/* Copyright (c) 2016-2018, The Tor Project, Inc. */ /* See LICENSE for licensing information */ #define ROUTERPARSE_PRIVATE #define NETWORKSTATUS_PRIVATE #include "or/or.h" #include "or/routerparse.h" #include "common/memarea.h" #include "or/microdesc.h" #include "or/networkstatus.h" #include "or/networkstatus_st.h" #include "or/vote_routerstatus_st.h" #include "test/fuzz/fuzzing.h" static void mock_dump_desc__nodump(const char *desc, const char *type) { (void)desc; (void)type; } static networkstatus_t *dummy_vote = NULL; static memarea_t *area = NULL; int fuzz_init(void) { disable_signature_checking(); MOCK(dump_desc, mock_dump_desc__nodump); ed25519_init(); area = memarea_new(); dummy_vote = tor_malloc_zero(sizeof(*dummy_vote)); dummy_vote->known_flags = smartlist_new(); smartlist_split_string(dummy_vote->known_flags, "Authority BadExit Exit Fast Guard HSDir " "NoEdConsensus Running Stable V2Dir Valid", " ", 0, 0); return 0; } int fuzz_cleanup(void) { SMARTLIST_FOREACH(dummy_vote->known_flags, char *, cp, tor_free(cp)); smartlist_free(dummy_vote->known_flags); tor_free(dummy_vote); return 0; } int fuzz_main(const uint8_t *data, size_t sz) { char *str = tor_memdup_nulterm(data, sz); const char *s; routerstatus_t *rs_ns = NULL, *rs_md = NULL, *rs_vote = NULL; vote_routerstatus_t *vrs = tor_malloc_zero(sizeof(*vrs)); smartlist_t *tokens = smartlist_new(); s = str; rs_ns = routerstatus_parse_entry_from_string(area, &s, tokens, NULL, NULL, 26, FLAV_NS); tor_assert(smartlist_len(tokens) == 0); s = str; rs_md = routerstatus_parse_entry_from_string(area, &s, tokens, NULL, NULL, 26, FLAV_MICRODESC); tor_assert(smartlist_len(tokens) == 0); s = str; rs_vote = routerstatus_parse_entry_from_string(area, &s, tokens, dummy_vote, vrs, 26, FLAV_NS); tor_assert(smartlist_len(tokens) == 0); log_debug(LD_GENERAL, "ns=%p, md=%p, vote=%p", rs_ns, rs_md, rs_vote); routerstatus_free(rs_md); routerstatus_free(rs_ns); vote_routerstatus_free(vrs); memarea_clear(area); smartlist_free(tokens); tor_free(str); return 0; }