mirror of
https://github.com/bitcoin/bitcoin.git
synced 2025-01-12 04:42:36 -03:00
tests: Add fuzzing harness for Lookup(...)/LookupHost(...)/LookupNumeric(...)/LookupSubNet(...)
This commit is contained in:
parent
c6b4bfb4b3
commit
e528075189
2 changed files with 78 additions and 0 deletions
|
@ -252,6 +252,7 @@ test_fuzz_fuzz_SOURCES = \
|
|||
test/fuzz/net.cpp \
|
||||
test/fuzz/net_permissions.cpp \
|
||||
test/fuzz/netaddress.cpp \
|
||||
test/fuzz/netbase_dns_lookup.cpp \
|
||||
test/fuzz/node_eviction.cpp \
|
||||
test/fuzz/p2p_transport_deserializer.cpp \
|
||||
test/fuzz/parse_hd_keypath.cpp \
|
||||
|
|
77
src/test/fuzz/netbase_dns_lookup.cpp
Normal file
77
src/test/fuzz/netbase_dns_lookup.cpp
Normal file
|
@ -0,0 +1,77 @@
|
|||
// Copyright (c) 2021 The Bitcoin Core developers
|
||||
// Distributed under the MIT software license, see the accompanying
|
||||
// file COPYING or http://www.opensource.org/licenses/mit-license.php.
|
||||
|
||||
#include <netaddress.h>
|
||||
#include <netbase.h>
|
||||
#include <test/fuzz/FuzzedDataProvider.h>
|
||||
#include <test/fuzz/fuzz.h>
|
||||
#include <test/fuzz/util.h>
|
||||
|
||||
#include <cstdint>
|
||||
#include <string>
|
||||
#include <vector>
|
||||
|
||||
namespace {
|
||||
FuzzedDataProvider* fuzzed_data_provider_ptr = nullptr;
|
||||
|
||||
std::vector<CNetAddr> fuzzed_dns_lookup_function(const std::string& name, bool allow_lookup)
|
||||
{
|
||||
std::vector<CNetAddr> resolved_addresses;
|
||||
while (fuzzed_data_provider_ptr->ConsumeBool()) {
|
||||
resolved_addresses.push_back(ConsumeNetAddr(*fuzzed_data_provider_ptr));
|
||||
}
|
||||
return resolved_addresses;
|
||||
}
|
||||
} // namespace
|
||||
|
||||
FUZZ_TARGET(netbase_dns_lookup)
|
||||
{
|
||||
FuzzedDataProvider fuzzed_data_provider{buffer.data(), buffer.size()};
|
||||
fuzzed_data_provider_ptr = &fuzzed_data_provider;
|
||||
const std::string name = fuzzed_data_provider.ConsumeRandomLengthString(512);
|
||||
const unsigned int max_results = fuzzed_data_provider.ConsumeIntegral<unsigned int>();
|
||||
const bool allow_lookup = fuzzed_data_provider.ConsumeBool();
|
||||
const int default_port = fuzzed_data_provider.ConsumeIntegral<int>();
|
||||
{
|
||||
std::vector<CNetAddr> resolved_addresses;
|
||||
if (LookupHost(name, resolved_addresses, max_results, allow_lookup, fuzzed_dns_lookup_function)) {
|
||||
for (const CNetAddr& resolved_address : resolved_addresses) {
|
||||
assert(!resolved_address.IsInternal());
|
||||
}
|
||||
}
|
||||
assert(resolved_addresses.size() <= max_results || max_results == 0);
|
||||
}
|
||||
{
|
||||
CNetAddr resolved_address;
|
||||
if (LookupHost(name, resolved_address, allow_lookup, fuzzed_dns_lookup_function)) {
|
||||
assert(!resolved_address.IsInternal());
|
||||
}
|
||||
}
|
||||
{
|
||||
std::vector<CService> resolved_services;
|
||||
if (Lookup(name, resolved_services, default_port, allow_lookup, max_results, fuzzed_dns_lookup_function)) {
|
||||
for (const CNetAddr& resolved_service : resolved_services) {
|
||||
assert(!resolved_service.IsInternal());
|
||||
}
|
||||
}
|
||||
assert(resolved_services.size() <= max_results || max_results == 0);
|
||||
}
|
||||
{
|
||||
CService resolved_service;
|
||||
if (Lookup(name, resolved_service, default_port, allow_lookup, fuzzed_dns_lookup_function)) {
|
||||
assert(!resolved_service.IsInternal());
|
||||
}
|
||||
}
|
||||
{
|
||||
CService resolved_service = LookupNumeric(name, default_port, fuzzed_dns_lookup_function);
|
||||
assert(!resolved_service.IsInternal());
|
||||
}
|
||||
{
|
||||
CSubNet resolved_subnet;
|
||||
if (LookupSubNet(name, resolved_subnet, fuzzed_dns_lookup_function)) {
|
||||
assert(resolved_subnet.IsValid());
|
||||
}
|
||||
}
|
||||
fuzzed_data_provider_ptr = nullptr;
|
||||
}
|
Loading…
Reference in a new issue