fuzz_hsdescv3.c 1.6 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374
  1. /* Copyright (c) 2017, The Tor Project, Inc. */
  2. /* See LICENSE for licensing information */
  3. #define ROUTERPARSE_PRIVATE
  4. #define HS_DESCRIPTOR_PRIVATE
  5. #include "or.h"
  6. #include "ed25519_cert.h" /* Trunnel interface. */
  7. #include "crypto_ed25519.h"
  8. #include "hs_descriptor.h"
  9. #include "routerparse.h"
  10. #include "util.h"
  11. #include "fuzzing.h"
  12. static void
  13. mock_dump_desc__nodump(const char *desc, const char *type)
  14. {
  15. (void)desc;
  16. (void)type;
  17. }
  18. static int
  19. mock_rsa_ed25519_crosscert_check(const uint8_t *crosscert,
  20. const size_t crosscert_len,
  21. const crypto_pk_t *rsa_id_key,
  22. const ed25519_public_key_t *master_key,
  23. const time_t reject_if_expired_before)
  24. {
  25. (void) crosscert;
  26. (void) crosscert_len;
  27. (void) rsa_id_key;
  28. (void) master_key;
  29. (void) reject_if_expired_before;
  30. return 0;
  31. }
  32. int
  33. fuzz_init(void)
  34. {
  35. disable_signature_checking();
  36. MOCK(dump_desc, mock_dump_desc__nodump);
  37. MOCK(rsa_ed25519_crosscert_check, mock_rsa_ed25519_crosscert_check);
  38. ed25519_init();
  39. return 0;
  40. }
  41. int
  42. fuzz_cleanup(void)
  43. {
  44. return 0;
  45. }
  46. int
  47. fuzz_main(const uint8_t *data, size_t sz)
  48. {
  49. hs_descriptor_t *desc = NULL;
  50. uint8_t subcredential[DIGEST256_LEN];
  51. char *fuzzing_data = tor_memdup_nulterm(data, sz);
  52. memset(subcredential, 'A', sizeof(subcredential));
  53. hs_desc_decode_descriptor(fuzzing_data, subcredential, &desc);
  54. if (desc) {
  55. log_debug(LD_GENERAL, "Decoding okay");
  56. hs_descriptor_free(desc);
  57. } else {
  58. log_debug(LD_GENERAL, "Decoding failed");
  59. }
  60. tor_free(fuzzing_data);
  61. return 0;
  62. }