           SPELL=zzuf
         VERSION=0.13
          SOURCE=$SPELL-$VERSION.tar.gz
   SOURCE_URL[0]=http://caca.zoy.org/files/zzuf/$SOURCE
     SOURCE_HASH=sha512:e8208dae68b4eee5ebc96775476f616c6822bc9a6a9c753d7f477e9f3e6f527a03e1aec494c2cb8a6666f3159104ea2e221acf8da35efb7d8e357666dbc315ce
SOURCE_DIRECTORY="$BUILD_DIRECTORY/$SPELL-$VERSION"
        WEB_SITE=http://sam.zoy.org/zzuf/
         ENTERED=20070730
      LICENSE[0]=GPL
        KEYWORDS="security"
           SHORT="A transparent application input fuzzer."
cat << EOF
zzuf is a transparent application input fuzzer. Its purpose is to find
bugs in applications by corrupting their user-contributed data (which
more than often comes from untrusted sources on the Internet). It works
by intercepting file and network operations and changing random bits in
the program’s input. zzuf’s behaviour is deterministic, making it
easier to reproduce bugs.
EOF
