Changelog-None: Add a test for `codex32_encode()` and
`codex32_secret_decode()` defined in `common/codex32.{c, h}`.
189 lines
5.5 KiB
C
189 lines
5.5 KiB
C
#include "config.h"
|
|
#include <assert.h>
|
|
#include <ccan/ccan/array_size/array_size.h>
|
|
#include <ccan/ccan/tal/str/str.h>
|
|
#include <common/setup.h>
|
|
#include <common/bech32.h>
|
|
#include <common/utils.h>
|
|
#include <common/codex32.h>
|
|
#include <tests/fuzz/libfuzz.h>
|
|
|
|
/* Default mutator defined by libFuzzer */
|
|
size_t LLVMFuzzerMutate(uint8_t *data, size_t size, size_t max_size);
|
|
size_t LLVMFuzzerCustomMutator(uint8_t *fuzz_data, size_t size, size_t max_size,
|
|
unsigned int seed);
|
|
size_t LLVMFuzzerCustomCrossOver(const u8 *in1, size_t in1_size, const u8 *in2,
|
|
size_t in2_size, u8 *out, size_t max_out_size,
|
|
unsigned seed);
|
|
|
|
static const char valid_hrp_chars[] = "acdefghjklmnpqrstuvwxyz";
|
|
|
|
/* Duplicate codex32 structure */
|
|
static struct codex32 *codex32_dup(const tal_t *ctx, const struct codex32 *src)
|
|
{
|
|
struct codex32 *dup = tal(ctx, struct codex32);
|
|
dup->hrp = tal_strdup(dup, src->hrp);
|
|
dup->threshold = src->threshold;
|
|
memcpy(dup->id, src->id, sizeof(dup->id));
|
|
dup->share_idx = src->share_idx;
|
|
dup->payload = tal_dup_arr(dup, u8, src->payload,
|
|
tal_bytelen(src->payload), 0);
|
|
dup->type = src->type;
|
|
return dup;
|
|
}
|
|
|
|
void init(int *argc, char ***argv)
|
|
{
|
|
common_setup("fuzzer");
|
|
}
|
|
|
|
/* Custom mutator with structure-aware and byte-level mutations */
|
|
size_t LLVMFuzzerCustomMutator(uint8_t *fuzz_data, size_t size,
|
|
size_t max_size, unsigned int seed)
|
|
{
|
|
srand(seed);
|
|
char *str = to_string(tmpctx, fuzz_data, size);
|
|
char *fail;
|
|
struct codex32 *parts = codex32_decode(tmpctx, NULL, str, &fail);
|
|
|
|
/* If valid, try structure-aware mutation */
|
|
if (parts) {
|
|
/* Mutate a random component */
|
|
switch(rand() % 3) {
|
|
case 0: /* Mutate threshold to any value */
|
|
parts->threshold = rand();
|
|
break;
|
|
|
|
case 1: /* Mutate ID arbitrarily */
|
|
{
|
|
size_t id_len = sizeof(parts->id) - 1;
|
|
LLVMFuzzerMutate((u8 *)parts->id, id_len, id_len);
|
|
parts->id[id_len] = '\0';
|
|
}
|
|
break;
|
|
|
|
case 2: /* Mutate payload */
|
|
{
|
|
size_t old_size = tal_bytelen(parts->payload);
|
|
tal_resize(&parts->payload, max_size);
|
|
size_t new_size = LLVMFuzzerMutate((u8 *)parts->payload, old_size, max_size);
|
|
tal_resize(&parts->payload, new_size);
|
|
}
|
|
break;
|
|
}
|
|
|
|
/* Always mutate the HRP to ensure it's valid for encoding. */
|
|
char *new_hrp = tal_arr(parts, char, 3);
|
|
new_hrp[0] = valid_hrp_chars[rand() % strlen(valid_hrp_chars)];
|
|
new_hrp[1] = valid_hrp_chars[rand() % strlen(valid_hrp_chars)];
|
|
new_hrp[2] = '\0';
|
|
parts->hrp = new_hrp;
|
|
|
|
char *reencoded;
|
|
const char *err = codex32_secret_encode(tmpctx, parts->hrp, parts->id,
|
|
parts->threshold, parts->payload,
|
|
tal_bytelen(parts->payload), &reencoded);
|
|
if (!err) {
|
|
size_t len = tal_bytelen(reencoded) - 1;
|
|
if (len <= max_size) {
|
|
memcpy(fuzz_data, reencoded, len);
|
|
return len;
|
|
}
|
|
}
|
|
}
|
|
|
|
/* Fallback: byte-level mutation */
|
|
return LLVMFuzzerMutate(fuzz_data, size, max_size);
|
|
}
|
|
|
|
/* Custom crossover with structure-aware recombination */
|
|
size_t LLVMFuzzerCustomCrossOver(const u8 *in1, size_t in1_size, const u8 *in2, size_t in2_size,
|
|
u8 *out, size_t max_out_size, unsigned seed)
|
|
{
|
|
srand(seed);
|
|
char *str1 = to_string(tmpctx, in1, in1_size);
|
|
char *str2 = to_string(tmpctx, in2, in2_size);
|
|
char *fail;
|
|
|
|
/* Decode both inputs */
|
|
struct codex32 *p1 = codex32_decode(tmpctx, NULL, str1, &fail);
|
|
struct codex32 *p2 = codex32_decode(tmpctx, NULL, str2, &fail);
|
|
|
|
/* If both valid, try structure-aware crossover */
|
|
if (p1 && p2) {
|
|
/* Create child by combining parts */
|
|
struct codex32 *child = codex32_dup(tmpctx, p1);
|
|
|
|
/* Choose crossover method */
|
|
switch(rand() % 3) {
|
|
case 0: /* Crossover threshold */
|
|
child->threshold = p2->threshold;
|
|
break;
|
|
|
|
case 1: /* Crossover ID */
|
|
{
|
|
size_t id_len = sizeof(p1->id) - 1;
|
|
cross_over((const u8 *)p1->id, id_len, (const u8 *)p2->id, id_len,
|
|
(u8 *)child->id, id_len, rand());
|
|
child->id[id_len] = '\0';
|
|
}
|
|
break;
|
|
|
|
case 2: /* Crossover payload */
|
|
{
|
|
size_t p1_len = tal_bytelen(p1->payload);
|
|
size_t p2_len = tal_bytelen(p2->payload);
|
|
tal_resize(&child->payload, max_out_size);
|
|
size_t new_payload_len = cross_over(p1->payload, p1_len,
|
|
p2->payload, p2_len,
|
|
(u8 *)child->payload, max_out_size, rand());
|
|
tal_resize(&child->payload, new_payload_len);
|
|
}
|
|
break;
|
|
}
|
|
|
|
/* Always crossover the HRP to ensure it's valid for encoding. */
|
|
char *new_hrp = tal_arr(child, char, 3);
|
|
new_hrp[0] = valid_hrp_chars[rand() % strlen(valid_hrp_chars)];
|
|
new_hrp[1] = valid_hrp_chars[rand() % strlen(valid_hrp_chars)];
|
|
new_hrp[2] = '\0';
|
|
child->hrp = new_hrp;
|
|
|
|
char *reencoded;
|
|
const char *err = codex32_secret_encode(tmpctx, child->hrp, child->id,
|
|
child->threshold, child->payload,
|
|
tal_bytelen(child->payload), &reencoded);
|
|
if (!err) {
|
|
size_t len = strlen(reencoded);
|
|
if (len <= max_out_size) {
|
|
memcpy(out, reencoded, len);
|
|
return len;
|
|
}
|
|
}
|
|
}
|
|
|
|
/* Fallback: byte-level crossover */
|
|
return cross_over(in1, in1_size, in2, in2_size, out, max_out_size, seed);
|
|
}
|
|
|
|
void run(const uint8_t *data, size_t size)
|
|
{
|
|
struct codex32 *c32;
|
|
char *str, *fail, *bip93;
|
|
|
|
str = to_string(tmpctx, data, size);
|
|
|
|
c32 = codex32_decode(tmpctx, NULL, str, &fail);
|
|
assert(c32 || fail);
|
|
|
|
/* codex32_decode can decode HRPs of any length, but codex32_encode
|
|
* requires that strlen(HRP) == 2, so we enforce it here. */
|
|
if (c32 && strlen(c32->hrp) == 2) {
|
|
const char *ret = codex32_secret_encode(tmpctx, c32->hrp, c32->id, c32->threshold,
|
|
c32->payload, tal_bytelen(c32->payload), &bip93);
|
|
assert(!ret && bip93);
|
|
}
|
|
|
|
clean_tmpctx();
|
|
}
|