Skip to content

Commit 38e49de

Browse files
tests: Add fuzzing harness for MessageSign, MessageVerify and other functions in util/message.h
1 parent 9ddfce6 commit 38e49de

File tree

2 files changed

+55
-0
lines changed

2 files changed

+55
-0
lines changed

src/Makefile.test.include

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -52,6 +52,7 @@ FUZZ_TARGETS = \
5252
test/fuzz/locale \
5353
test/fuzz/merkle_block_deserialize \
5454
test/fuzz/merkleblock \
55+
test/fuzz/message \
5556
test/fuzz/messageheader_deserialize \
5657
test/fuzz/multiplication_overflow \
5758
test/fuzz/net_permissions \
@@ -585,6 +586,12 @@ test_fuzz_merkleblock_LDADD = $(FUZZ_SUITE_LD_COMMON)
585586
test_fuzz_merkleblock_LDFLAGS = $(RELDFLAGS) $(AM_LDFLAGS) $(LIBTOOL_APP_LDFLAGS)
586587
test_fuzz_merkleblock_SOURCES = test/fuzz/merkleblock.cpp
587588

589+
test_fuzz_message_CPPFLAGS = $(AM_CPPFLAGS) $(BITCOIN_INCLUDES)
590+
test_fuzz_message_CXXFLAGS = $(AM_CXXFLAGS) $(PIE_FLAGS)
591+
test_fuzz_message_LDADD = $(FUZZ_SUITE_LD_COMMON)
592+
test_fuzz_message_LDFLAGS = $(RELDFLAGS) $(AM_LDFLAGS) $(LIBTOOL_APP_LDFLAGS)
593+
test_fuzz_message_SOURCES = test/fuzz/message.cpp
594+
588595
test_fuzz_messageheader_deserialize_CPPFLAGS = $(AM_CPPFLAGS) $(BITCOIN_INCLUDES) -DMESSAGEHEADER_DESERIALIZE=1
589596
test_fuzz_messageheader_deserialize_CXXFLAGS = $(AM_CXXFLAGS) $(PIE_FLAGS)
590597
test_fuzz_messageheader_deserialize_LDADD = $(FUZZ_SUITE_LD_COMMON)

src/test/fuzz/message.cpp

Lines changed: 48 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,48 @@
1+
// Copyright (c) 2020 The Bitcoin Core developers
2+
// Distributed under the MIT software license, see the accompanying
3+
// file COPYING or http://www.opensource.org/licenses/mit-license.php.
4+
5+
#include <chainparams.h>
6+
#include <key_io.h>
7+
#include <optional.h>
8+
#include <test/fuzz/FuzzedDataProvider.h>
9+
#include <test/fuzz/fuzz.h>
10+
#include <test/fuzz/util.h>
11+
#include <util/message.h>
12+
#include <util/strencodings.h>
13+
14+
#include <cassert>
15+
#include <cstdint>
16+
#include <iostream>
17+
#include <string>
18+
#include <vector>
19+
20+
void initialize()
21+
{
22+
static const ECCVerifyHandle ecc_verify_handle;
23+
ECC_Start();
24+
SelectParams(CBaseChainParams::REGTEST);
25+
}
26+
27+
void test_one_input(const std::vector<uint8_t>& buffer)
28+
{
29+
FuzzedDataProvider fuzzed_data_provider(buffer.data(), buffer.size());
30+
const std::string random_message = fuzzed_data_provider.ConsumeRandomLengthString(1024);
31+
{
32+
const std::vector<uint8_t> random_bytes = ConsumeRandomLengthByteVector(fuzzed_data_provider);
33+
CKey private_key;
34+
private_key.Set(random_bytes.begin(), random_bytes.end(), fuzzed_data_provider.ConsumeBool());
35+
std::string signature;
36+
const bool message_signed = MessageSign(private_key, random_message, signature);
37+
if (private_key.IsValid()) {
38+
assert(message_signed);
39+
const MessageVerificationResult verification_result = MessageVerify(EncodeDestination(PKHash(private_key.GetPubKey().GetID())), signature, random_message);
40+
assert(verification_result == MessageVerificationResult::OK);
41+
}
42+
}
43+
{
44+
(void)MessageHash(random_message);
45+
(void)MessageVerify(fuzzed_data_provider.ConsumeRandomLengthString(1024), fuzzed_data_provider.ConsumeRandomLengthString(1024), random_message);
46+
(void)SigningResultString(fuzzed_data_provider.PickValueInArray({SigningResult::OK, SigningResult::PRIVATE_KEY_NOT_AVAILABLE, SigningResult::SIGNING_FAILED}));
47+
}
48+
}

0 commit comments

Comments
 (0)