2018-06-20 14:13:28 +02:00
|
|
|
/* Copyright (c) 2016-2018, The Tor Project, Inc. */
|
2016-12-14 23:11:26 +01:00
|
|
|
/* See LICENSE for licensing information */
|
2016-12-14 16:05:41 +01:00
|
|
|
#define ROUTERPARSE_PRIVATE
|
2018-06-20 15:35:05 +02:00
|
|
|
#include "or/or.h"
|
|
|
|
#include "or/routerparse.h"
|
|
|
|
#include "or/routerlist.h"
|
|
|
|
#include "or/routerkeys.h"
|
|
|
|
#include "test/fuzz/fuzzing.h"
|
2016-12-14 16:05:41 +01:00
|
|
|
|
|
|
|
static void
|
|
|
|
mock_dump_desc__nodump(const char *desc, const char *type)
|
|
|
|
{
|
|
|
|
(void)desc;
|
|
|
|
(void)type;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
mock_router_produce_hash_final__nohash(char *digest,
|
|
|
|
const char *start, size_t len,
|
|
|
|
digest_algorithm_t alg)
|
|
|
|
{
|
|
|
|
(void)start;
|
|
|
|
(void)len;
|
|
|
|
/* we could look at start[..] */
|
|
|
|
if (alg == DIGEST_SHA1)
|
|
|
|
memset(digest, 0x01, 20);
|
|
|
|
else
|
|
|
|
memset(digest, 0x02, 32);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
fuzz_init(void)
|
|
|
|
{
|
|
|
|
disable_signature_checking();
|
|
|
|
MOCK(dump_desc, mock_dump_desc__nodump);
|
|
|
|
MOCK(router_compute_hash_final, mock_router_produce_hash_final__nohash);
|
|
|
|
ed25519_init();
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
fuzz_cleanup(void)
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
fuzz_main(const uint8_t *data, size_t sz)
|
|
|
|
{
|
|
|
|
extrainfo_t *ei;
|
|
|
|
const char *str = (const char*) data;
|
|
|
|
int again = 0;
|
|
|
|
ei = extrainfo_parse_entry_from_string((const char *)str,
|
|
|
|
str+sz,
|
|
|
|
0, NULL, &again);
|
|
|
|
if (ei) {
|
|
|
|
log_debug(LD_GENERAL, "Parsing okay");
|
|
|
|
extrainfo_free(ei);
|
|
|
|
} else {
|
|
|
|
log_debug(LD_GENERAL, "Parsing failed");
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|