From fb1125338e6e03ee45b540f5d6a50b02f28bef36 Mon Sep 17 00:00:00 2001 From: David Dworken Date: Mon, 18 May 2020 15:02:24 -0700 Subject: [PATCH 1/2] Add libfuzzer integration for libsignal-protocol-c Now building and running the tests will create a new `fuzzer` target that fuzzes deserialization and decryption with libfuzzer. As part of ctest this will automatically run for 2048 iterations (takes 3 seconds on my computer) in order to ensure that the fuzzer stays up to date. The fuzzer can be run manually in order to fuzz for more iterations. I've run this fuzzer for ~10 million iterations on my own computer and have not found anything yet. But, my ultimate goal with this PR is to integrate this repository with OSSFuzz per #136. Note that tests/fuzzing_corpus/ includes an initial corpus for fuzzing so that the fuzzer has somewhere to start. This was seeded with a couple of valid serialized ciphertexts but the majority of it was synthesized by the fuzzer over time. --- tests/CMakeLists.txt | 20 +++ tests/fuzz_target.c | 138 ++++++++++++++++++ .../008dc40e8e940554a2d99341f9e9e9d739d58c84 | Bin 0 -> 68 bytes .../1114fc59b3d34dc14c751ac4197e83ae806279c9 | 1 + .../1a1debc82fcee952eac78f6cea0e0473b9c6f70f | Bin 0 -> 173 bytes .../1ae536e8515dcc9479df9631c54ab60fcfb7f252 | Bin 0 -> 11 bytes .../1ca45ddc9268ab0266eaaf94b03b7b33d61cbc67 | Bin 0 -> 173 bytes .../1db1186b02fe767030eb819a325ea116ceba23a5 | Bin 0 -> 173 bytes .../2579ae3fb00ff31ac8af27ee8bfb2cd2acbb6c9f | Bin 0 -> 11 bytes .../296da42603380864f3e5e1794c101996f10850f1 | Bin 0 -> 9 bytes .../2dbfc8db8813b6a5ddd2d2213c9b5f4bc7c9bf86 | 1 + .../30ac69e3dabf0406926ccdfc1cd69895fc27b225 | 1 + .../486d37c15d929ec2bb4a679dca89967eeaa2db5e | Bin 0 -> 11 bytes .../4befa5410a3f027099d8e4457031a063c04cca78 | 1 + .../4e5ba2822fcce491d5e7b5bdb620ad367a8bb737 | Bin 0 -> 175 bytes .../540645e96d98248ac2c6ba6be292d37f4f4b96d2 | Bin 0 -> 88 bytes .../59ed132cbf0dfe42960518ddbf5991811c00bebc | Bin 0 -> 175 bytes .../5f0b215256c0b4ffd2566884d42ed36c540a5523 | Bin 0 -> 171 bytes .../5fccb36859573de696d5a9fb996369b8f4685d6d | Bin 0 -> 173 bytes .../60cd1141de350e77309c28730d794edbb84d5eb1 | Bin 0 -> 173 bytes .../6632e2d08d3f20083c6714c9ac489c3998410271 | Bin 0 -> 173 bytes .../6c7538fa04ef67015b578f7eb47d22e10c7f257f | 1 + .../6d143d74defecd65e92483b19d4387d582626e01 | 1 + .../709dcd9abf7449b5449a344223707bbf4e0a73fd | Bin 0 -> 173 bytes .../79338c5a9d04196332b237955977393a3719df5b | Bin 0 -> 177 bytes .../8055db73d78783ce3787c1bf2a1e05ed440d1a3d | 1 + .../825189f8cadaeeb0973e4e3f8cf9a0375760c285 | Bin 0 -> 177 bytes .../87691f59d4490f9445ea36ff79e4dd6e7fa17d3d | Bin 0 -> 173 bytes .../8e5f97e4333da16317d0e0bc393d3645e89d2b86 | Bin 0 -> 173 bytes .../8f75da00fd98ff6da5711fb2c6875ddb60289b3c | Bin 0 -> 173 bytes .../9321f76b59701e5827db764920518443b0eb2db2 | Bin 0 -> 7 bytes .../97a7cb37d735cfd4558c1c872f689ee721a4c72c | 1 + .../984d42d7be8180ff0856c0ed64dbc4520ad8bae0 | Bin 0 -> 177 bytes .../a08294559f9435ea859f09ea0f6f14ff59374649 | Bin 0 -> 177 bytes .../aaa45ff0de6bcb0e33112d50dfaec0b1b6ef91e8 | Bin 0 -> 75 bytes .../adc83b19e793491b1c6ea0fd8b46cd9f32e592fc | 1 + .../b2fa37e59976954286952381d5211bbb3c8fc956 | Bin 0 -> 12 bytes .../b58ca14467ee550be62f7faf427f8c53cf87048a | Bin 0 -> 173 bytes .../ba1894f2eb0cd7a1c4d46159f7a3362d8aca5a60 | Bin 0 -> 76 bytes .../c4c5f1ca35a2ae671e09b47ffb097961bf0dcfdd | Bin 0 -> 173 bytes .../c9ccfa809c545457d5d7f4883cd6968433e45d88 | Bin 0 -> 86 bytes .../ce2dde27bf8c64b3c4b24f016ce6223268e2793e | Bin 0 -> 11 bytes .../e08e55f778ac334cfa0363e2097e09b9453b688a | Bin 0 -> 7 bytes .../e0d9f662a80ad6e58b171ab3900d13ffe3432a00 | Bin 0 -> 13 bytes .../e404d68ee93c09d5854eec3de74646d9f102b6c0 | Bin 0 -> 175 bytes .../e5dc8c9dc7792f35652632d52e115ba28db22bad | Bin 0 -> 177 bytes .../e821c94f6432fb032a37f36d8dc591222f53eede | Bin 0 -> 173 bytes .../eeec751d0c2a64feabb3ea79cd110024455f838e | Bin 0 -> 5 bytes .../f70eaf8d76e1326bb3a7323c7902a11fc75b5b5d | 1 + .../f9432a85e0c888d3422a1a43147793377de20a13 | Bin 0 -> 173 bytes .../fabe29cae4c17ab9174674894e0c45ac1a844533 | 1 + tests/test_common.c | 3 +- 52 files changed, 171 insertions(+), 1 deletion(-) create mode 100644 tests/fuzz_target.c create mode 100644 tests/fuzzing_corpus/008dc40e8e940554a2d99341f9e9e9d739d58c84 create mode 100644 tests/fuzzing_corpus/1114fc59b3d34dc14c751ac4197e83ae806279c9 create mode 100644 tests/fuzzing_corpus/1a1debc82fcee952eac78f6cea0e0473b9c6f70f create mode 100644 tests/fuzzing_corpus/1ae536e8515dcc9479df9631c54ab60fcfb7f252 create mode 100644 tests/fuzzing_corpus/1ca45ddc9268ab0266eaaf94b03b7b33d61cbc67 create mode 100644 tests/fuzzing_corpus/1db1186b02fe767030eb819a325ea116ceba23a5 create mode 100644 tests/fuzzing_corpus/2579ae3fb00ff31ac8af27ee8bfb2cd2acbb6c9f create mode 100644 tests/fuzzing_corpus/296da42603380864f3e5e1794c101996f10850f1 create mode 100644 tests/fuzzing_corpus/2dbfc8db8813b6a5ddd2d2213c9b5f4bc7c9bf86 create mode 100644 tests/fuzzing_corpus/30ac69e3dabf0406926ccdfc1cd69895fc27b225 create mode 100644 tests/fuzzing_corpus/486d37c15d929ec2bb4a679dca89967eeaa2db5e create mode 100644 tests/fuzzing_corpus/4befa5410a3f027099d8e4457031a063c04cca78 create mode 100644 tests/fuzzing_corpus/4e5ba2822fcce491d5e7b5bdb620ad367a8bb737 create mode 100644 tests/fuzzing_corpus/540645e96d98248ac2c6ba6be292d37f4f4b96d2 create mode 100644 tests/fuzzing_corpus/59ed132cbf0dfe42960518ddbf5991811c00bebc create mode 100644 tests/fuzzing_corpus/5f0b215256c0b4ffd2566884d42ed36c540a5523 create mode 100644 tests/fuzzing_corpus/5fccb36859573de696d5a9fb996369b8f4685d6d create mode 100644 tests/fuzzing_corpus/60cd1141de350e77309c28730d794edbb84d5eb1 create mode 100644 tests/fuzzing_corpus/6632e2d08d3f20083c6714c9ac489c3998410271 create mode 100644 tests/fuzzing_corpus/6c7538fa04ef67015b578f7eb47d22e10c7f257f create mode 100644 tests/fuzzing_corpus/6d143d74defecd65e92483b19d4387d582626e01 create mode 100644 tests/fuzzing_corpus/709dcd9abf7449b5449a344223707bbf4e0a73fd create mode 100644 tests/fuzzing_corpus/79338c5a9d04196332b237955977393a3719df5b create mode 100644 tests/fuzzing_corpus/8055db73d78783ce3787c1bf2a1e05ed440d1a3d create mode 100644 tests/fuzzing_corpus/825189f8cadaeeb0973e4e3f8cf9a0375760c285 create mode 100644 tests/fuzzing_corpus/87691f59d4490f9445ea36ff79e4dd6e7fa17d3d create mode 100644 tests/fuzzing_corpus/8e5f97e4333da16317d0e0bc393d3645e89d2b86 create mode 100644 tests/fuzzing_corpus/8f75da00fd98ff6da5711fb2c6875ddb60289b3c create mode 100644 tests/fuzzing_corpus/9321f76b59701e5827db764920518443b0eb2db2 create mode 100644 tests/fuzzing_corpus/97a7cb37d735cfd4558c1c872f689ee721a4c72c create mode 100644 tests/fuzzing_corpus/984d42d7be8180ff0856c0ed64dbc4520ad8bae0 create mode 100644 tests/fuzzing_corpus/a08294559f9435ea859f09ea0f6f14ff59374649 create mode 100644 tests/fuzzing_corpus/aaa45ff0de6bcb0e33112d50dfaec0b1b6ef91e8 create mode 100644 tests/fuzzing_corpus/adc83b19e793491b1c6ea0fd8b46cd9f32e592fc create mode 100644 tests/fuzzing_corpus/b2fa37e59976954286952381d5211bbb3c8fc956 create mode 100644 tests/fuzzing_corpus/b58ca14467ee550be62f7faf427f8c53cf87048a create mode 100644 tests/fuzzing_corpus/ba1894f2eb0cd7a1c4d46159f7a3362d8aca5a60 create mode 100644 tests/fuzzing_corpus/c4c5f1ca35a2ae671e09b47ffb097961bf0dcfdd create mode 100644 tests/fuzzing_corpus/c9ccfa809c545457d5d7f4883cd6968433e45d88 create mode 100644 tests/fuzzing_corpus/ce2dde27bf8c64b3c4b24f016ce6223268e2793e create mode 100644 tests/fuzzing_corpus/e08e55f778ac334cfa0363e2097e09b9453b688a create mode 100644 tests/fuzzing_corpus/e0d9f662a80ad6e58b171ab3900d13ffe3432a00 create mode 100644 tests/fuzzing_corpus/e404d68ee93c09d5854eec3de74646d9f102b6c0 create mode 100644 tests/fuzzing_corpus/e5dc8c9dc7792f35652632d52e115ba28db22bad create mode 100644 tests/fuzzing_corpus/e821c94f6432fb032a37f36d8dc591222f53eede create mode 100644 tests/fuzzing_corpus/eeec751d0c2a64feabb3ea79cd110024455f838e create mode 100644 tests/fuzzing_corpus/f70eaf8d76e1326bb3a7323c7902a11fc75b5b5d create mode 100644 tests/fuzzing_corpus/f9432a85e0c888d3422a1a43147793377de20a13 create mode 100644 tests/fuzzing_corpus/fabe29cae4c17ab9174674894e0c45ac1a844533 diff --git a/tests/CMakeLists.txt b/tests/CMakeLists.txt index 3a6f47d0..106cd2b9 100644 --- a/tests/CMakeLists.txt +++ b/tests/CMakeLists.txt @@ -108,3 +108,23 @@ add_test(test_fingerprint ${TEST_PATH}/test_fingerprint) add_executable(test_device_consistency test_device_consistency.c ${common_SRCS}) target_link_libraries(test_device_consistency ${LIBS}) add_test(test_device_consistency ${TEST_PATH}/test_device_consistency) + +# Build the fuzzer executable +find_package(Check 0.9.10 REQUIRED) +find_package(OpenSSL 1.0 REQUIRED) +set(LIBS + ${CHECK_LDFLAGS} + ${OPENSSL_LIBRARIES} + signal-protocol-c +) +add_executable(fuzzer "fuzz_target.c" "test_common_openssl.c") +target_link_libraries(fuzzer ${LIBS}) +set_target_properties(fuzzer + PROPERTIES COMPILE_FLAGS "-fsanitize=fuzzer-no-link,address" +) +set_target_properties(fuzzer + PROPERTIES LINK_FLAGS "-fsanitize=fuzzer,address -z muldefs" +) + +# And run it for 2048 iterations as part of the test suite (should take at most a few seconds) to ensure it works +add_test(test_fuzzer ${TEST_PATH}/fuzzer -use_value_profile=1 -use_memmem=1 -use_cmp=1 -runs=2048) \ No newline at end of file diff --git a/tests/fuzz_target.c b/tests/fuzz_target.c new file mode 100644 index 00000000..ebcc96cd --- /dev/null +++ b/tests/fuzz_target.c @@ -0,0 +1,138 @@ +#include "../src/protocol.c" +#include "../src/protocol.h" +#include "../src/session_builder.h" +#include "../src/session_cipher.h" +#include "../src/signal_protocol.h" +#include "test_common.c" +#include "test_common.h" +#include +#include +#include +#include + +signal_context *global_context; + +static signal_protocol_address alice_address = {"+14159998888", 12, 1}; + +static signal_protocol_address bob_address = {"+14151231234", 12, 1}; + +ec_key_pair *bob_signed_pre_key; +int32_t bob_signed_pre_key_id; + +// Fuzz the decrypt routine with Data and Size +extern int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) { + int result = 0; + + // Create a new context + result = signal_context_create(&global_context, 0); + assert(result == 0); + + // Set up a test crypto provider using OpenSSL + setup_test_crypto_provider(global_context); + + // Create Bob's data store + signal_protocol_store_context *bob_store = 0; + setup_test_store_context(&bob_store, global_context); + + // Register Bob + uint32_t bob_local_registration_id = 0; + result = signal_protocol_identity_get_local_registration_id( + bob_store, &bob_local_registration_id); + assert(result == 0); + + // Create his keys + ec_key_pair *bob_pre_key_pair = 0; + result = curve_generate_key_pair(global_context, &bob_pre_key_pair); + assert(result == 0); + + ec_key_pair *bob_signed_pre_key_pair = 0; + result = curve_generate_key_pair(global_context, &bob_signed_pre_key_pair); + assert(result == 0); + + ratchet_identity_key_pair *bob_identity_key_pair = 0; + result = signal_protocol_identity_get_key_pair(bob_store, &bob_identity_key_pair); + assert(result == 0); + + signal_buffer *bob_signed_pre_key_public_serialized = 0; + result = ec_public_key_serialize(&bob_signed_pre_key_public_serialized, + ec_key_pair_get_public(bob_signed_pre_key_pair)); + assert(result == 0); + + signal_buffer *bob_signed_pre_key_signature = 0; + result = curve_calculate_signature( + global_context, &bob_signed_pre_key_signature, + ratchet_identity_key_pair_get_private(bob_identity_key_pair), + signal_buffer_data(bob_signed_pre_key_public_serialized), + signal_buffer_len(bob_signed_pre_key_public_serialized)); + assert(result == 0); + + session_pre_key_bundle *bob_pre_key = 0; + result = session_pre_key_bundle_create( + &bob_pre_key, bob_local_registration_id, + 1, /* device ID */ + 31337, /* pre key ID */ + ec_key_pair_get_public(bob_pre_key_pair), + 22, /* signed pre key ID */ + ec_key_pair_get_public(bob_signed_pre_key_pair), + signal_buffer_data(bob_signed_pre_key_signature), + signal_buffer_len(bob_signed_pre_key_signature), + ratchet_identity_key_pair_get_public(bob_identity_key_pair)); + assert(result == 0); + + // And add Bob's pre keys to his data store + session_pre_key *bob_pre_key_record = 0; + result = session_pre_key_create( + &bob_pre_key_record, session_pre_key_bundle_get_pre_key_id(bob_pre_key), + bob_pre_key_pair); + assert(result == 0); + + result = signal_protocol_pre_key_store_key(bob_store, bob_pre_key_record); + assert(result == 0); + + session_signed_pre_key *bob_signed_pre_key_record = 0; + result = session_signed_pre_key_create( + &bob_signed_pre_key_record, 22, time(0), bob_signed_pre_key_pair, + signal_buffer_data(bob_signed_pre_key_signature), + signal_buffer_len(bob_signed_pre_key_signature)); + assert(result == 0); + + result = signal_protocol_signed_pre_key_store_key(bob_store, + bob_signed_pre_key_record); + assert(result == 0); + + session_cipher *bob_session_cipher = 0; + result = session_cipher_create(&bob_session_cipher, bob_store, &alice_address, + global_context); + assert(result == 0); + + // Start of the actual fuzzing, attempt to deserialize the input data + pre_key_signal_message *incoming_message_bad = 0; + result = pre_key_signal_message_deserialize( + &incoming_message_bad, Data, Size, global_context); + if (result != 0) { + goto done; + } + + // And if it deserialized okay, then decrypt it + signal_buffer *plaintext = 0; + result = session_cipher_decrypt_pre_key_signal_message( + bob_session_cipher, incoming_message_bad, 0, &plaintext); + + // Then free everything + signal_buffer_free(plaintext); +done: + session_cipher_free(bob_session_cipher); + SIGNAL_UNREF(incoming_message_bad); + SIGNAL_UNREF(bob_pre_key); + SIGNAL_UNREF(bob_pre_key_pair); + SIGNAL_UNREF(bob_signed_pre_key_pair); + SIGNAL_UNREF(bob_identity_key_pair); + SIGNAL_UNREF(bob_signed_pre_key_record); + SIGNAL_UNREF(bob_pre_key_record); + signal_buffer_free(bob_signed_pre_key_public_serialized); + signal_buffer_free(bob_signed_pre_key_signature); + signal_protocol_store_context_destroy(bob_store); + signal_context_destroy(global_context); + + return 0; +} diff --git a/tests/fuzzing_corpus/008dc40e8e940554a2d99341f9e9e9d739d58c84 b/tests/fuzzing_corpus/008dc40e8e940554a2d99341f9e9e9d739d58c84 new file mode 100644 index 0000000000000000000000000000000000000000..a55fc3a893859a68ac02bf7ab8f78bb7ba0905fa GIT binary patch literal 68 zcmXpOQe?du{yBSr(IwkW{Qs*SziqlIJ!6x4f#JmEwy#Sy78$8lOG*8Q0RCfl4vD^7 VTV9~O>3;1^!>K`Cib@OyVgRE}B2EAR literal 0 HcmV?d00001 diff --git a/tests/fuzzing_corpus/1114fc59b3d34dc14c751ac4197e83ae806279c9 b/tests/fuzzing_corpus/1114fc59b3d34dc14c751ac4197e83ae806279c9 new file mode 100644 index 00000000..2bdb51b5 --- /dev/null +++ b/tests/fuzzing_corpus/1114fc59b3d34dc14c751ac4197e83ae806279c9 @@ -0,0 +1 @@ +Çbüý \ No newline at end of file diff --git a/tests/fuzzing_corpus/1a1debc82fcee952eac78f6cea0e0473b9c6f70f b/tests/fuzzing_corpus/1a1debc82fcee952eac78f6cea0e0473b9c6f70f new file mode 100644 index 0000000000000000000000000000000000000000..579bf1548f61bb4940f7b10fcc5afbed639671c2 GIT binary patch literal 173 zcmV;e08;-m5+MapQ`gzTlQ|~LYXV%LG|IS9szka|Md4RT+B2*F6^l9=Aq7e?6WrRK zIQdYlc7}Zaz(09&&t*l9atCxJl2}yUW;7yVGYTOEw5UZ{qz^Lj|He{(2nZNt5Gfb{A}|5dEPa&bMEG4NX`Tp`tdEUx@|8MGn7oMu;h`$uT!-4Y bE#47f|CYAu5Knh}{b7hP3D{RCgncjU;qFQ8v?HY literal 0 HcmV?d00001 diff --git a/tests/fuzzing_corpus/1ca45ddc9268ab0266eaaf94b03b7b33d61cbc67 b/tests/fuzzing_corpus/1ca45ddc9268ab0266eaaf94b03b7b33d61cbc67 new file mode 100644 index 0000000000000000000000000000000000000000..1d16f803c051fd9eb5ebfc80a04e3a564adf977d GIT binary patch literal 173 zcmV;e08;-m5+McISMzJ2GSWS=5C3}O?SfSsn6f9wG?Ax0>vbriG9`N&AqD0DlIgB# zH^%YYI*x}_>SqVS6|Hx0E3)5x*)f$;iXkFmGfE)^%FJ@~I^%4oL{ioO0009nDC|S# z+630oy&0XE2B4uN5C|9mA~544y3})X2^v>7Jh_A651gg;y_XdWo`lDYTvwo35bk7S b5DyHf7s-&%eU<)}Yhg5ABS}^$gncj;Vj@e2 literal 0 HcmV?d00001 diff --git a/tests/fuzzing_corpus/1db1186b02fe767030eb819a325ea116ceba23a5 b/tests/fuzzing_corpus/1db1186b02fe767030eb819a325ea116ceba23a5 new file mode 100644 index 0000000000000000000000000000000000000000..870092b6e7121fd0e5f5017add06988a7cfef9b5 GIT binary patch literal 173 zcmV;e08;-m5+McISF>xNGSWSw5C3}O?SfSsn6f9wG?Ax0>vbriGbMW(AqD0DlIgB# zHpcPXI*x}Mn6f9wG?903E3)5x(J_@$iXkFmGYTOE%FJujI^%4oL{b3O0009nDC|S# z+630oy&0XE2B4uN5Goh|A}|S`*5f0()N^wQ8do$txr6BsoTdK@P=v>fTvwo35bk7S b5DyHf7s-&%eU<)}Yhg8BBS}^$gncj;`0Prk literal 0 HcmV?d00001 diff --git a/tests/fuzzing_corpus/2579ae3fb00ff31ac8af27ee8bfb2cd2acbb6c9f b/tests/fuzzing_corpus/2579ae3fb00ff31ac8af27ee8bfb2cd2acbb6c9f new file mode 100644 index 0000000000000000000000000000000000000000..86913e424995b99454a07714b102522358df5fd2 GIT binary patch literal 11 ScmXpOVvu4`V$i5H5CZ@Q83Ano literal 0 HcmV?d00001 diff --git a/tests/fuzzing_corpus/296da42603380864f3e5e1794c101996f10850f1 b/tests/fuzzing_corpus/296da42603380864f3e5e1794c101996f10850f1 new file mode 100644 index 0000000000000000000000000000000000000000..0033897d67ebcfd2ca3d19a6c1f4e1e5e17211d2 GIT binary patch literal 9 QcmXpOVvu4`Vla>f00aX7%>V!Z literal 0 HcmV?d00001 diff --git a/tests/fuzzing_corpus/2dbfc8db8813b6a5ddd2d2213c9b5f4bc7c9bf86 b/tests/fuzzing_corpus/2dbfc8db8813b6a5ddd2d2213c9b5f4bc7c9bf86 new file mode 100644 index 00000000..9b5e546e --- /dev/null +++ b/tests/fuzzing_corpus/2dbfc8db8813b6a5ddd2d2213c9b5f4bc7c9bf86 @@ -0,0 +1 @@ +3!®uïÁ$7Ž#âºJºµLqªUp Eς׫Õ. áN!TlÅ'„ÍüŸžRÇ{‰‚‘D«Ç6|ºFÁfê"#1ý|›¼±·ŸÇ& 5Ä“Èéõ<ñ@@üŸžRÇ{‰„}0 \ No newline at end of file diff --git a/tests/fuzzing_corpus/30ac69e3dabf0406926ccdfc1cd69895fc27b225 b/tests/fuzzing_corpus/30ac69e3dabf0406926ccdfc1cd69895fc27b225 new file mode 100644 index 00000000..5782bd4d --- /dev/null +++ b/tests/fuzzing_corpus/30ac69e3dabf0406926ccdfc1cd69895fc27b225 @@ -0,0 +1 @@ +p33 \ No newline at end of file diff --git a/tests/fuzzing_corpus/486d37c15d929ec2bb4a679dca89967eeaa2db5e b/tests/fuzzing_corpus/486d37c15d929ec2bb4a679dca89967eeaa2db5e new file mode 100644 index 0000000000000000000000000000000000000000..34b0f5a3f247c7686680aba022f94e2e78fd9632 GIT binary patch literal 11 ScmXr!uoYsEVo+i*kOlw--~kc< literal 0 HcmV?d00001 diff --git a/tests/fuzzing_corpus/4befa5410a3f027099d8e4457031a063c04cca78 b/tests/fuzzing_corpus/4befa5410a3f027099d8e4457031a063c04cca78 new file mode 100644 index 00000000..6f7ec1e2 --- /dev/null +++ b/tests/fuzzing_corpus/4befa5410a3f027099d8e4457031a063c04cca78 @@ -0,0 +1 @@ +p \ No newline at end of file diff --git a/tests/fuzzing_corpus/4e5ba2822fcce491d5e7b5bdb620ad367a8bb737 b/tests/fuzzing_corpus/4e5ba2822fcce491d5e7b5bdb620ad367a8bb737 new file mode 100644 index 0000000000000000000000000000000000000000..ce01c8e2cd63522809bb20525d13060e2fc9bb1b GIT binary patch literal 175 zcmV;g08sxk2muly1=&~gYoIdHJ+cq~dgJYaRU4SHC&x6Ar#1+ zL+089*3rEgotXxpp(GFp7yu$L37^*EBf8Xca|s$(H$1t6;SXS100960|NjG+_Pv)C d3!a3>j9gcsSrG1({+4TDG+rY~Rw#shFczCYO#lD@ literal 0 HcmV?d00001 diff --git a/tests/fuzzing_corpus/540645e96d98248ac2c6ba6be292d37f4f4b96d2 b/tests/fuzzing_corpus/540645e96d98248ac2c6ba6be292d37f4f4b96d2 new file mode 100644 index 0000000000000000000000000000000000000000..f92dbbb703a07901592e30d567407323f71546d3 GIT binary patch literal 88 zcmV-e0H^;m5+McISMzJ2GSWS=5C3}O?SfSsn6f9wG?Ax0>vbriGbMW(AqD0DlIgB# uH^%YYI*x}_>SqVS6|Hx0E3)5x*>jariXkEm0REP1VKiPNNmeL?eJ~afqbCLc literal 0 HcmV?d00001 diff --git a/tests/fuzzing_corpus/59ed132cbf0dfe42960518ddbf5991811c00bebc b/tests/fuzzing_corpus/59ed132cbf0dfe42960518ddbf5991811c00bebc new file mode 100644 index 0000000000000000000000000000000000000000..75c15de30a220fb9f9a9d8565fccc9ba72563a1d GIT binary patch literal 175 zcmV;g08sxk2yGG}1=&~gYoIdHJ+cq~dgB1MRU4SHC&x6Ar#j9gcs dSrG1IV-PS5s29mE&wXAamX-cVRw#shFcyD)Oicg) literal 0 HcmV?d00001 diff --git a/tests/fuzzing_corpus/5f0b215256c0b4ffd2566884d42ed36c540a5523 b/tests/fuzzing_corpus/5f0b215256c0b4ffd2566884d42ed36c540a5523 new file mode 100644 index 0000000000000000000000000000000000000000..980d15b9b1c7d860f69629f0636382140a39d6c1 GIT binary patch literal 171 zcmV;c095}o5+Mby9(C`*BsY#D;<`%0wM=2E5>*^<4Mop_*QM1ipy5s$Aq7-y#V3T# z{GXmu#~Y7(i3Sn`f{{e4$2NSrM!|t*>K`ItGYTQ}@`jcjqmM>>`bf_JLKB<3vA3V= z{tclveG@}$#aH-NPyiw@-B6JL#3qu}@5d$!HN=z1>GeF2@dQAGge9Q|8h2KD1~x}B ZR9eA6gOiN8g~5dpA71j}IVgmEFczOiOh^C# literal 0 HcmV?d00001 diff --git a/tests/fuzzing_corpus/5fccb36859573de696d5a9fb996369b8f4685d6d b/tests/fuzzing_corpus/5fccb36859573de696d5a9fb996369b8f4685d6d new file mode 100644 index 0000000000000000000000000000000000000000..71bae661e2e4765df0743ab9230d14d93bf37748 GIT binary patch literal 173 zcmV;e08;-m5+McISMzJ2GSWS=5C3}O?SfSsn6f9wG?Ax0>vbriG9`N&AqD0D2><{9 zH^%YYI*x}_>SqVS6|Hx0E3)5x*)f$;iXkFmGYTOE%FJ@~I^%4oL{ioO0009nDC|S# z+630oy&0XE2B4uN5Lg%hA}|S`*5f0()N^wQ8dou@NdG9`N&AqD0DlIgB# zH^%YYI*x}_>SqVS6|HxT)J-6L*)f$;iXkFmGYTOE%FJ^7I^%4oL{ioO0009nDC|S# z+630oy&0XE2B4uN5cuiSqVS6|Hx8E3)5x**BF^iXS3kGYTOE%FJ@~I^%4oL{ioO0009nDC|S# z+60!-y&0XE2B4uN5K|ZcA}|S`*5f0))N^wQR~k1wxr5;ky_XdWo`lDYTvwo3@DZDw b@9^_g7s-%MeU<)}Yhg5ABS}^$gncj;uuV&^ literal 0 HcmV?d00001 diff --git a/tests/fuzzing_corpus/6c7538fa04ef67015b578f7eb47d22e10c7f257f b/tests/fuzzing_corpus/6c7538fa04ef67015b578f7eb47d22e10c7f257f new file mode 100644 index 00000000..74b643a3 --- /dev/null +++ b/tests/fuzzing_corpus/6c7538fa04ef67015b578f7eb47d22e10c7f257f @@ -0,0 +1 @@ +:x \ No newline at end of file diff --git a/tests/fuzzing_corpus/6d143d74defecd65e92483b19d4387d582626e01 b/tests/fuzzing_corpus/6d143d74defecd65e92483b19d4387d582626e01 new file mode 100644 index 00000000..2d823236 --- /dev/null +++ b/tests/fuzzing_corpus/6d143d74defecd65e92483b19d4387d582626e01 @@ -0,0 +1 @@ +>07 \ No newline at end of file diff --git a/tests/fuzzing_corpus/709dcd9abf7449b5449a344223707bbf4e0a73fd b/tests/fuzzing_corpus/709dcd9abf7449b5449a344223707bbf4e0a73fd new file mode 100644 index 0000000000000000000000000000000000000000..cae35f50bdf9d47bf224ca9b17ca33742c5998db GIT binary patch literal 173 zcmV;e08;-m5+McISMzJ2GSWS=5C3}O?SfSsn6f9wG?Ax0>vbriGbMW(AqD0DlIcrn zHpcPXI*x}_>SqVS6|Hx0E3)5x*)f$;iXkFmGYTOE%FJ@qI^%4oL{i=W0009nDC|S# z)*0HJ1ijIj2B4uN5H}bAA}|S`*5f0()N`Dr_Pv)C|NsC0|NjG+3!a3>j9gcsSrG1I b5DyHf7s-&%eU<)}YheKZ0000000A%-#Fe{(2nZNt5G@!0A}|5dEPa&bMEG54C!PqEtdEUx@|8MGn7oMu;h`$u fT!-4YE#47f|CYAu5Knh}{b7hO3D{RCgncj;67^32 literal 0 HcmV?d00001 diff --git a/tests/fuzzing_corpus/8055db73d78783ce3787c1bf2a1e05ed440d1a3d b/tests/fuzzing_corpus/8055db73d78783ce3787c1bf2a1e05ed440d1a3d new file mode 100644 index 00000000..9960a803 --- /dev/null +++ b/tests/fuzzing_corpus/8055db73d78783ce3787c1bf2a1e05ed440d1a3d @@ -0,0 +1 @@ +üý \ No newline at end of file diff --git a/tests/fuzzing_corpus/825189f8cadaeeb0973e4e3f8cf9a0375760c285 b/tests/fuzzing_corpus/825189f8cadaeeb0973e4e3f8cf9a0375760c285 new file mode 100644 index 0000000000000000000000000000000000000000..0c6fdb4df066e35480c579fd87fd690d816e5b6b GIT binary patch literal 177 zcmV;i08ali2vbriHYIx+AqD0D zlIgB#H^%YYI*x}_>SwJ76~cFLE3)5x*)f$;iXkFmGYTOE%FJ@qI^%4oL{ioO0009n zDC|S#)*0HJ1ijIj2B4uN5GNP_A}|S`*5f0()N^wQ8do$txr5;koTc`?mlX@1gvX3r fSD;xC?qm=T45-4-eU<)}Xkh^W0000000A%-<%LLL literal 0 HcmV?d00001 diff --git a/tests/fuzzing_corpus/87691f59d4490f9445ea36ff79e4dd6e7fa17d3d b/tests/fuzzing_corpus/87691f59d4490f9445ea36ff79e4dd6e7fa17d3d new file mode 100644 index 0000000000000000000000000000000000000000..c70f3b3a9ecce2f4e5af8a71de03c425f3afc930 GIT binary patch literal 173 zcmV;e08;-m5+MapQ`gzTlQ|~LYXV%LG|IS9szka|Md4RT+B2*F6^l9=Aq7e?6WrRK zIQdYlc7}Zaz(09&&t*l9atCxJl2}yUW;7yVGYTOEw5UZ{qz^Lj|He{(2nZNt5Gfb{A}|5dEPa&bMEG4NX`Tp`tdEUx@|8MGn7oMu;h`$uT!-4Y bE#47f|CYAu5Knh}{b7hO3D{RCgncj;!rx61 literal 0 HcmV?d00001 diff --git a/tests/fuzzing_corpus/8e5f97e4333da16317d0e0bc393d3645e89d2b86 b/tests/fuzzing_corpus/8e5f97e4333da16317d0e0bc393d3645e89d2b86 new file mode 100644 index 0000000000000000000000000000000000000000..878a36c8a6436ba5d0e60adb4c24b832b095fe20 GIT binary patch literal 173 zcmV;e08;-m5+MapQ`gzTlQ|~LYXV%LU&^>qszka|Md4RT+BB>G6^l9=Aq7g$>?0+f zIQdYlc7}Zaz(09&&uvAHatCxJl2}yUW;7yVGYTOEw5UZ{qz^Lj|He{(2nZNt5C9keA}|5dEPaJDNR;M8_+2Myo(Pq!kBxCnn7oMu;h`$uT!-4Y bE#47f|CYAu5Knh}{b7hO3D{RCgncj@uCz=< literal 0 HcmV?d00001 diff --git a/tests/fuzzing_corpus/8f75da00fd98ff6da5711fb2c6875ddb60289b3c b/tests/fuzzing_corpus/8f75da00fd98ff6da5711fb2c6875ddb60289b3c new file mode 100644 index 0000000000000000000000000000000000000000..33c179e383c135dcbe8cce1b3c1b55ae470d96be GIT binary patch literal 173 zcmV;e08;-m5+McISMzJ2GSWS=5C3}O?SfSsn6f9wG?Ax0>vbriGbMW(AqD0DlIgB# zH^%YYI*x}_>SqVS6|Hx0E3)5x*>jariXkFmCJG@1%FJ@qI^%4oL{ioO0009nDC|S# z+630oy&0XE2B4uN5C|9mA}|S`*5h+?2^v>7Jh_A651gg;y_XdWo`lDYTvwo35bk7S b5DyHf7s-&%eU<)}Yhg5ABS}^$gncj;NMTDV literal 0 HcmV?d00001 diff --git a/tests/fuzzing_corpus/9321f76b59701e5827db764920518443b0eb2db2 b/tests/fuzzing_corpus/9321f76b59701e5827db764920518443b0eb2db2 new file mode 100644 index 0000000000000000000000000000000000000000..19ae6ccb0ef072d7581a5da92d6a2cded8cb4993 GIT binary patch literal 7 OcmXpOVvu4m5CZ@Lwg9F8 literal 0 HcmV?d00001 diff --git a/tests/fuzzing_corpus/97a7cb37d735cfd4558c1c872f689ee721a4c72c b/tests/fuzzing_corpus/97a7cb37d735cfd4558c1c872f689ee721a4c72c new file mode 100644 index 00000000..baeb7d0b --- /dev/null +++ b/tests/fuzzing_corpus/97a7cb37d735cfd4558c1c872f689ee721a4c72c @@ -0,0 +1 @@ +/ð \ No newline at end of file diff --git a/tests/fuzzing_corpus/984d42d7be8180ff0856c0ed64dbc4520ad8bae0 b/tests/fuzzing_corpus/984d42d7be8180ff0856c0ed64dbc4520ad8bae0 new file mode 100644 index 0000000000000000000000000000000000000000..58eda1fd88a1a1d8c73654695baaefc946a859bf GIT binary patch literal 177 zcmV;i08ali2vbriHYIx+AqD0D zlIgB#H^%YYI*x}_>SqVS6|Hx0E3)5x*)f$;iXkFmGYTOE%FJ@qI^%4oL{ioO0009n zDC|S#)*0HJ1ijIj2B4uN5GNP_A}|S`*5f0()N^wQ8do$txr5;koTc`?mlX@1gvX3r fSD;xC?qm=T45-4-eU<)}YheKZ0000000A%-kMc_& literal 0 HcmV?d00001 diff --git a/tests/fuzzing_corpus/a08294559f9435ea859f09ea0f6f14ff59374649 b/tests/fuzzing_corpus/a08294559f9435ea859f09ea0f6f14ff59374649 new file mode 100644 index 0000000000000000000000000000000000000000..706c9768926d845661cd209baaffe9a6a1ee0302 GIT binary patch literal 177 zcmV;i08ali2e{(2nZNt5G)t~A}|5dEPa&bMEG4NX`Tp`tdEUx@|8MGn7oMu;h`$u fT!-4YE#47f|CYAu5Knh}{b7hO3D{RCgncj;ABRsN literal 0 HcmV?d00001 diff --git a/tests/fuzzing_corpus/aaa45ff0de6bcb0e33112d50dfaec0b1b6ef91e8 b/tests/fuzzing_corpus/aaa45ff0de6bcb0e33112d50dfaec0b1b6ef91e8 new file mode 100644 index 0000000000000000000000000000000000000000..d0cc489138a8266fe64de6e0762f1bfd463661f9 GIT binary patch literal 75 zcmV-R0JQ%z5+McISMzJ2Gtxb>5C3}O?SfSsn6f9wG?Ax0>vbriG9`N&AqD0DlIgB# hH^%YYI*x}_>SqVS6|Hx0E3)5x*)f$;iXkEZFcv5*A=&@{ literal 0 HcmV?d00001 diff --git a/tests/fuzzing_corpus/adc83b19e793491b1c6ea0fd8b46cd9f32e592fc b/tests/fuzzing_corpus/adc83b19e793491b1c6ea0fd8b46cd9f32e592fc new file mode 100644 index 00000000..8b137891 --- /dev/null +++ b/tests/fuzzing_corpus/adc83b19e793491b1c6ea0fd8b46cd9f32e592fc @@ -0,0 +1 @@ + diff --git a/tests/fuzzing_corpus/b2fa37e59976954286952381d5211bbb3c8fc956 b/tests/fuzzing_corpus/b2fa37e59976954286952381d5211bbb3c8fc956 new file mode 100644 index 0000000000000000000000000000000000000000..8647a94c8116429ecdbf9b6a5cf3660134fd2ff7 GIT binary patch literal 12 ScmZo-(5(f6GYgEGE&%`^bOn|G literal 0 HcmV?d00001 diff --git a/tests/fuzzing_corpus/b58ca14467ee550be62f7faf427f8c53cf87048a b/tests/fuzzing_corpus/b58ca14467ee550be62f7faf427f8c53cf87048a new file mode 100644 index 0000000000000000000000000000000000000000..2b21f1c67cf351137bc27f34a68359df6849a6ee GIT binary patch literal 173 zcmV;e08;-m5+Mby9(C`*BsY#D;<`%0wM=2E5>*^<4Mop_*QM1ipy5s$Aq7-y#V3T# z{GXmu#~Y7(i3Sn`f{{e4$2WYsM!|t*>K`IvGYTQ}@`jfkqmM?m6aPXm{d}9ePe@=C z0rFnMeG@-y#aH-N5C9keA~4-hkpRRdlGX3WCX>kN^*oUA1VDs@C7}lzcY0O^Hb*j4 bTERerlZ?5A!G#eYUVHJ>^5Qutgncj;%YRIG literal 0 HcmV?d00001 diff --git a/tests/fuzzing_corpus/ba1894f2eb0cd7a1c4d46159f7a3362d8aca5a60 b/tests/fuzzing_corpus/ba1894f2eb0cd7a1c4d46159f7a3362d8aca5a60 new file mode 100644 index 0000000000000000000000000000000000000000..19215e922112dd7e4e553f4cf9be8e08d90b1827 GIT binary patch literal 76 zcmXpOQe<5xSNi^-ig};%qg`Hyw)!Nl5(vbriG9`N&AqD0DlIgB# zH^%YYI*x~#>SqVS6|Hx0E3)5x*)f$;BOxMUGYTOE%FK-m#T=7ZyRFs$0009nDC|S# z+630oy&0XE2B4uN5K$NaA}|S;*5f0()N^wQ8dovbriGbMW(AqD0DlIgB# sH^%YYI*x}_>SqVS6|Hx0E3)5x*)f$;iXkEk<0zJEVKiP=eJDvV7QiJYDgXcg literal 0 HcmV?d00001 diff --git a/tests/fuzzing_corpus/ce2dde27bf8c64b3c4b24f016ce6223268e2793e b/tests/fuzzing_corpus/ce2dde27bf8c64b3c4b24f016ce6223268e2793e new file mode 100644 index 0000000000000000000000000000000000000000..6671def6dd70240f7c1bc7424eb295475e82e35f GIT binary patch literal 11 ScmXRAG8R%~P>Wgc*8~6$4Ffy? literal 0 HcmV?d00001 diff --git a/tests/fuzzing_corpus/e08e55f778ac334cfa0363e2097e09b9453b688a b/tests/fuzzing_corpus/e08e55f778ac334cfa0363e2097e09b9453b688a new file mode 100644 index 0000000000000000000000000000000000000000..b7cc23002d0cf8b639a2b1e23c189069f644af68 GIT binary patch literal 7 OcmZQzXkt)dU;qFD{Q#!` literal 0 HcmV?d00001 diff --git a/tests/fuzzing_corpus/e0d9f662a80ad6e58b171ab3900d13ffe3432a00 b/tests/fuzzing_corpus/e0d9f662a80ad6e58b171ab3900d13ffe3432a00 new file mode 100644 index 0000000000000000000000000000000000000000..00bd0987e41ece37ea9e91dac543364279d233a2 GIT binary patch literal 13 ScmZQzaA#m>VrT*a1|a|tU;^X- literal 0 HcmV?d00001 diff --git a/tests/fuzzing_corpus/e404d68ee93c09d5854eec3de74646d9f102b6c0 b/tests/fuzzing_corpus/e404d68ee93c09d5854eec3de74646d9f102b6c0 new file mode 100644 index 0000000000000000000000000000000000000000..46821a383e0464e2593d0bdfec1673943fd778fb GIT binary patch literal 175 zcmV;g08sxk2muly1=&~gYoIdHJ+cq~dgJYaRU4SHC&x6Ar#1+ zL+089*3rEgotXxpp(GFp7yu$L37^*EBf8Xca|s$(H$1t6;SXS100960|NjG+_Pv)C d3!a3>j9gcsSrG1({+4TDG+rY~Rw#shFcx4$OlbfB literal 0 HcmV?d00001 diff --git a/tests/fuzzing_corpus/e5dc8c9dc7792f35652632d52e115ba28db22bad b/tests/fuzzing_corpus/e5dc8c9dc7792f35652632d52e115ba28db22bad new file mode 100644 index 0000000000000000000000000000000000000000..a8346e15d31212c02f45e1b870f672180ef486bb GIT binary patch literal 177 zcmV;i08ali2e{(2nZNt5G@!0A}|5dEPa&bMEG4NX`Tp`tdEUx@|8MGn7oMu;h`$u fT!-4YE#47f|CYAu5Knh}{b7hO3D{RCgncj;60=VL literal 0 HcmV?d00001 diff --git a/tests/fuzzing_corpus/e821c94f6432fb032a37f36d8dc591222f53eede b/tests/fuzzing_corpus/e821c94f6432fb032a37f36d8dc591222f53eede new file mode 100644 index 0000000000000000000000000000000000000000..5c157bda4e541b92035471e1adf240764ea08850 GIT binary patch literal 173 zcmV;e08;-m5+Mby9(C`*BsY#D;<`%0wM=oU5>*^<4Mop_*Q?bopy9C^Aq7-y#V3T# z{GXmu#~Y7(i3Sn`f{{e4$2NSrM!|t*>K`IvGYTQ}@`jcjqm4$k6aPXn{d}9evA3V= z{tclveG@}$#aH-N5C9keDlpwpkpRRdlGX3WCJQvglgR1yJdp7OK!k)Pp${5&Hb*j4 bTERerlZ?5A!G#eYUVHJ>^5Qfogncj;mETU^ literal 0 HcmV?d00001 diff --git a/tests/fuzzing_corpus/eeec751d0c2a64feabb3ea79cd110024455f838e b/tests/fuzzing_corpus/eeec751d0c2a64feabb3ea79cd110024455f838e new file mode 100644 index 0000000000000000000000000000000000000000..99ebf128ea1636bd0a822266651208af8e9acc5f GIT binary patch literal 5 McmcC9U=U&e00I>Ne*gdg literal 0 HcmV?d00001 diff --git a/tests/fuzzing_corpus/f70eaf8d76e1326bb3a7323c7902a11fc75b5b5d b/tests/fuzzing_corpus/f70eaf8d76e1326bb3a7323c7902a11fc75b5b5d new file mode 100644 index 00000000..328677b2 --- /dev/null +++ b/tests/fuzzing_corpus/f70eaf8d76e1326bb3a7323c7902a11fc75b5b5d @@ -0,0 +1 @@ +‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚üý* \ No newline at end of file diff --git a/tests/fuzzing_corpus/f9432a85e0c888d3422a1a43147793377de20a13 b/tests/fuzzing_corpus/f9432a85e0c888d3422a1a43147793377de20a13 new file mode 100644 index 0000000000000000000000000000000000000000..18ee734517469b7eea1745a582ebf1c1a55d2e5e GIT binary patch literal 173 zcmV;e08;-m5+McG6rhyZGScHcvj2Jy?SfSsn6f9wGynqSqVS6|Hx8E3)5x**BF^iXS3kGYTOE%FJ@~I^%4oL{ioO0009nDC|S# z+60!-y&0XE2B4uN5JMOMA}|S`*5f0))N^wQR~k1wxr5;ky_XdWo`lDYTvwo3@DZDw b@9^_g7s-%MeU<)}Yhg5ABS}^$gncj;t0YUG literal 0 HcmV?d00001 diff --git a/tests/fuzzing_corpus/fabe29cae4c17ab9174674894e0c45ac1a844533 b/tests/fuzzing_corpus/fabe29cae4c17ab9174674894e0c45ac1a844533 new file mode 100644 index 00000000..716a0634 --- /dev/null +++ b/tests/fuzzing_corpus/fabe29cae4c17ab9174674894e0c45ac1a844533 @@ -0,0 +1 @@ +1c \ No newline at end of file diff --git a/tests/test_common.c b/tests/test_common.c index 03f95eed..0a96f97f 100644 --- a/tests/test_common.c +++ b/tests/test_common.c @@ -3,6 +3,7 @@ #include #include #include +#include #include "../src/signal_protocol.h" #include "curve.h" @@ -169,7 +170,7 @@ void setup_test_store_context(signal_protocol_store_context **context, signal_co signal_protocol_store_context *store_context = 0; result = signal_protocol_store_context_create(&store_context, global_context); - ck_assert_int_eq(result, 0); + assert(result == 0); setup_test_session_store(store_context); setup_test_pre_key_store(store_context); From 39634295b44c14b2f41c0e2c98dbb286a392c542 Mon Sep 17 00:00:00 2001 From: David Dworken Date: Mon, 18 May 2020 16:58:38 -0700 Subject: [PATCH 2/2] Fix warnings by removing unused variable and importing time.h --- tests/fuzz_target.c | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/tests/fuzz_target.c b/tests/fuzz_target.c index ebcc96cd..f15d1ae1 100644 --- a/tests/fuzz_target.c +++ b/tests/fuzz_target.c @@ -9,13 +9,12 @@ #include #include #include +#include signal_context *global_context; static signal_protocol_address alice_address = {"+14159998888", 12, 1}; -static signal_protocol_address bob_address = {"+14151231234", 12, 1}; - ec_key_pair *bob_signed_pre_key; int32_t bob_signed_pre_key_id;