c9cdae001 fix(toxav): remove extra copy of video frame on encode 4f6d4546b test: Improve the fake network library. a2581e700 refactor(toxcore): generate `Friend_Request` and `Dht_Nodes_Response` 2aaa11770 refactor(toxcore): use Tox_Memory in generated events 5c367452b test(toxcore): fix incorrect mutex in tox_scenario_get_time 8f92e710f perf: Add a timed limit of number of cookie requests. 695b6417a test: Add some more simulated network support. 815ae9ce9 test(toxcore): fix thread-safety in scenario framework 6d85c754e test(toxcore): add unit tests for net_crypto 9c22e79cc test(support): add SimulatedEnvironment for deterministic testing f34fcb195 chore: Update windows Dockerfile to debian stable (trixie). ece0e8980 fix(group_moderation): allow validating unsorted sanction list signatures a4fa754d7 refactor: rename struct Packet to struct Net_Packet d6f330f85 cleanup: Fix some warnings from coverity. e206bffa2 fix(group_chats): fix sync packets reverting topics 0e4715598 test: Add new scenario testing framework. 668291f44 refactor(toxcore): decouple Network_Funcs from sockaddr via IP_Port fc4396cef fix: potential division by zero in toxav and unsafe hex parsing 8e8b352ab refactor: Add nullable annotations to struct members. 7740bb421 refactor: decouple net_crypto from DHT 1936d4296 test: add benchmark for toxav audio and video 46bfdc2df fix: correct printf format specifiers for unsigned integers REVERT: 1828c5356 fix(toxav): remove extra copy of video frame on encode git-subtree-dir: external/toxcore/c-toxcore git-subtree-split: c9cdae001341e701fca980c9bb9febfeb95d2902
103 lines
4.1 KiB
C++
103 lines
4.1 KiB
C++
#include "tox_events.h"
|
|
|
|
#include <cassert>
|
|
#include <cstdint>
|
|
#include <cstring>
|
|
#include <vector>
|
|
|
|
#include "../testing/support/public/fuzz_data.hh"
|
|
#include "../testing/support/public/fuzz_helpers.hh"
|
|
#include "../testing/support/public/simulated_environment.hh"
|
|
#include "tox_dispatch.h"
|
|
|
|
namespace {
|
|
|
|
using tox::test::configure_fuzz_memory_source;
|
|
using tox::test::Fuzz_Data;
|
|
using tox::test::SimulatedEnvironment;
|
|
|
|
void TestUnpack(Fuzz_Data data)
|
|
{
|
|
// 2 bytes: size of the events data
|
|
CONSUME_OR_RETURN(const uint8_t *events_size_bytes, data, sizeof(uint16_t));
|
|
uint16_t events_size;
|
|
std::memcpy(&events_size, events_size_bytes, sizeof(uint16_t));
|
|
|
|
// events_size bytes: events data (max 64K)
|
|
CONSUME_OR_RETURN(const uint8_t *events_data, data, events_size);
|
|
|
|
if (data.empty()) {
|
|
// If there's no more input, no malloc failure paths can possibly be
|
|
// tested, so we ignore this input.
|
|
return;
|
|
}
|
|
|
|
// rest of the fuzz data is input for malloc
|
|
SimulatedEnvironment env;
|
|
auto node = env.create_node(33445);
|
|
configure_fuzz_memory_source(env.fake_memory(), data);
|
|
|
|
Tox_Dispatch *dispatch = tox_dispatch_new(nullptr);
|
|
assert(dispatch != nullptr);
|
|
|
|
auto ignore = [](auto *event, void *user_data) {};
|
|
tox_events_callback_conference_connected(dispatch, ignore);
|
|
tox_events_callback_conference_invite(dispatch, ignore);
|
|
tox_events_callback_conference_message(dispatch, ignore);
|
|
tox_events_callback_conference_peer_list_changed(dispatch, ignore);
|
|
tox_events_callback_conference_peer_name(dispatch, ignore);
|
|
tox_events_callback_conference_title(dispatch, ignore);
|
|
tox_events_callback_file_chunk_request(dispatch, ignore);
|
|
tox_events_callback_file_recv(dispatch, ignore);
|
|
tox_events_callback_file_recv_chunk(dispatch, ignore);
|
|
tox_events_callback_file_recv_control(dispatch, ignore);
|
|
tox_events_callback_friend_connection_status(dispatch, ignore);
|
|
tox_events_callback_friend_lossless_packet(dispatch, ignore);
|
|
tox_events_callback_friend_lossy_packet(dispatch, ignore);
|
|
tox_events_callback_friend_message(dispatch, ignore);
|
|
tox_events_callback_friend_name(dispatch, ignore);
|
|
tox_events_callback_friend_read_receipt(dispatch, ignore);
|
|
tox_events_callback_friend_request(dispatch, ignore);
|
|
tox_events_callback_friend_status(dispatch, ignore);
|
|
tox_events_callback_friend_status_message(dispatch, ignore);
|
|
tox_events_callback_friend_typing(dispatch, ignore);
|
|
tox_events_callback_self_connection_status(dispatch, ignore);
|
|
tox_events_callback_group_peer_name(dispatch, ignore);
|
|
tox_events_callback_group_peer_status(dispatch, ignore);
|
|
tox_events_callback_group_topic(dispatch, ignore);
|
|
tox_events_callback_group_privacy_state(dispatch, ignore);
|
|
tox_events_callback_group_voice_state(dispatch, ignore);
|
|
tox_events_callback_group_topic_lock(dispatch, ignore);
|
|
tox_events_callback_group_peer_limit(dispatch, ignore);
|
|
tox_events_callback_group_password(dispatch, ignore);
|
|
tox_events_callback_group_message(dispatch, ignore);
|
|
tox_events_callback_group_private_message(dispatch, ignore);
|
|
tox_events_callback_group_custom_packet(dispatch, ignore);
|
|
tox_events_callback_group_custom_private_packet(dispatch, ignore);
|
|
tox_events_callback_group_invite(dispatch, ignore);
|
|
tox_events_callback_group_peer_join(dispatch, ignore);
|
|
tox_events_callback_group_peer_exit(dispatch, ignore);
|
|
tox_events_callback_group_self_join(dispatch, ignore);
|
|
tox_events_callback_group_join_fail(dispatch, ignore);
|
|
tox_events_callback_group_moderation(dispatch, ignore);
|
|
|
|
Tox_Events *events = tox_events_load(&node->system, events_data, events_size);
|
|
if (events) {
|
|
std::vector<uint8_t> packed(tox_events_bytes_size(events));
|
|
tox_events_get_bytes(events, packed.data());
|
|
|
|
tox_dispatch_invoke(dispatch, events, nullptr);
|
|
}
|
|
tox_events_free(events);
|
|
tox_dispatch_free(dispatch);
|
|
}
|
|
|
|
} // namespace
|
|
|
|
extern "C" int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size);
|
|
extern "C" int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size)
|
|
{
|
|
TestUnpack(Fuzz_Data(data, size));
|
|
return 0;
|
|
}
|