Skip to content

Commit e528075

Browse files
tests: Add fuzzing harness for Lookup(...)/LookupHost(...)/LookupNumeric(...)/LookupSubNet(...)
1 parent c6b4bfb commit e528075

File tree

2 files changed

+78
-0
lines changed

2 files changed

+78
-0
lines changed

src/Makefile.test.include

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -252,6 +252,7 @@ test_fuzz_fuzz_SOURCES = \
252252
test/fuzz/net.cpp \
253253
test/fuzz/net_permissions.cpp \
254254
test/fuzz/netaddress.cpp \
255+
test/fuzz/netbase_dns_lookup.cpp \
255256
test/fuzz/node_eviction.cpp \
256257
test/fuzz/p2p_transport_deserializer.cpp \
257258
test/fuzz/parse_hd_keypath.cpp \

src/test/fuzz/netbase_dns_lookup.cpp

Lines changed: 77 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,77 @@
1+
// Copyright (c) 2021 The Bitcoin Core developers
2+
// Distributed under the MIT software license, see the accompanying
3+
// file COPYING or http://www.opensource.org/licenses/mit-license.php.
4+
5+
#include <netaddress.h>
6+
#include <netbase.h>
7+
#include <test/fuzz/FuzzedDataProvider.h>
8+
#include <test/fuzz/fuzz.h>
9+
#include <test/fuzz/util.h>
10+
11+
#include <cstdint>
12+
#include <string>
13+
#include <vector>
14+
15+
namespace {
16+
FuzzedDataProvider* fuzzed_data_provider_ptr = nullptr;
17+
18+
std::vector<CNetAddr> fuzzed_dns_lookup_function(const std::string& name, bool allow_lookup)
19+
{
20+
std::vector<CNetAddr> resolved_addresses;
21+
while (fuzzed_data_provider_ptr->ConsumeBool()) {
22+
resolved_addresses.push_back(ConsumeNetAddr(*fuzzed_data_provider_ptr));
23+
}
24+
return resolved_addresses;
25+
}
26+
} // namespace
27+
28+
FUZZ_TARGET(netbase_dns_lookup)
29+
{
30+
FuzzedDataProvider fuzzed_data_provider{buffer.data(), buffer.size()};
31+
fuzzed_data_provider_ptr = &fuzzed_data_provider;
32+
const std::string name = fuzzed_data_provider.ConsumeRandomLengthString(512);
33+
const unsigned int max_results = fuzzed_data_provider.ConsumeIntegral<unsigned int>();
34+
const bool allow_lookup = fuzzed_data_provider.ConsumeBool();
35+
const int default_port = fuzzed_data_provider.ConsumeIntegral<int>();
36+
{
37+
std::vector<CNetAddr> resolved_addresses;
38+
if (LookupHost(name, resolved_addresses, max_results, allow_lookup, fuzzed_dns_lookup_function)) {
39+
for (const CNetAddr& resolved_address : resolved_addresses) {
40+
assert(!resolved_address.IsInternal());
41+
}
42+
}
43+
assert(resolved_addresses.size() <= max_results || max_results == 0);
44+
}
45+
{
46+
CNetAddr resolved_address;
47+
if (LookupHost(name, resolved_address, allow_lookup, fuzzed_dns_lookup_function)) {
48+
assert(!resolved_address.IsInternal());
49+
}
50+
}
51+
{
52+
std::vector<CService> resolved_services;
53+
if (Lookup(name, resolved_services, default_port, allow_lookup, max_results, fuzzed_dns_lookup_function)) {
54+
for (const CNetAddr& resolved_service : resolved_services) {
55+
assert(!resolved_service.IsInternal());
56+
}
57+
}
58+
assert(resolved_services.size() <= max_results || max_results == 0);
59+
}
60+
{
61+
CService resolved_service;
62+
if (Lookup(name, resolved_service, default_port, allow_lookup, fuzzed_dns_lookup_function)) {
63+
assert(!resolved_service.IsInternal());
64+
}
65+
}
66+
{
67+
CService resolved_service = LookupNumeric(name, default_port, fuzzed_dns_lookup_function);
68+
assert(!resolved_service.IsInternal());
69+
}
70+
{
71+
CSubNet resolved_subnet;
72+
if (LookupSubNet(name, resolved_subnet, fuzzed_dns_lookup_function)) {
73+
assert(resolved_subnet.IsValid());
74+
}
75+
}
76+
fuzzed_data_provider_ptr = nullptr;
77+
}

0 commit comments

Comments
 (0)