9ed2fa80d fix(toxav): remove extra copy of video frame on encode de30cf3ad docs: Add new file kinds, that should be useful to all clients. d5b5e879d fix(DHT): Correct node skipping logic timed out nodes. 30e71fe97 refactor: Generate event dispatch functions and add tox_events_dispatch. 8fdbb0b50 style: Format parameter lists in event handlers. d00dee12b refactor: Add warning logs when losing chat invites. b144e8db1 feat: Add a way to look up a file number by ID. 849281ea0 feat: Add a way to fetch groups by chat ID. a2c177396 refactor: Harden event system and improve type safety. 8f5caa656 refactor: Add MessagePack string support to bin_pack. 34e8d5ad5 chore: Add GitHub CodeQL workflow and local Docker runner. f7b068010 refactor: Add nullability annotations to event headers. 788abe651 refactor(toxav): Use system allocator for mutexes. 2e4b423eb refactor: Use specific typedefs for public API arrays. 2baf34775 docs(toxav): update idle iteration interval see 679444751876fa3882a717772918ebdc8f083354 2f87ac67b feat: Add Event Loop abstraction (Ev). f8dfc38d8 test: Fix data race in ToxScenario virtual_clock. 38313921e test(TCP): Add regression test for TCP priority queue integrity. f94a50d9a refactor(toxav): Replace mutable_mutex with dynamically allocated mutex. ad054511e refactor: Internalize DHT structs and add debug helpers. 8b467cc96 fix: Prevent potential integer overflow in group chat handshake. 4962bdbb8 test: Improve TCP simulation and add tests 5f0227093 refactor: Allow nullable data in group chat handlers. e97b18ea9 chore: Improve Windows Docker support. b14943bbd refactor: Move Logger out of Messenger into Tox. dd3136250 cleanup: Apply nullability qualifiers to C++ codebase. 1849f70fc refactor: Extract low-level networking code to net and os_network. 8fec75421 refactor: Delete tox_random, align on rng and os_random. a03ae8051 refactor: Delete tox_memory, align on mem and os_memory. 4c88fed2c refactor: Use `std::` prefixes more consistently in C++ code. 72452f2ae test: Add some more tests for onion and shared key cache. d5a51b09a cleanup: Use tox_attributes.h in tox_private.h and install it. b6f5b9fc5 test: Add some benchmarks for various high level things. 8a8d02785 test(support): Introduce threaded Tox runner and simulation barrier d68d1d095 perf(toxav): optimize audio and video intermediate buffers by keeping them around REVERT: c9cdae001 fix(toxav): remove extra copy of video frame on encode git-subtree-dir: external/toxcore/c-toxcore git-subtree-split: 9ed2fa80d582c714d6bdde6a7648220a92cddff8
117 lines
3.6 KiB
C++
117 lines
3.6 KiB
C++
#include "forwarding.h"
|
|
|
|
#include <cassert>
|
|
#include <cstring>
|
|
#include <memory>
|
|
#include <optional>
|
|
|
|
#include "../testing/support/public/fuzz_data.hh"
|
|
#include "../testing/support/public/fuzz_helpers.hh"
|
|
#include "../testing/support/public/simulated_environment.hh"
|
|
|
|
namespace {
|
|
|
|
using tox::test::configure_fuzz_memory_source;
|
|
using tox::test::Fuzz_Data;
|
|
using tox::test::SimulatedEnvironment;
|
|
|
|
constexpr std::uint16_t SIZE_IP_PORT = SIZE_IP6 + sizeof(std::uint16_t);
|
|
|
|
template <typename T>
|
|
using Ptr = std::unique_ptr<T, void (*)(T *)>;
|
|
|
|
std::optional<std::tuple<IP_Port, IP_Port, const std::uint8_t *, std::size_t>> prepare(
|
|
Fuzz_Data &input)
|
|
{
|
|
CONSUME_OR_RETURN_VAL(const std::uint8_t *ipp_packed, input, SIZE_IP_PORT, std::nullopt);
|
|
IP_Port ipp{};
|
|
unpack_ip_port(&ipp, ipp_packed, SIZE_IP6, true);
|
|
|
|
CONSUME_OR_RETURN_VAL(const std::uint8_t *forwarder_packed, input, SIZE_IP_PORT, std::nullopt);
|
|
IP_Port forwarder{};
|
|
unpack_ip_port(&forwarder, forwarder_packed, SIZE_IP6, true);
|
|
|
|
// 2 bytes: size of the request
|
|
CONSUME_OR_RETURN_VAL(
|
|
const std::uint8_t *data_size_bytes, input, sizeof(std::uint16_t), std::nullopt);
|
|
std::uint16_t data_size;
|
|
std::memcpy(&data_size, data_size_bytes, sizeof(std::uint16_t));
|
|
|
|
// data bytes (max 64K)
|
|
CONSUME_OR_RETURN_VAL(const std::uint8_t *data, input, data_size, std::nullopt);
|
|
|
|
return {{ipp, forwarder, data, data_size}};
|
|
}
|
|
|
|
void TestSendForwardRequest(Fuzz_Data &input)
|
|
{
|
|
CONSUME1_OR_RETURN(const std::uint16_t, chain_length, input);
|
|
const std::uint16_t chain_keys_size = chain_length * CRYPTO_PUBLIC_KEY_SIZE;
|
|
CONSUME_OR_RETURN(const std::uint8_t *chain_keys, input, chain_keys_size);
|
|
|
|
const auto prep = prepare(input);
|
|
if (!prep.has_value()) {
|
|
return;
|
|
}
|
|
const auto [ipp, forwarder, data, data_size] = prep.value();
|
|
|
|
SimulatedEnvironment env;
|
|
auto node = env.create_node(ipp.port);
|
|
configure_fuzz_memory_source(env.fake_memory(), input);
|
|
|
|
const Ptr<Logger> logger(logger_new(&node->c_memory), logger_kill);
|
|
if (logger == nullptr) {
|
|
return;
|
|
}
|
|
|
|
const Ptr<Networking_Core> net(
|
|
new_networking_ex(logger.get(), &node->c_memory, &node->c_network, &ipp.ip, ipp.port,
|
|
ipp.port + 100, nullptr),
|
|
kill_networking);
|
|
if (net == nullptr) {
|
|
return;
|
|
}
|
|
|
|
send_forward_request(net.get(), &forwarder, chain_keys, chain_length, data, data_size);
|
|
}
|
|
|
|
void TestForwardReply(Fuzz_Data &input)
|
|
{
|
|
CONSUME1_OR_RETURN(const std::uint16_t, sendback_length, input);
|
|
CONSUME_OR_RETURN(const std::uint8_t *sendback, input, sendback_length);
|
|
|
|
const auto prep = prepare(input);
|
|
if (!prep.has_value()) {
|
|
return;
|
|
}
|
|
const auto [ipp, forwarder, data, data_size] = prep.value();
|
|
|
|
SimulatedEnvironment env;
|
|
auto node = env.create_node(ipp.port);
|
|
configure_fuzz_memory_source(env.fake_memory(), input);
|
|
|
|
const Ptr<Logger> logger(logger_new(&node->c_memory), logger_kill);
|
|
if (logger == nullptr) {
|
|
return;
|
|
}
|
|
|
|
const Ptr<Networking_Core> net(
|
|
new_networking_ex(logger.get(), &node->c_memory, &node->c_network, &ipp.ip, ipp.port,
|
|
ipp.port + 100, nullptr),
|
|
kill_networking);
|
|
if (net == nullptr) {
|
|
return;
|
|
}
|
|
|
|
forward_reply(net.get(), &forwarder, sendback, sendback_length, data, data_size);
|
|
}
|
|
|
|
} // namespace
|
|
|
|
extern "C" int LLVMFuzzerTestOneInput(const std::uint8_t *data, std::size_t size);
|
|
extern "C" int LLVMFuzzerTestOneInput(const std::uint8_t *data, std::size_t size)
|
|
{
|
|
tox::test::fuzz_select_target<TestSendForwardRequest, TestForwardReply>(data, size);
|
|
return 0;
|
|
}
|