Merge #18417: tests: Add fuzzing harnesses for functions in addrdb.h, net_permissions.h and timedata.h
pull/764/head4308aa67e3
tests: Add fuzzing harness for functions in net_permissions.h (practicalswift)43ff0d91f8
tests: Add fuzzing harness for functions in timedata.h (practicalswift)a8695db785
tests: Add fuzzing harness for functions in addrdb.h (practicalswift) Pull request description: Add fuzzing harnesses for functions in `addrdb.h`, `net_permissions.h` and `timedata.h`. Top commit has no ACKs. Tree-SHA512: ea41431e7f1944ecd0c102e6ea04e70d6763dc9b6e3a0949a4f7299897a92fa3e8e7139f9f65b9508ce8d45613ea24ec0fd6d4a8be3cfd7c23136512b17770eb
commit
5236b2e267
@ -0,0 +1,43 @@
|
|||||||
|
// Copyright (c) 2020 The Bitcoin Core developers
|
||||||
|
// Distributed under the MIT software license, see the accompanying
|
||||||
|
// file COPYING or http://www.opensource.org/licenses/mit-license.php.
|
||||||
|
|
||||||
|
#include <addrdb.h>
|
||||||
|
#include <optional.h>
|
||||||
|
#include <test/fuzz/FuzzedDataProvider.h>
|
||||||
|
#include <test/fuzz/fuzz.h>
|
||||||
|
#include <test/fuzz/util.h>
|
||||||
|
|
||||||
|
#include <cassert>
|
||||||
|
#include <cstdint>
|
||||||
|
#include <string>
|
||||||
|
#include <vector>
|
||||||
|
|
||||||
|
void test_one_input(const std::vector<uint8_t>& buffer)
|
||||||
|
{
|
||||||
|
FuzzedDataProvider fuzzed_data_provider(buffer.data(), buffer.size());
|
||||||
|
|
||||||
|
const CBanEntry ban_entry = [&] {
|
||||||
|
switch (fuzzed_data_provider.ConsumeIntegralInRange<int>(0, 3)) {
|
||||||
|
case 0:
|
||||||
|
return CBanEntry{fuzzed_data_provider.ConsumeIntegral<int64_t>()};
|
||||||
|
break;
|
||||||
|
case 1:
|
||||||
|
return CBanEntry{fuzzed_data_provider.ConsumeIntegral<int64_t>(), fuzzed_data_provider.PickValueInArray<BanReason>({
|
||||||
|
BanReason::BanReasonUnknown,
|
||||||
|
BanReason::BanReasonNodeMisbehaving,
|
||||||
|
BanReason::BanReasonManuallyAdded,
|
||||||
|
})};
|
||||||
|
break;
|
||||||
|
case 2: {
|
||||||
|
const Optional<CBanEntry> ban_entry = ConsumeDeserializable<CBanEntry>(fuzzed_data_provider);
|
||||||
|
if (ban_entry) {
|
||||||
|
return *ban_entry;
|
||||||
|
}
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return CBanEntry{};
|
||||||
|
}();
|
||||||
|
assert(!ban_entry.banReasonToString().empty());
|
||||||
|
}
|
@ -0,0 +1,51 @@
|
|||||||
|
// Copyright (c) 2020 The Bitcoin Core developers
|
||||||
|
// Distributed under the MIT software license, see the accompanying
|
||||||
|
// file COPYING or http://www.opensource.org/licenses/mit-license.php.
|
||||||
|
|
||||||
|
#include <net_permissions.h>
|
||||||
|
#include <optional.h>
|
||||||
|
#include <test/fuzz/FuzzedDataProvider.h>
|
||||||
|
#include <test/fuzz/fuzz.h>
|
||||||
|
#include <test/fuzz/util.h>
|
||||||
|
|
||||||
|
#include <cassert>
|
||||||
|
#include <cstdint>
|
||||||
|
#include <string>
|
||||||
|
#include <vector>
|
||||||
|
|
||||||
|
void test_one_input(const std::vector<uint8_t>& buffer)
|
||||||
|
{
|
||||||
|
FuzzedDataProvider fuzzed_data_provider(buffer.data(), buffer.size());
|
||||||
|
const std::string s = fuzzed_data_provider.ConsumeRandomLengthString(32);
|
||||||
|
const NetPermissionFlags net_permission_flags = fuzzed_data_provider.ConsumeBool() ? fuzzed_data_provider.PickValueInArray<NetPermissionFlags>({
|
||||||
|
NetPermissionFlags::PF_NONE,
|
||||||
|
NetPermissionFlags::PF_BLOOMFILTER,
|
||||||
|
NetPermissionFlags::PF_RELAY,
|
||||||
|
NetPermissionFlags::PF_FORCERELAY,
|
||||||
|
NetPermissionFlags::PF_NOBAN,
|
||||||
|
NetPermissionFlags::PF_MEMPOOL,
|
||||||
|
NetPermissionFlags::PF_ISIMPLICIT,
|
||||||
|
NetPermissionFlags::PF_ALL,
|
||||||
|
}) :
|
||||||
|
static_cast<NetPermissionFlags>(fuzzed_data_provider.ConsumeIntegral<uint32_t>());
|
||||||
|
|
||||||
|
NetWhitebindPermissions net_whitebind_permissions;
|
||||||
|
std::string error_net_whitebind_permissions;
|
||||||
|
if (NetWhitebindPermissions::TryParse(s, net_whitebind_permissions, error_net_whitebind_permissions)) {
|
||||||
|
(void)NetPermissions::ToStrings(net_whitebind_permissions.m_flags);
|
||||||
|
(void)NetPermissions::AddFlag(net_whitebind_permissions.m_flags, net_permission_flags);
|
||||||
|
assert(NetPermissions::HasFlag(net_whitebind_permissions.m_flags, net_permission_flags));
|
||||||
|
(void)NetPermissions::ClearFlag(net_whitebind_permissions.m_flags, net_permission_flags);
|
||||||
|
(void)NetPermissions::ToStrings(net_whitebind_permissions.m_flags);
|
||||||
|
}
|
||||||
|
|
||||||
|
NetWhitelistPermissions net_whitelist_permissions;
|
||||||
|
std::string error_net_whitelist_permissions;
|
||||||
|
if (NetWhitelistPermissions::TryParse(s, net_whitelist_permissions, error_net_whitelist_permissions)) {
|
||||||
|
(void)NetPermissions::ToStrings(net_whitelist_permissions.m_flags);
|
||||||
|
(void)NetPermissions::AddFlag(net_whitelist_permissions.m_flags, net_permission_flags);
|
||||||
|
assert(NetPermissions::HasFlag(net_whitelist_permissions.m_flags, net_permission_flags));
|
||||||
|
(void)NetPermissions::ClearFlag(net_whitelist_permissions.m_flags, net_permission_flags);
|
||||||
|
(void)NetPermissions::ToStrings(net_whitelist_permissions.m_flags);
|
||||||
|
}
|
||||||
|
}
|
@ -0,0 +1,29 @@
|
|||||||
|
// Copyright (c) 2020 The Bitcoin Core developers
|
||||||
|
// Distributed under the MIT software license, see the accompanying
|
||||||
|
// file COPYING or http://www.opensource.org/licenses/mit-license.php.
|
||||||
|
|
||||||
|
#include <test/fuzz/FuzzedDataProvider.h>
|
||||||
|
#include <test/fuzz/fuzz.h>
|
||||||
|
#include <test/fuzz/util.h>
|
||||||
|
#include <timedata.h>
|
||||||
|
|
||||||
|
#include <cstdint>
|
||||||
|
#include <string>
|
||||||
|
#include <vector>
|
||||||
|
|
||||||
|
void test_one_input(const std::vector<uint8_t>& buffer)
|
||||||
|
{
|
||||||
|
FuzzedDataProvider fuzzed_data_provider(buffer.data(), buffer.size());
|
||||||
|
const unsigned int max_size = fuzzed_data_provider.ConsumeIntegralInRange<unsigned int>(0, 1000);
|
||||||
|
// Divide by 2 to avoid signed integer overflow in .median()
|
||||||
|
const int64_t initial_value = fuzzed_data_provider.ConsumeIntegral<int64_t>() / 2;
|
||||||
|
CMedianFilter<int64_t> median_filter{max_size, initial_value};
|
||||||
|
while (fuzzed_data_provider.remaining_bytes() > 0) {
|
||||||
|
(void)median_filter.median();
|
||||||
|
assert(median_filter.size() > 0);
|
||||||
|
assert(static_cast<size_t>(median_filter.size()) == median_filter.sorted().size());
|
||||||
|
assert(static_cast<unsigned int>(median_filter.size()) <= max_size || max_size == 0);
|
||||||
|
// Divide by 2 to avoid signed integer overflow in .median()
|
||||||
|
median_filter.input(fuzzed_data_provider.ConsumeIntegral<int64_t>() / 2);
|
||||||
|
}
|
||||||
|
}
|
Loading…
Reference in new issue