Green Sky
b1fe064484
73d9b845a3 cleanup: Remove old type-ordered event getters. b0840cc02d feat: add ngc events 7df9a51349 refactor: Make event dispatch ordered by receive time. bcb6592af5 test: Add C++ classes wrapping system interfaces. 4cea4f9ca4 fix: Make all the fuzzers work again, and add a test for protodump. c4e209ea1d refactor: Factor out malloc+memcpy into memdup. 87bcc4322d fix: Remove fatal error for non-erroneous case REVERT: 6d634674a9 cleanup: Remove old type-ordered event getters. REVERT: d1d48d1dfc feat: add ngc events REVERT: 994ffecc6b refactor: Make event dispatch ordered by receive time. git-subtree-dir: external/toxcore/c-toxcore git-subtree-split: 73d9b845a310c3f56d2d6d77ed56b93d84256d6e
65 lines
2.2 KiB
C++
65 lines
2.2 KiB
C++
#include "DHT.h"
|
|
|
|
#include <cassert>
|
|
#include <cstdlib>
|
|
#include <cstring>
|
|
#include <vector>
|
|
|
|
#include "../testing/fuzzing/fuzz_support.h"
|
|
|
|
namespace {
|
|
|
|
void TestHandleRequest(Fuzz_Data &input)
|
|
{
|
|
CONSUME_OR_RETURN(const uint8_t *self_public_key, input, CRYPTO_PUBLIC_KEY_SIZE);
|
|
CONSUME_OR_RETURN(const uint8_t *self_secret_key, input, CRYPTO_SECRET_KEY_SIZE);
|
|
|
|
uint8_t public_key[CRYPTO_PUBLIC_KEY_SIZE];
|
|
uint8_t request[MAX_CRYPTO_REQUEST_SIZE];
|
|
uint8_t request_id;
|
|
handle_request(self_public_key, self_secret_key, public_key, request, &request_id, input.data(),
|
|
input.size());
|
|
}
|
|
|
|
void TestUnpackNodes(Fuzz_Data &input)
|
|
{
|
|
CONSUME1_OR_RETURN(const bool, tcp_enabled, input);
|
|
|
|
const uint16_t node_count = 5;
|
|
Node_format nodes[node_count];
|
|
uint16_t processed_data_len;
|
|
const int packed_count = unpack_nodes(
|
|
nodes, node_count, &processed_data_len, input.data(), input.size(), tcp_enabled);
|
|
if (packed_count > 0) {
|
|
Logger *logger = logger_new();
|
|
std::vector<uint8_t> packed(packed_count * PACKED_NODE_SIZE_IP6);
|
|
const int packed_size
|
|
= pack_nodes(logger, packed.data(), packed.size(), nodes, packed_count);
|
|
LOGGER_ASSERT(logger, packed_size == processed_data_len,
|
|
"packed size (%d) != unpacked size (%d)", packed_size, processed_data_len);
|
|
logger_kill(logger);
|
|
|
|
// Check that packed nodes can be unpacked again and result in the
|
|
// original unpacked nodes.
|
|
Node_format nodes2[node_count];
|
|
uint16_t processed_data_len2;
|
|
const int packed_count2 = unpack_nodes(
|
|
nodes2, node_count, &processed_data_len2, packed.data(), packed.size(), tcp_enabled);
|
|
(void)packed_count2;
|
|
#if 0
|
|
assert(processed_data_len2 == processed_data_len);
|
|
assert(packed_count2 == packed_count);
|
|
#endif
|
|
assert(memcmp(nodes, nodes2, sizeof(Node_format) * packed_count) == 0);
|
|
}
|
|
}
|
|
|
|
} // namespace
|
|
|
|
extern "C" int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size);
|
|
extern "C" int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size)
|
|
{
|
|
fuzz_select_target<TestHandleRequest, TestUnpackNodes>(data, size);
|
|
return 0;
|
|
}
|