mirror of
https://git.wownero.com/wownero/wownero.git
synced 2024-12-23 08:48:52 +00:00
841231e5bd
Existing tests: block, transaction, signature, cold outputs, cold transaction. Data for these is in tests/data/fuzz. A convenience shell script is in contrib/fuzz_testing/fuzz.sh, eg: contrib/fuzz_testing/fuzz.sh signature The fuzzer will run indefinitely, ^C to stop. Fuzzing is currently supported for GCC only. I can't get CLANG to build Monero here as it dies on some system headers, so if someone wants to make it work on both, that'd be great. In particular, the __AFL_LOOP construct should be made to work so that a given run can fuzz multiple inputs, as the C++ load time is substantial.
106 lines
3.7 KiB
C++
106 lines
3.7 KiB
C++
// Copyright (c) 2017, The Monero Project
|
|
//
|
|
// All rights reserved.
|
|
//
|
|
// Redistribution and use in source and binary forms, with or without modification, are
|
|
// permitted provided that the following conditions are met:
|
|
//
|
|
// 1. Redistributions of source code must retain the above copyright notice, this list of
|
|
// conditions and the following disclaimer.
|
|
//
|
|
// 2. Redistributions in binary form must reproduce the above copyright notice, this list
|
|
// of conditions and the following disclaimer in the documentation and/or other
|
|
// materials provided with the distribution.
|
|
//
|
|
// 3. Neither the name of the copyright holder nor the names of its contributors may be
|
|
// used to endorse or promote products derived from this software without specific
|
|
// prior written permission.
|
|
//
|
|
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY
|
|
// EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
|
// MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
|
|
// THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
|
|
// PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
// INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
|
// STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
|
|
// THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
#include "include_base_utils.h"
|
|
#include "common/command_line.h"
|
|
#include "file_io_utils.h"
|
|
#include "cryptonote_protocol/blobdatatype.h"
|
|
#include "cryptonote_basic/cryptonote_basic.h"
|
|
#include "cryptonote_basic/cryptonote_format_utils.h"
|
|
#include "wallet/wallet2.h"
|
|
#include "fuzzer.h"
|
|
|
|
class SignatureFuzzer: public Fuzzer
|
|
{
|
|
public:
|
|
SignatureFuzzer(): Fuzzer(), wallet(true) {}
|
|
virtual int init();
|
|
virtual int run(const std::string &filename);
|
|
|
|
private:
|
|
tools::wallet2 wallet;
|
|
cryptonote::account_public_address address;
|
|
};
|
|
|
|
int SignatureFuzzer::init()
|
|
{
|
|
static const char * const spendkey_hex = "0b4f47697ec99c3de6579304e5f25c68b07afbe55b71d99620bf6cbf4e45a80f";
|
|
crypto::secret_key spendkey;
|
|
epee::string_tools::hex_to_pod(spendkey_hex, spendkey);
|
|
|
|
try
|
|
{
|
|
boost::filesystem::remove("/tmp/signature-test.keys");
|
|
boost::filesystem::remove("/tmp/signature-test.address.txt");
|
|
boost::filesystem::remove("/tmp/signature-test");
|
|
|
|
wallet.init("");
|
|
wallet.generate("/tmp/signature-test", "", spendkey, true, false);
|
|
|
|
boost::filesystem::remove("/tmp/signature-test.keys");
|
|
boost::filesystem::remove("/tmp/signature-test.address.txt");
|
|
boost::filesystem::remove("/tmp/signature-test");
|
|
|
|
bool has_payment_id;
|
|
crypto::hash8 new_payment_id;
|
|
if (!cryptonote::get_account_address_from_str_or_url(address, has_payment_id, new_payment_id, true, "9uVsvEryzpN8WH2t1WWhFFCG5tS8cBNdmJYNRuckLENFimfauV5pZKeS1P2CbxGkSDTUPHXWwiYE5ZGSXDAGbaZgDxobqDN"))
|
|
{
|
|
std::cerr << "failed to parse address" << std::endl;
|
|
return 1;
|
|
}
|
|
}
|
|
catch (const std::exception &e)
|
|
{
|
|
std::cerr << "Error on SignatureFuzzer::init: " << e.what() << std::endl;
|
|
return 1;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
int SignatureFuzzer::run(const std::string &filename)
|
|
{
|
|
std::string s;
|
|
|
|
if (!epee::file_io_utils::load_file_to_string(filename, s))
|
|
{
|
|
std::cout << "Error: failed to load file " << filename << std::endl;
|
|
return 1;
|
|
}
|
|
|
|
bool valid = wallet.verify("test", address, s);
|
|
std::cout << "Signature " << (valid ? "valid" : "invalid") << std::endl;
|
|
|
|
return 0;
|
|
}
|
|
|
|
int main(int argc, const char **argv)
|
|
{
|
|
SignatureFuzzer fuzzer;
|
|
return run_fuzzer(argc, argv, fuzzer);
|
|
}
|