/challenge_rsp.zip or Step #5: /corpus/challenge_rsp.zip.zip, and cannot find /corpus/challenge_rsp.zip.ZIP, period. Step #5: Failed to unpack the corpus for challenge_rsp. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/deliver_encapsulated_response_certificate_rsp.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/deliver_encapsulated_response_certificate_rsp.zip or Step #5: /corpus/deliver_encapsulated_response_certificate_rsp.zip.zip, and cannot find /corpus/deliver_encapsulated_response_certificate_rsp.zip.ZIP, period. Step #5: Failed to unpack the corpus for deliver_encapsulated_response_certificate_rsp. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/deliver_encapsulated_response_digest_rsp.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/deliver_encapsulated_response_digest_rsp.zip or Step #5: /corpus/deliver_encapsulated_response_digest_rsp.zip.zip, and cannot find /corpus/deliver_encapsulated_response_digest_rsp.zip.ZIP, period. Step #5: Failed to unpack the corpus for deliver_encapsulated_response_digest_rsp. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/deliver_encapsulated_response_rsp.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/deliver_encapsulated_response_rsp.zip or Step #5: /corpus/deliver_encapsulated_response_rsp.zip.zip, and cannot find /corpus/deliver_encapsulated_response_rsp.zip.ZIP, period. Step #5: Failed to unpack the corpus for deliver_encapsulated_response_rsp. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/digest_req.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/digest_req.zip or Step #5: /corpus/digest_req.zip.zip, and cannot find /corpus/digest_req.zip.ZIP, period. Step #5: Failed to unpack the corpus for digest_req. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/digest_rsp.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/digest_rsp.zip or Step #5: /corpus/digest_rsp.zip.zip, and cannot find /corpus/digest_rsp.zip.ZIP, period. Step #5: Failed to unpack the corpus for digest_rsp. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/encapsulated_request_certificate_req.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/encapsulated_request_certificate_req.zip or Step #5: /corpus/encapsulated_request_certificate_req.zip.zip, and cannot find /corpus/encapsulated_request_certificate_req.zip.ZIP, period. Step #5: Failed to unpack the corpus for encapsulated_request_certificate_req. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/encapsulated_request_digest_req.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/encapsulated_request_digest_req.zip or Step #5: /corpus/encapsulated_request_digest_req.zip.zip, and cannot find /corpus/encapsulated_request_digest_req.zip.ZIP, period. Step #5: Failed to unpack the corpus for encapsulated_request_digest_req. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/encapsulated_request_req.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/encapsulated_request_req.zip or Step #5: /corpus/encapsulated_request_req.zip.zip, and cannot find /corpus/encapsulated_request_req.zip.ZIP, period. Step #5: Failed to unpack the corpus for encapsulated_request_req. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/end_session_req.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/end_session_req.zip or Step #5: /corpus/end_session_req.zip.zip, and cannot find /corpus/end_session_req.zip.ZIP, period. Step #5: Failed to unpack the corpus for end_session_req. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/end_session_rsp.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/end_session_rsp.zip or Step #5: /corpus/end_session_rsp.zip.zip, and cannot find /corpus/end_session_rsp.zip.ZIP, period. Step #5: Failed to unpack the corpus for end_session_rsp. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/finish_req.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/finish_req.zip or Step #5: /corpus/finish_req.zip.zip, and cannot find /corpus/finish_req.zip.ZIP, period. Step #5: Failed to unpack the corpus for finish_req. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/finish_rsp.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/finish_rsp.zip or Step #5: /corpus/finish_rsp.zip.zip, and cannot find /corpus/finish_rsp.zip.ZIP, period. Step #5: Failed to unpack the corpus for finish_rsp. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/fuzz_x509v3.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_x509v3.zip or Step #5: /corpus/fuzz_x509v3.zip.zip, and cannot find /corpus/fuzz_x509v3.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_x509v3. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/get_encapsulated_request_rsp.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/get_encapsulated_request_rsp.zip or Step #5: /corpus/get_encapsulated_request_rsp.zip.zip, and cannot find /corpus/get_encapsulated_request_rsp.zip.ZIP, period. Step #5: Failed to unpack the corpus for get_encapsulated_request_rsp. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/heartbeat_req.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/heartbeat_req.zip or Step #5: /corpus/heartbeat_req.zip.zip, and cannot find /corpus/heartbeat_req.zip.ZIP, period. Step #5: Failed to unpack the corpus for heartbeat_req. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/heartbeat_rsp.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/heartbeat_rsp.zip or Step #5: /corpus/heartbeat_rsp.zip.zip, and cannot find /corpus/heartbeat_rsp.zip.ZIP, period. Step #5: Failed to unpack the corpus for heartbeat_rsp. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/key_exchange_req.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/key_exchange_req.zip or Step #5: /corpus/key_exchange_req.zip.zip, and cannot find /corpus/key_exchange_req.zip.ZIP, period. Step #5: Failed to unpack the corpus for key_exchange_req. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/key_update_req.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/key_update_req.zip or Step #5: /corpus/key_update_req.zip.zip, and cannot find /corpus/key_update_req.zip.ZIP, period. Step #5: Failed to unpack the corpus for key_update_req. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/key_update_rsp.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/key_update_rsp.zip or Step #5: /corpus/key_update_rsp.zip.zip, and cannot find /corpus/key_update_rsp.zip.ZIP, period. Step #5: Failed to unpack the corpus for key_update_rsp. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/keyexchange_rsp.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/keyexchange_rsp.zip or Step #5: /corpus/keyexchange_rsp.zip.zip, and cannot find /corpus/keyexchange_rsp.zip.ZIP, period. Step #5: Failed to unpack the corpus for keyexchange_rsp. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/measurement_req.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/measurement_req.zip or Step #5: /corpus/measurement_req.zip.zip, and cannot find /corpus/measurement_req.zip.ZIP, period. Step #5: Failed to unpack the corpus for measurement_req. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/measurement_rsp.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/measurement_rsp.zip or Step #5: /corpus/measurement_rsp.zip.zip, and cannot find /corpus/measurement_rsp.zip.ZIP, period. Step #5: Failed to unpack the corpus for measurement_rsp. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/psk_exchange_req.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/psk_exchange_req.zip or Step #5: /corpus/psk_exchange_req.zip.zip, and cannot find /corpus/psk_exchange_req.zip.ZIP, period. Step #5: Failed to unpack the corpus for psk_exchange_req. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/psk_finish_req.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/psk_finish_req.zip or Step #5: /corpus/psk_finish_req.zip.zip, and cannot find /corpus/psk_finish_req.zip.ZIP, period. Step #5: Failed to unpack the corpus for psk_finish_req. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/psk_finish_rsp.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/psk_finish_rsp.zip or Step #5: /corpus/psk_finish_rsp.zip.zip, and cannot find /corpus/psk_finish_rsp.zip.ZIP, period. Step #5: Failed to unpack the corpus for psk_finish_rsp. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/pskexchange_rsp.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/pskexchange_rsp.zip or Step #5: /corpus/pskexchange_rsp.zip.zip, and cannot find /corpus/pskexchange_rsp.zip.ZIP, period. Step #5: Failed to unpack the corpus for pskexchange_rsp. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/vendor_req.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/vendor_req.zip or Step #5: /corpus/vendor_req.zip.zip, and cannot find /corpus/vendor_req.zip.ZIP, period. Step #5: Failed to unpack the corpus for vendor_req. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/vendor_rsp.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/vendor_rsp.zip or Step #5: /corpus/vendor_rsp.zip.zip, and cannot find /corpus/vendor_rsp.zip.ZIP, period. Step #5: Failed to unpack the corpus for vendor_rsp. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/version_req.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/version_req.zip or Step #5: /corpus/version_req.zip.zip, and cannot find /corpus/version_req.zip.ZIP, period. Step #5: Failed to unpack the corpus for version_req. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/version_rsp.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/version_rsp.zip or Step #5: /corpus/version_rsp.zip.zip, and cannot find /corpus/version_rsp.zip.ZIP, period. Step #5: Failed to unpack the corpus for version_rsp. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: ******************************************************************************** Step #5: Code coverage report generation failed. Step #5: To reproduce, run: Step #5: python infra/helper.py build_image spdm-rs Step #5: python infra/helper.py build_fuzzers --sanitizer coverage spdm-rs Step #5: python infra/helper.py coverage spdm-rs Step #5: ******************************************************************************** Finished Step #5 ERROR ERROR: build step 5 "gcr.io/oss-fuzz-base/base-runner" failed: step exited with non-zero status: 1