3b6bb15e86
d9b8fa6098d fix: Fake broadcast address for 127.x.x.x aa649165a57 chore: Add code for future netprof TCP testing 9e5693de5ac chore: add to_string functions for netprof enums 52d915e6a90 cleanup: Heap allocate network profile objects 80fabd4a729 feat: Implement Tox network profiler 05abe083cb6 cleanup: Some random cleanups, mostly related to mem. 5cca24513b8 cleanup: Check that onion IP/Port packing worked. e092ecd1244 cleanup: Use tox memory allocator in some more places. 3cfe41c7587 fix: Avoid `memcpy`-ing structs into onion ping id data. e32ac001938 fix: Add more information on why the frame was not sent. ab887003687 fix: Allow TCP connections to fail `connect` calls. 7603170e663 refactor: Use tox memory in group connection allocations. 5bd8a85eb89 cleanup: Align internal logger with external on type of source line. e9bf524d9e1 cleanup: Add missing `#include` to sort_test.cc. d10c966b998 feat: Add `to_string` functions for toxencryptsave errors. 7bfd0dc8003 docs: Update the docs for group join functions 380dde9f2ae test: Add more logging to TCP connection constructor. 0f12f384c8c cleanup: Reduce stack frame sizes to below 4096 bytes. bc43cec0626 chore: Happy new year! fbe78f1702e cleanup: Add a `TOX_HIDE_DEPRECATED` check to hide deprecated symbols. 44d9da07e77 refactor: Use tox memory for group moderation/pack allocations. 7f26d520168 refactor: Use tox memory in group chats allocations. 2f62f3d0e77 refactor: Use tox Memory for group allocations. 8a968162041 chore: Add dispatch/events headers to bazel export. 2bbfb35abf6 docs: Output the error code string instead of int. in toxav logging d55d0e4eaef cleanup: Remove redundant code for checking if group exists 2a6dc643338 chore: Upgrade dependencies for websockify. fc0650601c1 fix: Allow peers to reconnect to group chats using a password git-subtree-dir: external/toxcore/c-toxcore git-subtree-split: d9b8fa6098de6c074038b6664d2572627540b148
117 lines
4.1 KiB
C++
117 lines
4.1 KiB
C++
#include "group_announce.h"
|
|
|
|
#include <cassert>
|
|
#include <functional>
|
|
#include <memory>
|
|
#include <vector>
|
|
|
|
#include "../testing/fuzzing/fuzz_support.hh"
|
|
#include "mem_test_util.hh"
|
|
|
|
namespace {
|
|
|
|
void TestUnpackAnnouncesList(Fuzz_Data &input)
|
|
{
|
|
CONSUME1_OR_RETURN(const uint8_t, max_count, input);
|
|
// Always allocate at least something to avoid passing nullptr to functions below.
|
|
std::vector<GC_Announce> announces(max_count + 1);
|
|
|
|
// TODO(iphydf): How do we know the packed size?
|
|
CONSUME1_OR_RETURN(const uint16_t, packed_size, input);
|
|
|
|
Test_Memory mem;
|
|
Logger *logger = logger_new(mem);
|
|
if (gca_unpack_announces_list(logger, input.data(), input.size(), announces.data(), max_count)
|
|
!= -1) {
|
|
// Always allocate at least something to avoid passing nullptr to functions below.
|
|
std::vector<uint8_t> packed(packed_size + 1);
|
|
size_t processed;
|
|
gca_pack_announces_list(
|
|
logger, packed.data(), packed_size, announces.data(), max_count, &processed);
|
|
}
|
|
logger_kill(logger);
|
|
}
|
|
|
|
void TestUnpackPublicAnnounce(Fuzz_Data &input)
|
|
{
|
|
GC_Public_Announce public_announce;
|
|
|
|
// TODO(iphydf): How do we know the packed size?
|
|
CONSUME1_OR_RETURN(const uint16_t, packed_size, input);
|
|
|
|
Test_Memory mem;
|
|
Logger *logger = logger_new(mem);
|
|
if (gca_unpack_public_announce(logger, input.data(), input.size(), &public_announce) != -1) {
|
|
// Always allocate at least something to avoid passing nullptr to functions below.
|
|
std::vector<uint8_t> packed(packed_size + 1);
|
|
gca_pack_public_announce(logger, packed.data(), packed_size, &public_announce);
|
|
}
|
|
logger_kill(logger);
|
|
}
|
|
|
|
void TestDoGca(Fuzz_Data &input)
|
|
{
|
|
Test_Memory mem;
|
|
std::unique_ptr<Logger, void (*)(Logger *)> logger(logger_new(mem), logger_kill);
|
|
|
|
uint64_t clock = 1;
|
|
std::unique_ptr<Mono_Time, std::function<void(Mono_Time *)>> mono_time(
|
|
mono_time_new(
|
|
mem, [](void *user_data) { return *static_cast<uint64_t *>(user_data); }, &clock),
|
|
[mem](Mono_Time *ptr) { mono_time_free(mem, ptr); });
|
|
assert(mono_time != nullptr);
|
|
std::unique_ptr<GC_Announces_List, void (*)(GC_Announces_List *)> gca(
|
|
new_gca_list(mem), kill_gca);
|
|
assert(gca != nullptr);
|
|
|
|
while (!input.empty()) {
|
|
CONSUME1_OR_RETURN(const uint8_t, choice, input);
|
|
switch (choice) {
|
|
case 0: {
|
|
// Add an announce.
|
|
CONSUME1_OR_RETURN(const uint16_t, length, input);
|
|
CONSUME_OR_RETURN(const uint8_t *data, input, length);
|
|
GC_Public_Announce public_announce;
|
|
if (gca_unpack_public_announce(logger.get(), data, length, &public_announce) != -1) {
|
|
gca_add_announce(mem, mono_time.get(), gca.get(), &public_announce);
|
|
}
|
|
break;
|
|
}
|
|
case 1: {
|
|
// Advance the time by a number of tox_iteration_intervals.
|
|
CONSUME1_OR_RETURN(const uint8_t, iterations, input);
|
|
clock += iterations * 20;
|
|
// Do an iteration.
|
|
do_gca(mono_time.get(), gca.get());
|
|
break;
|
|
}
|
|
case 2: {
|
|
// Get announces.
|
|
CONSUME1_OR_RETURN(const uint8_t, max_nodes, input);
|
|
// Always allocate at least something to avoid passing nullptr to functions below.
|
|
std::vector<GC_Announce> gc_announces(max_nodes + 1);
|
|
CONSUME_OR_RETURN(const uint8_t *chat_id, input, CHAT_ID_SIZE);
|
|
CONSUME_OR_RETURN(const uint8_t *except_public_key, input, ENC_PUBLIC_KEY_SIZE);
|
|
gca_get_announces(
|
|
gca.get(), gc_announces.data(), max_nodes, chat_id, except_public_key);
|
|
break;
|
|
}
|
|
case 3: {
|
|
// Remove a chat.
|
|
CONSUME_OR_RETURN(const uint8_t *chat_id, input, CHAT_ID_SIZE);
|
|
cleanup_gca(gca.get(), chat_id);
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
} // namespace
|
|
|
|
extern "C" int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size);
|
|
extern "C" int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size)
|
|
{
|
|
fuzz_select_target<TestUnpackAnnouncesList, TestUnpackPublicAnnounce, TestDoGca>(data, size);
|
|
return 0;
|
|
}
|