ff3512a77e
f785959eace chore: add to_string functions for netprof enums a95b7957288 cleanup: Heap allocate network profile objects a3c80149edd feat: Implement Tox network profiler ac812871a2e feat: implement the last 2 missing network struct functions and make use of them 29d1043be0b test: friend request test now tests min/max message sizes 93aafd78c1f fix: friend requests with very long messages are no longer dropped 819aa2b2618 feat: Add option to disable DNS lookups in toxcore. 0ac23cee035 fix: windows use of REUSEADDR 7d2811d302d chore(ci): make bazel server shutdown faster 1dc399ba20d chore: Use vcpkg instead of conan in the MSVC build. 14d823165d9 chore: Migrate to conan 2. bdd17c16787 cleanup: Allocate logger using tox memory allocator. b396c061515 chore(deps): bump third_party/cmp from `2ac6bca` to `52bfcfa` 2e94da60d09 feat(net): add missing connect to network struct 41fb1839c7b chore: Add check to ensure version numbers agree. 934a8301113 chore: Release 0.2.20 3acef4bf044 fix: Add missing free in dht_get_nodes_response event. git-subtree-dir: external/toxcore/c-toxcore git-subtree-split: f785959eacebc59590f756b133b52601c335a1d1
66 lines
2.2 KiB
C++
66 lines
2.2 KiB
C++
#include "DHT.h"
|
|
|
|
#include <cassert>
|
|
#include <cstdlib>
|
|
#include <cstring>
|
|
#include <vector>
|
|
|
|
#include "../testing/fuzzing/fuzz_support.hh"
|
|
|
|
namespace {
|
|
|
|
void TestHandleRequest(Fuzz_Data &input)
|
|
{
|
|
CONSUME_OR_RETURN(const uint8_t *self_public_key, input, CRYPTO_PUBLIC_KEY_SIZE);
|
|
CONSUME_OR_RETURN(const uint8_t *self_secret_key, input, CRYPTO_SECRET_KEY_SIZE);
|
|
|
|
uint8_t public_key[CRYPTO_PUBLIC_KEY_SIZE];
|
|
uint8_t request[MAX_CRYPTO_REQUEST_SIZE];
|
|
uint8_t request_id;
|
|
handle_request(self_public_key, self_secret_key, public_key, request, &request_id, input.data(),
|
|
input.size());
|
|
}
|
|
|
|
void TestUnpackNodes(Fuzz_Data &input)
|
|
{
|
|
CONSUME1_OR_RETURN(const bool, tcp_enabled, input);
|
|
|
|
const uint16_t node_count = 5;
|
|
Node_format nodes[node_count];
|
|
uint16_t processed_data_len;
|
|
const int packed_count = unpack_nodes(
|
|
nodes, node_count, &processed_data_len, input.data(), input.size(), tcp_enabled);
|
|
if (packed_count > 0) {
|
|
const Memory *mem = os_memory();
|
|
Logger *logger = logger_new(mem);
|
|
std::vector<uint8_t> packed(packed_count * PACKED_NODE_SIZE_IP6);
|
|
const int packed_size
|
|
= pack_nodes(logger, packed.data(), packed.size(), nodes, packed_count);
|
|
LOGGER_ASSERT(logger, packed_size == processed_data_len,
|
|
"packed size (%d) != unpacked size (%d)", packed_size, processed_data_len);
|
|
logger_kill(logger);
|
|
|
|
// Check that packed nodes can be unpacked again and result in the
|
|
// original unpacked nodes.
|
|
Node_format nodes2[node_count];
|
|
uint16_t processed_data_len2;
|
|
const int packed_count2 = unpack_nodes(
|
|
nodes2, node_count, &processed_data_len2, packed.data(), packed.size(), tcp_enabled);
|
|
(void)packed_count2;
|
|
#if 0
|
|
assert(processed_data_len2 == processed_data_len);
|
|
assert(packed_count2 == packed_count);
|
|
#endif
|
|
assert(memcmp(nodes, nodes2, sizeof(Node_format) * packed_count) == 0);
|
|
}
|
|
}
|
|
|
|
} // namespace
|
|
|
|
extern "C" int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size);
|
|
extern "C" int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size)
|
|
{
|
|
fuzz_select_target<TestHandleRequest, TestUnpackNodes>(data, size);
|
|
return 0;
|
|
}
|