mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2025-02-26 23:52:30 +01:00
79 lines
1.9 KiB
C
79 lines
1.9 KiB
C
/* Copyright (c) 2016-2017, The Tor Project, Inc. */
|
|
/* See LICENSE for licensing information */
|
|
#define ROUTERPARSE_PRIVATE
|
|
#include "or.h"
|
|
#include "routerparse.h"
|
|
#include "routerlist.h"
|
|
#include "routerkeys.h"
|
|
#include "fuzzing.h"
|
|
|
|
static int
|
|
mock_check_tap_onion_key_crosscert__nocheck(const uint8_t *crosscert,
|
|
int crosscert_len,
|
|
const crypto_pk_t *onion_pkey,
|
|
const ed25519_public_key_t *master_id_pkey,
|
|
const uint8_t *rsa_id_digest)
|
|
{
|
|
tor_assert(crosscert && onion_pkey && master_id_pkey && rsa_id_digest);
|
|
/* we could look at crosscert[..] */
|
|
(void) crosscert_len;
|
|
return 0;
|
|
}
|
|
|
|
static void
|
|
mock_dump_desc__nodump(const char *desc, const char *type)
|
|
{
|
|
(void)desc;
|
|
(void)type;
|
|
}
|
|
|
|
static int
|
|
mock_router_produce_hash_final__nohash(char *digest,
|
|
const char *start, size_t len,
|
|
digest_algorithm_t alg)
|
|
{
|
|
(void)start;
|
|
(void)len;
|
|
/* we could look at start[..] */
|
|
if (alg == DIGEST_SHA1)
|
|
memset(digest, 0x01, 20);
|
|
else
|
|
memset(digest, 0x02, 32);
|
|
return 0;
|
|
}
|
|
|
|
int
|
|
fuzz_init(void)
|
|
{
|
|
disable_signature_checking();
|
|
MOCK(check_tap_onion_key_crosscert,
|
|
mock_check_tap_onion_key_crosscert__nocheck);
|
|
MOCK(dump_desc, mock_dump_desc__nodump);
|
|
MOCK(router_compute_hash_final, mock_router_produce_hash_final__nohash);
|
|
ed25519_init();
|
|
return 0;
|
|
}
|
|
|
|
int
|
|
fuzz_cleanup(void)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
int
|
|
fuzz_main(const uint8_t *data, size_t sz)
|
|
{
|
|
routerinfo_t *ri;
|
|
const char *str = (const char*) data;
|
|
ri = router_parse_entry_from_string((const char *)str,
|
|
str+sz,
|
|
0, 0, 0, NULL);
|
|
if (ri) {
|
|
log_debug(LD_GENERAL, "Parsing okay");
|
|
routerinfo_free(ri);
|
|
} else {
|
|
log_debug(LD_GENERAL, "Parsing failed");
|
|
}
|
|
return 0;
|
|
}
|
|
|