mirror of
https://github.com/ElementsProject/lightning.git
synced 2024-11-19 18:11:28 +01:00
62b54d0125
This adds a new configuration, --enable-fuzzing (which is more than welcome to be coupled with --enable-address-sanitizer), to pass the fuzzer sanitizer argument when compiling objects. This allows libfuzzer to actually be able "to fuzz" by detecting coverage and be smart when mutating inputs. As libfuzzer brings its own ~~fees~~ main(), we compile objects with fsanitize=fuzzer-no-link, and special-case the linkage of the fuzz targets. A "lib" is added to abstract out the interface to the fuzzing tool used. This allow us to use the same targets to fuzz using AFL, hongfuzz or w/e by adding their entrypoints into libfuzz. (h/t to practicalswift who introduced this for bitcoin-core, which i mimiced) Signed-off-by: Antoine Poinsot <darosior@protonmail.com>
23 lines
481 B
C
23 lines
481 B
C
#include "common/utils.h"
|
|
#include <stdint.h>
|
|
#include <tests/fuzz/libfuzz.h>
|
|
|
|
#include <ccan/ccan/tal/tal.h>
|
|
#include <common/addr.h>
|
|
#include <common/setup.h>
|
|
|
|
void init(int *argc, char ***argv)
|
|
{
|
|
chainparams = chainparams_for_network("bitcoin");
|
|
common_setup("fuzzer");
|
|
}
|
|
|
|
void run(const uint8_t *data, size_t size)
|
|
{
|
|
uint8_t *script_pubkey = tal_dup_arr(tmpctx, uint8_t, data, size, 0);
|
|
|
|
encode_scriptpubkey_to_addr(tmpctx, chainparams, script_pubkey);
|
|
|
|
clean_tmpctx();
|
|
}
|