2021-01-25 12:23:45 +01:00
|
|
|
// Copyright (c) 2009-2021 The Bitcoin Core developers
|
2020-02-24 20:35:10 +00:00
|
|
|
// Distributed under the MIT software license, see the accompanying
|
|
|
|
// file COPYING or http://www.opensource.org/licenses/mit-license.php.
|
|
|
|
|
|
|
|
#ifndef BITCOIN_TEST_FUZZ_UTIL_H
|
|
|
|
#define BITCOIN_TEST_FUZZ_UTIL_H
|
|
|
|
|
2020-03-22 14:16:40 +00:00
|
|
|
#include <arith_uint256.h>
|
2020-02-24 20:35:10 +00:00
|
|
|
#include <attributes.h>
|
2020-06-09 11:16:13 +00:00
|
|
|
#include <chainparamsbase.h>
|
2020-04-28 12:27:56 +00:00
|
|
|
#include <coins.h>
|
2021-03-04 20:29:28 +00:00
|
|
|
#include <compat.h>
|
2021-09-11 10:29:00 +08:00
|
|
|
#include <consensus/amount.h>
|
2020-04-26 19:27:54 +00:00
|
|
|
#include <consensus/consensus.h>
|
2020-05-24 18:11:55 +00:00
|
|
|
#include <merkleblock.h>
|
2020-10-18 16:20:04 +00:00
|
|
|
#include <net.h>
|
2020-06-09 09:45:39 +00:00
|
|
|
#include <netaddress.h>
|
2020-06-09 11:16:13 +00:00
|
|
|
#include <netbase.h>
|
2020-04-26 19:27:54 +00:00
|
|
|
#include <primitives/transaction.h>
|
2020-02-19 16:42:42 +00:00
|
|
|
#include <script/script.h>
|
2020-05-16 18:13:36 +00:00
|
|
|
#include <script/standard.h>
|
2020-02-24 20:35:10 +00:00
|
|
|
#include <serialize.h>
|
|
|
|
#include <streams.h>
|
|
|
|
#include <test/fuzz/FuzzedDataProvider.h>
|
2020-02-19 16:42:42 +00:00
|
|
|
#include <test/fuzz/fuzz.h>
|
2020-12-28 21:31:33 +01:00
|
|
|
#include <test/util/net.h>
|
2020-04-26 19:27:54 +00:00
|
|
|
#include <txmempool.h>
|
2020-03-24 14:35:51 +00:00
|
|
|
#include <uint256.h>
|
2020-02-24 20:35:10 +00:00
|
|
|
#include <version.h>
|
|
|
|
|
2020-05-16 18:13:36 +00:00
|
|
|
#include <algorithm>
|
2020-06-07 16:59:46 +00:00
|
|
|
#include <array>
|
2020-02-24 20:35:10 +00:00
|
|
|
#include <cstdint>
|
2020-06-02 18:58:21 +00:00
|
|
|
#include <cstdio>
|
2020-05-10 18:35:55 +00:00
|
|
|
#include <optional>
|
2020-02-24 20:35:10 +00:00
|
|
|
#include <string>
|
|
|
|
#include <vector>
|
|
|
|
|
2021-01-02 13:38:14 +01:00
|
|
|
template <typename... Callables>
|
2021-07-04 16:38:51 +02:00
|
|
|
size_t CallOneOf(FuzzedDataProvider& fuzzed_data_provider, Callables... callables)
|
2021-01-02 13:38:14 +01:00
|
|
|
{
|
|
|
|
constexpr size_t call_size{sizeof...(callables)};
|
|
|
|
static_assert(call_size >= 1);
|
|
|
|
const size_t call_index{fuzzed_data_provider.ConsumeIntegralInRange<size_t>(0, call_size - 1)};
|
|
|
|
|
|
|
|
size_t i{0};
|
2021-06-07 13:28:01 +02:00
|
|
|
((i++ == call_index ? callables() : void()), ...);
|
2021-07-04 16:38:51 +02:00
|
|
|
return call_size;
|
2021-01-02 13:38:14 +01:00
|
|
|
}
|
|
|
|
|
2021-01-14 21:26:19 +01:00
|
|
|
template <typename Collection>
|
2021-03-24 07:01:35 +01:00
|
|
|
auto& PickValue(FuzzedDataProvider& fuzzed_data_provider, Collection& col)
|
2021-01-14 21:26:19 +01:00
|
|
|
{
|
|
|
|
const auto sz = col.size();
|
|
|
|
assert(sz >= 1);
|
|
|
|
auto it = col.begin();
|
|
|
|
std::advance(it, fuzzed_data_provider.ConsumeIntegralInRange<decltype(sz)>(0, sz - 1));
|
|
|
|
return *it;
|
|
|
|
}
|
|
|
|
|
2021-04-28 20:48:10 +02:00
|
|
|
[[nodiscard]] inline std::vector<uint8_t> ConsumeRandomLengthByteVector(FuzzedDataProvider& fuzzed_data_provider, const std::optional<size_t>& max_length = std::nullopt) noexcept
|
2020-02-24 20:35:10 +00:00
|
|
|
{
|
2021-04-28 20:48:10 +02:00
|
|
|
const std::string s = max_length ?
|
|
|
|
fuzzed_data_provider.ConsumeRandomLengthString(*max_length) :
|
|
|
|
fuzzed_data_provider.ConsumeRandomLengthString();
|
2020-02-24 20:35:10 +00:00
|
|
|
return {s.begin(), s.end()};
|
|
|
|
}
|
|
|
|
|
2021-04-28 20:48:10 +02:00
|
|
|
[[nodiscard]] inline std::vector<bool> ConsumeRandomLengthBitVector(FuzzedDataProvider& fuzzed_data_provider, const std::optional<size_t>& max_length = std::nullopt) noexcept
|
2020-05-24 18:11:55 +00:00
|
|
|
{
|
|
|
|
return BytesToBits(ConsumeRandomLengthByteVector(fuzzed_data_provider, max_length));
|
|
|
|
}
|
|
|
|
|
2021-04-28 20:48:10 +02:00
|
|
|
[[nodiscard]] inline CDataStream ConsumeDataStream(FuzzedDataProvider& fuzzed_data_provider, const std::optional<size_t>& max_length = std::nullopt) noexcept
|
2020-05-16 18:13:36 +00:00
|
|
|
{
|
2020-11-23 18:53:44 +01:00
|
|
|
return CDataStream{ConsumeRandomLengthByteVector(fuzzed_data_provider, max_length), SER_NETWORK, INIT_PROTO_VERSION};
|
2020-05-16 18:13:36 +00:00
|
|
|
}
|
|
|
|
|
2020-11-26 09:05:59 +00:00
|
|
|
[[nodiscard]] inline std::vector<std::string> ConsumeRandomLengthStringVector(FuzzedDataProvider& fuzzed_data_provider, const size_t max_vector_size = 16, const size_t max_string_length = 16) noexcept
|
2020-03-15 14:08:34 +00:00
|
|
|
{
|
|
|
|
const size_t n_elements = fuzzed_data_provider.ConsumeIntegralInRange<size_t>(0, max_vector_size);
|
|
|
|
std::vector<std::string> r;
|
|
|
|
for (size_t i = 0; i < n_elements; ++i) {
|
|
|
|
r.push_back(fuzzed_data_provider.ConsumeRandomLengthString(max_string_length));
|
|
|
|
}
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
2020-02-24 20:35:10 +00:00
|
|
|
template <typename T>
|
2020-11-26 09:05:59 +00:00
|
|
|
[[nodiscard]] inline std::vector<T> ConsumeRandomLengthIntegralVector(FuzzedDataProvider& fuzzed_data_provider, const size_t max_vector_size = 16) noexcept
|
2020-03-28 08:56:38 +00:00
|
|
|
{
|
|
|
|
const size_t n_elements = fuzzed_data_provider.ConsumeIntegralInRange<size_t>(0, max_vector_size);
|
|
|
|
std::vector<T> r;
|
|
|
|
for (size_t i = 0; i < n_elements; ++i) {
|
|
|
|
r.push_back(fuzzed_data_provider.ConsumeIntegral<T>());
|
|
|
|
}
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
|
|
|
template <typename T>
|
2021-04-28 20:48:10 +02:00
|
|
|
[[nodiscard]] inline std::optional<T> ConsumeDeserializable(FuzzedDataProvider& fuzzed_data_provider, const std::optional<size_t>& max_length = std::nullopt) noexcept
|
2020-02-24 20:35:10 +00:00
|
|
|
{
|
2020-02-26 20:04:23 +00:00
|
|
|
const std::vector<uint8_t> buffer = ConsumeRandomLengthByteVector(fuzzed_data_provider, max_length);
|
2020-02-24 20:35:10 +00:00
|
|
|
CDataStream ds{buffer, SER_NETWORK, INIT_PROTO_VERSION};
|
|
|
|
T obj;
|
|
|
|
try {
|
|
|
|
ds >> obj;
|
|
|
|
} catch (const std::ios_base::failure&) {
|
2020-05-10 18:35:55 +00:00
|
|
|
return std::nullopt;
|
2020-02-24 20:35:10 +00:00
|
|
|
}
|
|
|
|
return obj;
|
|
|
|
}
|
|
|
|
|
2020-12-28 21:58:00 +01:00
|
|
|
template <typename WeakEnumType, size_t size>
|
|
|
|
[[nodiscard]] WeakEnumType ConsumeWeakEnum(FuzzedDataProvider& fuzzed_data_provider, const WeakEnumType (&all_types)[size]) noexcept
|
|
|
|
{
|
|
|
|
return fuzzed_data_provider.ConsumeBool() ?
|
|
|
|
fuzzed_data_provider.PickValueInArray<WeakEnumType>(all_types) :
|
|
|
|
WeakEnumType(fuzzed_data_provider.ConsumeIntegral<typename std::underlying_type<WeakEnumType>::type>());
|
|
|
|
}
|
|
|
|
|
2020-11-26 09:05:59 +00:00
|
|
|
[[nodiscard]] inline opcodetype ConsumeOpcodeType(FuzzedDataProvider& fuzzed_data_provider) noexcept
|
2020-02-19 16:42:42 +00:00
|
|
|
{
|
|
|
|
return static_cast<opcodetype>(fuzzed_data_provider.ConsumeIntegralInRange<uint32_t>(0, MAX_OPCODE));
|
|
|
|
}
|
|
|
|
|
2021-05-09 10:59:16 +02:00
|
|
|
[[nodiscard]] CAmount ConsumeMoney(FuzzedDataProvider& fuzzed_data_provider, const std::optional<CAmount>& max = std::nullopt) noexcept;
|
2020-03-15 02:24:38 +00:00
|
|
|
|
2021-04-28 20:36:36 +02:00
|
|
|
[[nodiscard]] int64_t ConsumeTime(FuzzedDataProvider& fuzzed_data_provider, const std::optional<int64_t>& min = std::nullopt, const std::optional<int64_t>& max = std::nullopt) noexcept;
|
2020-05-24 18:11:55 +00:00
|
|
|
|
2021-01-14 21:26:19 +01:00
|
|
|
[[nodiscard]] CMutableTransaction ConsumeTransaction(FuzzedDataProvider& fuzzed_data_provider, const std::optional<std::vector<uint256>>& prevout_txids, const int max_num_in = 10, const int max_num_out = 10) noexcept;
|
|
|
|
|
|
|
|
[[nodiscard]] CScriptWitness ConsumeScriptWitness(FuzzedDataProvider& fuzzed_data_provider, const size_t max_stack_elem_size = 32) noexcept;
|
|
|
|
|
2021-09-27 12:39:17 +02:00
|
|
|
[[nodiscard]] CScript ConsumeScript(FuzzedDataProvider& fuzzed_data_provider, const bool maybe_p2wsh = false) noexcept;
|
2021-01-14 21:26:19 +01:00
|
|
|
|
|
|
|
[[nodiscard]] uint32_t ConsumeSequence(FuzzedDataProvider& fuzzed_data_provider) noexcept;
|
2020-02-19 16:42:42 +00:00
|
|
|
|
2020-11-26 09:05:59 +00:00
|
|
|
[[nodiscard]] inline CScriptNum ConsumeScriptNum(FuzzedDataProvider& fuzzed_data_provider) noexcept
|
2020-02-19 16:42:42 +00:00
|
|
|
{
|
|
|
|
return CScriptNum{fuzzed_data_provider.ConsumeIntegral<int64_t>()};
|
|
|
|
}
|
|
|
|
|
2020-11-26 09:05:59 +00:00
|
|
|
[[nodiscard]] inline uint160 ConsumeUInt160(FuzzedDataProvider& fuzzed_data_provider) noexcept
|
2020-05-16 18:13:36 +00:00
|
|
|
{
|
|
|
|
const std::vector<uint8_t> v160 = fuzzed_data_provider.ConsumeBytes<uint8_t>(160 / 8);
|
|
|
|
if (v160.size() != 160 / 8) {
|
|
|
|
return {};
|
|
|
|
}
|
|
|
|
return uint160{v160};
|
|
|
|
}
|
|
|
|
|
2020-11-26 09:05:59 +00:00
|
|
|
[[nodiscard]] inline uint256 ConsumeUInt256(FuzzedDataProvider& fuzzed_data_provider) noexcept
|
2020-03-24 14:35:51 +00:00
|
|
|
{
|
2020-05-16 18:13:36 +00:00
|
|
|
const std::vector<uint8_t> v256 = fuzzed_data_provider.ConsumeBytes<uint8_t>(256 / 8);
|
|
|
|
if (v256.size() != 256 / 8) {
|
2020-03-24 14:35:51 +00:00
|
|
|
return {};
|
|
|
|
}
|
|
|
|
return uint256{v256};
|
|
|
|
}
|
|
|
|
|
2020-11-26 09:05:59 +00:00
|
|
|
[[nodiscard]] inline arith_uint256 ConsumeArithUInt256(FuzzedDataProvider& fuzzed_data_provider) noexcept
|
2020-03-22 14:16:40 +00:00
|
|
|
{
|
|
|
|
return UintToArith256(ConsumeUInt256(fuzzed_data_provider));
|
|
|
|
}
|
|
|
|
|
2021-07-14 15:18:25 +05:30
|
|
|
[[nodiscard]] CTxMemPoolEntry ConsumeTxMemPoolEntry(FuzzedDataProvider& fuzzed_data_provider, const CTransaction& tx) noexcept;
|
2020-04-26 19:27:54 +00:00
|
|
|
|
2021-07-04 14:22:36 +02:00
|
|
|
[[nodiscard]] CTxDestination ConsumeTxDestination(FuzzedDataProvider& fuzzed_data_provider) noexcept;
|
2020-05-16 18:13:36 +00:00
|
|
|
|
2020-03-15 02:24:38 +00:00
|
|
|
template <typename T>
|
2020-11-26 09:05:59 +00:00
|
|
|
[[nodiscard]] bool MultiplicationOverflow(const T i, const T j) noexcept
|
2020-03-15 02:24:38 +00:00
|
|
|
{
|
|
|
|
static_assert(std::is_integral<T>::value, "Integral required.");
|
|
|
|
if (std::numeric_limits<T>::is_signed) {
|
|
|
|
if (i > 0) {
|
|
|
|
if (j > 0) {
|
|
|
|
return i > (std::numeric_limits<T>::max() / j);
|
|
|
|
} else {
|
|
|
|
return j < (std::numeric_limits<T>::min() / i);
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if (j > 0) {
|
|
|
|
return i < (std::numeric_limits<T>::min() / j);
|
|
|
|
} else {
|
|
|
|
return i != 0 && (j < (std::numeric_limits<T>::max() / i));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
return j != 0 && i > std::numeric_limits<T>::max() / j;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-04-07 16:31:43 +00:00
|
|
|
template <class T>
|
2020-11-26 09:05:59 +00:00
|
|
|
[[nodiscard]] bool AdditionOverflow(const T i, const T j) noexcept
|
2020-04-07 16:31:43 +00:00
|
|
|
{
|
|
|
|
static_assert(std::is_integral<T>::value, "Integral required.");
|
|
|
|
if (std::numeric_limits<T>::is_signed) {
|
|
|
|
return (i > 0 && j > std::numeric_limits<T>::max() - i) ||
|
|
|
|
(i < 0 && j < std::numeric_limits<T>::min() - i);
|
|
|
|
}
|
|
|
|
return std::numeric_limits<T>::max() - i < j;
|
|
|
|
}
|
|
|
|
|
2021-07-14 15:18:25 +05:30
|
|
|
[[nodiscard]] bool ContainsSpentInput(const CTransaction& tx, const CCoinsViewCache& inputs) noexcept;
|
2020-04-28 12:27:56 +00:00
|
|
|
|
2020-06-07 16:59:46 +00:00
|
|
|
/**
|
|
|
|
* Sets errno to a value selected from the given std::array `errnos`.
|
|
|
|
*/
|
|
|
|
template <typename T, size_t size>
|
|
|
|
void SetFuzzedErrNo(FuzzedDataProvider& fuzzed_data_provider, const std::array<T, size>& errnos)
|
|
|
|
{
|
|
|
|
errno = fuzzed_data_provider.PickValueInArray(errnos);
|
|
|
|
}
|
|
|
|
|
2020-06-02 18:58:21 +00:00
|
|
|
/*
|
|
|
|
* Sets a fuzzed errno in the range [0, 133 (EHWPOISON)]. Can be used from functions emulating
|
|
|
|
* standard library functions that set errno, or in other contexts where the value of errno
|
|
|
|
* might be relevant for the execution path that will be taken.
|
|
|
|
*/
|
|
|
|
inline void SetFuzzedErrNo(FuzzedDataProvider& fuzzed_data_provider) noexcept
|
|
|
|
{
|
|
|
|
errno = fuzzed_data_provider.ConsumeIntegralInRange<int>(0, 133);
|
|
|
|
}
|
|
|
|
|
2020-06-11 12:41:39 +00:00
|
|
|
/**
|
|
|
|
* Returns a byte vector of specified size regardless of the number of remaining bytes available
|
|
|
|
* from the fuzzer. Pads with zero value bytes if needed to achieve the specified size.
|
|
|
|
*/
|
2020-11-26 09:05:59 +00:00
|
|
|
[[nodiscard]] inline std::vector<uint8_t> ConsumeFixedLengthByteVector(FuzzedDataProvider& fuzzed_data_provider, const size_t length) noexcept
|
2020-06-11 12:41:39 +00:00
|
|
|
{
|
|
|
|
std::vector<uint8_t> result(length);
|
|
|
|
const std::vector<uint8_t> random_bytes = fuzzed_data_provider.ConsumeBytes<uint8_t>(length);
|
|
|
|
if (!random_bytes.empty()) {
|
|
|
|
std::memcpy(result.data(), random_bytes.data(), random_bytes.size());
|
|
|
|
}
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
2021-07-14 15:18:25 +05:30
|
|
|
CNetAddr ConsumeNetAddr(FuzzedDataProvider& fuzzed_data_provider) noexcept;
|
2020-06-09 09:45:39 +00:00
|
|
|
|
2020-12-20 18:19:43 -05:00
|
|
|
inline CSubNet ConsumeSubNet(FuzzedDataProvider& fuzzed_data_provider) noexcept
|
2020-06-09 09:45:39 +00:00
|
|
|
{
|
2020-08-24 21:34:26 +02:00
|
|
|
return {ConsumeNetAddr(fuzzed_data_provider), fuzzed_data_provider.ConsumeIntegral<uint8_t>()};
|
2020-06-09 09:45:39 +00:00
|
|
|
}
|
|
|
|
|
2020-12-20 18:19:43 -05:00
|
|
|
inline CService ConsumeService(FuzzedDataProvider& fuzzed_data_provider) noexcept
|
2020-10-18 16:20:04 +00:00
|
|
|
{
|
|
|
|
return {ConsumeNetAddr(fuzzed_data_provider), fuzzed_data_provider.ConsumeIntegral<uint16_t>()};
|
|
|
|
}
|
|
|
|
|
2020-12-20 18:19:43 -05:00
|
|
|
inline CAddress ConsumeAddress(FuzzedDataProvider& fuzzed_data_provider) noexcept
|
2020-10-18 16:20:04 +00:00
|
|
|
{
|
2021-01-02 10:14:39 +01:00
|
|
|
return {ConsumeService(fuzzed_data_provider), ConsumeWeakEnum(fuzzed_data_provider, ALL_SERVICE_FLAGS), fuzzed_data_provider.ConsumeIntegral<uint32_t>()};
|
2020-10-18 16:20:04 +00:00
|
|
|
}
|
|
|
|
|
2020-12-28 21:53:19 +01:00
|
|
|
template <bool ReturnUniquePtr = false>
|
2021-01-07 19:13:57 +01:00
|
|
|
auto ConsumeNode(FuzzedDataProvider& fuzzed_data_provider, const std::optional<NodeId>& node_id_in = std::nullopt) noexcept
|
2020-10-18 16:20:04 +00:00
|
|
|
{
|
2020-12-28 21:53:19 +01:00
|
|
|
const NodeId node_id = node_id_in.value_or(fuzzed_data_provider.ConsumeIntegral<NodeId>());
|
2021-01-02 10:14:39 +01:00
|
|
|
const ServiceFlags local_services = ConsumeWeakEnum(fuzzed_data_provider, ALL_SERVICE_FLAGS);
|
2020-10-18 16:20:04 +00:00
|
|
|
const SOCKET socket = INVALID_SOCKET;
|
|
|
|
const CAddress address = ConsumeAddress(fuzzed_data_provider);
|
|
|
|
const uint64_t keyed_net_group = fuzzed_data_provider.ConsumeIntegral<uint64_t>();
|
|
|
|
const uint64_t local_host_nonce = fuzzed_data_provider.ConsumeIntegral<uint64_t>();
|
|
|
|
const CAddress addr_bind = ConsumeAddress(fuzzed_data_provider);
|
|
|
|
const std::string addr_name = fuzzed_data_provider.ConsumeRandomLengthString(64);
|
2020-12-28 21:31:33 +01:00
|
|
|
const ConnectionType conn_type = fuzzed_data_provider.PickValueInArray(ALL_CONNECTION_TYPES);
|
2020-12-17 16:33:56 +01:00
|
|
|
const bool inbound_onion{conn_type == ConnectionType::INBOUND ? fuzzed_data_provider.ConsumeBool() : false};
|
2020-12-28 21:53:19 +01:00
|
|
|
if constexpr (ReturnUniquePtr) {
|
|
|
|
return std::make_unique<CNode>(node_id, local_services, socket, address, keyed_net_group, local_host_nonce, addr_bind, addr_name, conn_type, inbound_onion);
|
|
|
|
} else {
|
|
|
|
return CNode{node_id, local_services, socket, address, keyed_net_group, local_host_nonce, addr_bind, addr_name, conn_type, inbound_onion};
|
|
|
|
}
|
2020-10-18 16:20:04 +00:00
|
|
|
}
|
2021-01-23 19:39:30 +01:00
|
|
|
inline std::unique_ptr<CNode> ConsumeNodeAsUniquePtr(FuzzedDataProvider& fdp, const std::optional<NodeId>& node_id_in = std::nullopt) { return ConsumeNode<true>(fdp, node_id_in); }
|
2020-10-18 16:20:04 +00:00
|
|
|
|
2021-01-23 19:39:30 +01:00
|
|
|
void FillNode(FuzzedDataProvider& fuzzed_data_provider, CNode& node, bool init_version) noexcept;
|
2021-01-07 19:13:57 +01:00
|
|
|
|
2020-06-02 18:58:21 +00:00
|
|
|
class FuzzedFileProvider
|
|
|
|
{
|
|
|
|
FuzzedDataProvider& m_fuzzed_data_provider;
|
|
|
|
int64_t m_offset = 0;
|
|
|
|
|
|
|
|
public:
|
|
|
|
FuzzedFileProvider(FuzzedDataProvider& fuzzed_data_provider) : m_fuzzed_data_provider{fuzzed_data_provider}
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
2021-07-14 15:18:25 +05:30
|
|
|
FILE* open();
|
2020-06-02 18:58:21 +00:00
|
|
|
|
2021-07-14 15:18:25 +05:30
|
|
|
static ssize_t read(void* cookie, char* buf, size_t size);
|
2020-06-02 18:58:21 +00:00
|
|
|
|
2021-07-14 15:18:25 +05:30
|
|
|
static ssize_t write(void* cookie, const char* buf, size_t size);
|
2020-06-02 18:58:21 +00:00
|
|
|
|
2021-07-14 15:18:25 +05:30
|
|
|
static int seek(void* cookie, int64_t* offset, int whence);
|
2020-06-02 18:58:21 +00:00
|
|
|
|
2021-07-14 15:18:25 +05:30
|
|
|
static int close(void* cookie);
|
2020-06-02 18:58:21 +00:00
|
|
|
};
|
|
|
|
|
2020-11-26 09:05:59 +00:00
|
|
|
[[nodiscard]] inline FuzzedFileProvider ConsumeFile(FuzzedDataProvider& fuzzed_data_provider) noexcept
|
2020-06-02 18:58:21 +00:00
|
|
|
{
|
|
|
|
return {fuzzed_data_provider};
|
|
|
|
}
|
|
|
|
|
2020-06-02 19:02:26 +00:00
|
|
|
class FuzzedAutoFileProvider
|
|
|
|
{
|
|
|
|
FuzzedDataProvider& m_fuzzed_data_provider;
|
|
|
|
FuzzedFileProvider m_fuzzed_file_provider;
|
|
|
|
|
|
|
|
public:
|
|
|
|
FuzzedAutoFileProvider(FuzzedDataProvider& fuzzed_data_provider) : m_fuzzed_data_provider{fuzzed_data_provider}, m_fuzzed_file_provider{fuzzed_data_provider}
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
CAutoFile open()
|
|
|
|
{
|
|
|
|
return {m_fuzzed_file_provider.open(), m_fuzzed_data_provider.ConsumeIntegral<int>(), m_fuzzed_data_provider.ConsumeIntegral<int>()};
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2020-11-26 09:05:59 +00:00
|
|
|
[[nodiscard]] inline FuzzedAutoFileProvider ConsumeAutoFile(FuzzedDataProvider& fuzzed_data_provider) noexcept
|
2020-06-02 19:02:26 +00:00
|
|
|
{
|
|
|
|
return {fuzzed_data_provider};
|
|
|
|
}
|
|
|
|
|
2021-01-02 13:38:14 +01:00
|
|
|
#define WRITE_TO_STREAM_CASE(type, consume) \
|
|
|
|
[&] { \
|
|
|
|
type o = consume; \
|
|
|
|
stream << o; \
|
2020-06-02 19:03:52 +00:00
|
|
|
}
|
|
|
|
template <typename Stream>
|
|
|
|
void WriteToStream(FuzzedDataProvider& fuzzed_data_provider, Stream& stream) noexcept
|
|
|
|
{
|
|
|
|
while (fuzzed_data_provider.ConsumeBool()) {
|
|
|
|
try {
|
2021-01-02 13:38:14 +01:00
|
|
|
CallOneOf(
|
|
|
|
fuzzed_data_provider,
|
|
|
|
WRITE_TO_STREAM_CASE(bool, fuzzed_data_provider.ConsumeBool()),
|
|
|
|
WRITE_TO_STREAM_CASE(char, fuzzed_data_provider.ConsumeIntegral<char>()),
|
|
|
|
WRITE_TO_STREAM_CASE(int8_t, fuzzed_data_provider.ConsumeIntegral<int8_t>()),
|
|
|
|
WRITE_TO_STREAM_CASE(uint8_t, fuzzed_data_provider.ConsumeIntegral<uint8_t>()),
|
|
|
|
WRITE_TO_STREAM_CASE(int16_t, fuzzed_data_provider.ConsumeIntegral<int16_t>()),
|
|
|
|
WRITE_TO_STREAM_CASE(uint16_t, fuzzed_data_provider.ConsumeIntegral<uint16_t>()),
|
|
|
|
WRITE_TO_STREAM_CASE(int32_t, fuzzed_data_provider.ConsumeIntegral<int32_t>()),
|
|
|
|
WRITE_TO_STREAM_CASE(uint32_t, fuzzed_data_provider.ConsumeIntegral<uint32_t>()),
|
|
|
|
WRITE_TO_STREAM_CASE(int64_t, fuzzed_data_provider.ConsumeIntegral<int64_t>()),
|
|
|
|
WRITE_TO_STREAM_CASE(uint64_t, fuzzed_data_provider.ConsumeIntegral<uint64_t>()),
|
|
|
|
WRITE_TO_STREAM_CASE(std::string, fuzzed_data_provider.ConsumeRandomLengthString(32)),
|
|
|
|
WRITE_TO_STREAM_CASE(std::vector<char>, ConsumeRandomLengthIntegralVector<char>(fuzzed_data_provider)));
|
2020-06-02 19:03:52 +00:00
|
|
|
} catch (const std::ios_base::failure&) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-01-02 13:38:14 +01:00
|
|
|
#define READ_FROM_STREAM_CASE(type) \
|
|
|
|
[&] { \
|
|
|
|
type o; \
|
|
|
|
stream >> o; \
|
2020-06-02 19:03:52 +00:00
|
|
|
}
|
|
|
|
template <typename Stream>
|
|
|
|
void ReadFromStream(FuzzedDataProvider& fuzzed_data_provider, Stream& stream) noexcept
|
|
|
|
{
|
|
|
|
while (fuzzed_data_provider.ConsumeBool()) {
|
|
|
|
try {
|
2021-01-02 13:38:14 +01:00
|
|
|
CallOneOf(
|
|
|
|
fuzzed_data_provider,
|
|
|
|
READ_FROM_STREAM_CASE(bool),
|
|
|
|
READ_FROM_STREAM_CASE(char),
|
|
|
|
READ_FROM_STREAM_CASE(int8_t),
|
|
|
|
READ_FROM_STREAM_CASE(uint8_t),
|
|
|
|
READ_FROM_STREAM_CASE(int16_t),
|
|
|
|
READ_FROM_STREAM_CASE(uint16_t),
|
|
|
|
READ_FROM_STREAM_CASE(int32_t),
|
|
|
|
READ_FROM_STREAM_CASE(uint32_t),
|
|
|
|
READ_FROM_STREAM_CASE(int64_t),
|
|
|
|
READ_FROM_STREAM_CASE(uint64_t),
|
|
|
|
READ_FROM_STREAM_CASE(std::string),
|
|
|
|
READ_FROM_STREAM_CASE(std::vector<char>));
|
2020-06-02 19:03:52 +00:00
|
|
|
} catch (const std::ios_base::failure&) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-06-07 16:59:46 +00:00
|
|
|
class FuzzedSock : public Sock
|
|
|
|
{
|
|
|
|
FuzzedDataProvider& m_fuzzed_data_provider;
|
|
|
|
|
2021-03-05 14:50:49 +01:00
|
|
|
/**
|
|
|
|
* Data to return when `MSG_PEEK` is used as a `Recv()` flag.
|
|
|
|
* If `MSG_PEEK` is used, then our `Recv()` returns some random data as usual, but on the next
|
|
|
|
* `Recv()` call we must return the same data, thus we remember it here.
|
|
|
|
*/
|
|
|
|
mutable std::optional<uint8_t> m_peek_data;
|
|
|
|
|
2020-06-07 16:59:46 +00:00
|
|
|
public:
|
2021-04-07 10:18:39 +02:00
|
|
|
explicit FuzzedSock(FuzzedDataProvider& fuzzed_data_provider);
|
2020-06-07 16:59:46 +00:00
|
|
|
|
2021-04-07 10:18:39 +02:00
|
|
|
~FuzzedSock() override;
|
2020-06-07 16:59:46 +00:00
|
|
|
|
2021-04-07 10:18:39 +02:00
|
|
|
FuzzedSock& operator=(Sock&& other) override;
|
2021-03-05 12:13:34 +01:00
|
|
|
|
2021-04-07 10:18:39 +02:00
|
|
|
void Reset() override;
|
2020-06-07 16:59:46 +00:00
|
|
|
|
2021-04-07 10:18:39 +02:00
|
|
|
ssize_t Send(const void* data, size_t len, int flags) const override;
|
2020-06-07 16:59:46 +00:00
|
|
|
|
2021-04-07 10:18:39 +02:00
|
|
|
ssize_t Recv(void* buf, size_t len, int flags) const override;
|
2020-06-07 16:59:46 +00:00
|
|
|
|
2021-04-07 10:18:39 +02:00
|
|
|
int Connect(const sockaddr*, socklen_t) const override;
|
2021-03-05 16:29:43 +01:00
|
|
|
|
2021-04-07 10:18:39 +02:00
|
|
|
int GetSockOpt(int level, int opt_name, void* opt_val, socklen_t* opt_len) const override;
|
2021-03-05 16:29:43 +01:00
|
|
|
|
2021-04-06 12:47:04 +02:00
|
|
|
bool Wait(std::chrono::milliseconds timeout, Event requested, Event* occurred = nullptr) const override;
|
2021-03-04 16:05:33 +01:00
|
|
|
|
2021-04-07 10:18:39 +02:00
|
|
|
bool IsConnected(std::string& errmsg) const override;
|
2020-06-07 16:59:46 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
[[nodiscard]] inline FuzzedSock ConsumeSock(FuzzedDataProvider& fuzzed_data_provider)
|
|
|
|
{
|
|
|
|
return FuzzedSock{fuzzed_data_provider};
|
|
|
|
}
|
|
|
|
|
2020-02-24 20:35:10 +00:00
|
|
|
#endif // BITCOIN_TEST_FUZZ_UTIL_H
|