Skip to content

Commit 4f9618a

Browse files
committed
fuzz
1 parent 44ff7c9 commit 4f9618a

10 files changed

+361
-53
lines changed

fuzz/.gitignore

+1
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,4 @@
11
hfuzz_target
22
target
33
hfuzz_workspace
4+
corpus

fuzz/src/bin/gen_target.sh

+1
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,7 @@ GEN_TEST bolt11_deser
1717
GEN_TEST onion_message
1818
GEN_TEST peer_crypt
1919
GEN_TEST process_network_graph
20+
GEN_TEST process_onion_failure
2021
GEN_TEST refund_deser
2122
GEN_TEST router
2223
GEN_TEST zbase32
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,120 @@
1+
// This file is Copyright its original authors, visible in version control
2+
// history.
3+
//
4+
// This file is licensed under the Apache License, Version 2.0 <LICENSE-APACHE
5+
// or http://www.apache.org/licenses/LICENSE-2.0> or the MIT license
6+
// <LICENSE-MIT or http://opensource.org/licenses/MIT>, at your option.
7+
// You may not use this file except in accordance with one or both of these
8+
// licenses.
9+
10+
// This file is auto-generated by gen_target.sh based on target_template.txt
11+
// To modify it, modify target_template.txt and run gen_target.sh instead.
12+
13+
#![cfg_attr(feature = "libfuzzer_fuzz", no_main)]
14+
#![cfg_attr(rustfmt, rustfmt_skip)]
15+
16+
#[cfg(not(fuzzing))]
17+
compile_error!("Fuzz targets need cfg=fuzzing");
18+
19+
#[cfg(not(hashes_fuzz))]
20+
compile_error!("Fuzz targets need cfg=hashes_fuzz");
21+
22+
#[cfg(not(secp256k1_fuzz))]
23+
compile_error!("Fuzz targets need cfg=secp256k1_fuzz");
24+
25+
extern crate lightning_fuzz;
26+
use lightning_fuzz::process_onion_failure::*;
27+
28+
#[cfg(feature = "afl")]
29+
#[macro_use] extern crate afl;
30+
#[cfg(feature = "afl")]
31+
fn main() {
32+
fuzz!(|data| {
33+
process_onion_failure_run(data.as_ptr(), data.len());
34+
});
35+
}
36+
37+
#[cfg(feature = "honggfuzz")]
38+
#[macro_use] extern crate honggfuzz;
39+
#[cfg(feature = "honggfuzz")]
40+
fn main() {
41+
loop {
42+
fuzz!(|data| {
43+
process_onion_failure_run(data.as_ptr(), data.len());
44+
});
45+
}
46+
}
47+
48+
#[cfg(feature = "libfuzzer_fuzz")]
49+
#[macro_use] extern crate libfuzzer_sys;
50+
#[cfg(feature = "libfuzzer_fuzz")]
51+
fuzz_target!(|data: &[u8]| {
52+
process_onion_failure_run(data.as_ptr(), data.len());
53+
});
54+
55+
#[cfg(feature = "stdin_fuzz")]
56+
fn main() {
57+
use std::io::Read;
58+
59+
let mut data = Vec::with_capacity(8192);
60+
std::io::stdin().read_to_end(&mut data).unwrap();
61+
process_onion_failure_run(data.as_ptr(), data.len());
62+
}
63+
64+
#[test]
65+
fn run_test_cases() {
66+
use std::fs;
67+
use std::io::Read;
68+
use lightning_fuzz::utils::test_logger::StringBuffer;
69+
70+
use std::sync::{atomic, Arc};
71+
{
72+
let data: Vec<u8> = vec![0];
73+
process_onion_failure_run(data.as_ptr(), data.len());
74+
}
75+
let mut threads = Vec::new();
76+
let threads_running = Arc::new(atomic::AtomicUsize::new(0));
77+
if let Ok(tests) = fs::read_dir("test_cases/process_onion_failure") {
78+
for test in tests {
79+
let mut data: Vec<u8> = Vec::new();
80+
let path = test.unwrap().path();
81+
fs::File::open(&path).unwrap().read_to_end(&mut data).unwrap();
82+
threads_running.fetch_add(1, atomic::Ordering::AcqRel);
83+
84+
let thread_count_ref = Arc::clone(&threads_running);
85+
let main_thread_ref = std::thread::current();
86+
threads.push((path.file_name().unwrap().to_str().unwrap().to_string(),
87+
std::thread::spawn(move || {
88+
let string_logger = StringBuffer::new();
89+
90+
let panic_logger = string_logger.clone();
91+
let res = if ::std::panic::catch_unwind(move || {
92+
process_onion_failure_test(&data, panic_logger);
93+
}).is_err() {
94+
Some(string_logger.into_string())
95+
} else { None };
96+
thread_count_ref.fetch_sub(1, atomic::Ordering::AcqRel);
97+
main_thread_ref.unpark();
98+
res
99+
})
100+
));
101+
while threads_running.load(atomic::Ordering::Acquire) > 32 {
102+
std::thread::park();
103+
}
104+
}
105+
}
106+
let mut failed_outputs = Vec::new();
107+
for (test, thread) in threads.drain(..) {
108+
if let Some(output) = thread.join().unwrap() {
109+
println!("\nOutput of {}:\n{}\n", test, output);
110+
failed_outputs.push(test);
111+
}
112+
}
113+
if !failed_outputs.is_empty() {
114+
println!("Test cases which failed: ");
115+
for case in failed_outputs {
116+
println!("{}", case);
117+
}
118+
panic!();
119+
}
120+
}

fuzz/src/lib.rs

+1
Original file line numberDiff line numberDiff line change
@@ -28,6 +28,7 @@ pub mod onion_hop_data;
2828
pub mod onion_message;
2929
pub mod peer_crypt;
3030
pub mod process_network_graph;
31+
pub mod process_onion_failure;
3132
pub mod refund_deser;
3233
pub mod router;
3334
pub mod zbase32;

fuzz/src/process_onion_failure.rs

+165
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,165 @@
1+
use std::sync::Arc;
2+
3+
use bitcoin::{
4+
key::Secp256k1,
5+
secp256k1::{PublicKey, SecretKey},
6+
};
7+
use lightning::{
8+
blinded_path::BlindedHop,
9+
ln::{
10+
channelmanager::{HTLCSource, PaymentId},
11+
msgs::OnionErrorPacket,
12+
},
13+
routing::router::{BlindedTail, Path, RouteHop, TrampolineHop},
14+
types::features::{ChannelFeatures, NodeFeatures},
15+
util::logger::Logger,
16+
};
17+
18+
// Imports that need to be added manually
19+
use crate::utils::test_logger::{self};
20+
21+
/// Actual fuzz test, method signature and name are fixed
22+
fn do_test<Out: test_logger::Output>(data: &[u8], out: Out) {
23+
let mut read_pos = 0;
24+
macro_rules! get_slice {
25+
($len: expr) => {{
26+
let slice_len = $len as usize;
27+
if data.len() < read_pos + slice_len {
28+
return;
29+
}
30+
read_pos += slice_len;
31+
&data[read_pos - slice_len..read_pos]
32+
}};
33+
}
34+
35+
macro_rules! get_u8 {
36+
() => {
37+
get_slice!(1)[0]
38+
};
39+
}
40+
41+
macro_rules! get_u16 {
42+
() => {
43+
match get_slice!(2).try_into() {
44+
Ok(val) => u16::from_be_bytes(val),
45+
Err(_) => return,
46+
}
47+
};
48+
}
49+
50+
macro_rules! get_u32 {
51+
() => {
52+
match get_slice!(4).try_into() {
53+
Ok(val) => u32::from_be_bytes(val),
54+
Err(_) => return,
55+
}
56+
};
57+
}
58+
59+
macro_rules! get_u64 {
60+
() => {
61+
match get_slice!(8).try_into() {
62+
Ok(val) => u64::from_be_bytes(val),
63+
Err(_) => return,
64+
}
65+
};
66+
}
67+
68+
macro_rules! get_bool {
69+
() => {
70+
get_slice!(1)[0] != 0
71+
};
72+
}
73+
74+
macro_rules! get_pubkey {
75+
() => {
76+
match PublicKey::from_slice(get_slice!(33)) {
77+
Ok(val) => val,
78+
Err(_) => return,
79+
}
80+
};
81+
}
82+
83+
let secp_ctx = Secp256k1::new();
84+
let logger: Arc<dyn Logger> = Arc::new(test_logger::TestLogger::new("".to_owned(), out));
85+
86+
let session_priv = match SecretKey::from_slice(get_slice!(32)) {
87+
Ok(val) => val,
88+
Err(_) => return,
89+
};
90+
91+
let payment_id = match get_slice!(32).try_into() {
92+
Ok(val) => PaymentId(val),
93+
Err(_) => return,
94+
};
95+
96+
let mut hops = Vec::<RouteHop>::new();
97+
let hop_count = get_slice!(1)[0] as usize;
98+
for _ in 0..hop_count {
99+
hops.push(RouteHop {
100+
pubkey: get_pubkey!(),
101+
node_features: NodeFeatures::empty(),
102+
short_channel_id: get_u64!(),
103+
channel_features: ChannelFeatures::empty(),
104+
fee_msat: get_u64!(),
105+
cltv_expiry_delta: get_u32!(),
106+
maybe_announced_channel: get_bool!(),
107+
});
108+
}
109+
110+
let blinded_tail = match get_bool!() {
111+
true => {
112+
let mut trampoline_hops = Vec::<TrampolineHop>::new();
113+
let trampoline_hop_count = get_slice!(1)[0] as usize;
114+
for _ in 0..trampoline_hop_count {
115+
trampoline_hops.push(TrampolineHop {
116+
pubkey: get_pubkey!(),
117+
node_features: NodeFeatures::empty(),
118+
fee_msat: get_u64!(),
119+
cltv_expiry_delta: get_u32!(),
120+
});
121+
}
122+
let mut blinded_hops = Vec::<BlindedHop>::new();
123+
let blinded_hop_count = get_slice!(1)[0] as usize;
124+
for _ in 0..blinded_hop_count {
125+
blinded_hops.push(BlindedHop {
126+
blinded_node_id: get_pubkey!(),
127+
encrypted_payload: get_slice!(get_u8!()).to_vec(),
128+
});
129+
}
130+
Some(BlindedTail {
131+
trampoline_hops,
132+
hops: blinded_hops,
133+
blinding_point: get_pubkey!(),
134+
excess_final_cltv_expiry_delta: get_u32!(),
135+
final_value_msat: get_u64!(),
136+
})
137+
},
138+
false => None,
139+
};
140+
141+
let path = Path { hops, blinded_tail };
142+
143+
let htlc_source = HTLCSource::OutboundRoute {
144+
path,
145+
session_priv,
146+
first_hop_htlc_msat: get_u64!(),
147+
payment_id,
148+
};
149+
150+
let failure_len = get_u16!();
151+
let encrypted_packet = OnionErrorPacket { data: get_slice!(failure_len).into() };
152+
153+
lightning::ln::process_onion_failure(&secp_ctx, &logger, &htlc_source, encrypted_packet);
154+
}
155+
156+
/// Method that needs to be added manually, {name}_test
157+
pub fn process_onion_failure_test<Out: test_logger::Output>(data: &[u8], out: Out) {
158+
do_test(data, out);
159+
}
160+
161+
/// Method that needs to be added manually, {name}_run
162+
#[no_mangle]
163+
pub extern "C" fn process_onion_failure_run(data: *const u8, datalen: usize) {
164+
do_test(unsafe { std::slice::from_raw_parts(data, datalen) }, test_logger::DevNull {});
165+
}

fuzz/targets.h

+1
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@ void bolt11_deser_run(const unsigned char* data, size_t data_len);
1010
void onion_message_run(const unsigned char* data, size_t data_len);
1111
void peer_crypt_run(const unsigned char* data, size_t data_len);
1212
void process_network_graph_run(const unsigned char* data, size_t data_len);
13+
void process_onion_failure_run(const unsigned char* data, size_t data_len);
1314
void refund_deser_run(const unsigned char* data, size_t data_len);
1415
void router_run(const unsigned char* data, size_t data_len);
1516
void zbase32_run(const unsigned char* data, size_t data_len);

0 commit comments

Comments
 (0)