diff --git a/src/test/fuzz/CMakeLists.txt b/src/test/fuzz/CMakeLists.txt --- a/src/test/fuzz/CMakeLists.txt +++ b/src/test/fuzz/CMakeLists.txt @@ -102,6 +102,7 @@ kitchen_sink locale merkleblock + message multiplication_overflow net_permissions netaddress diff --git a/src/test/fuzz/message.cpp b/src/test/fuzz/message.cpp new file mode 100644 --- /dev/null +++ b/src/test/fuzz/message.cpp @@ -0,0 +1,62 @@ +// Copyright (c) 2020 The Bitcoin Core developers +// Distributed under the MIT software license, see the accompanying +// file COPYING or http://www.opensource.org/licenses/mit-license.php. + +#include +#include +#include +#include +#include + +#include +#include +#include + +#include +#include +#include +#include +#include + +void initialize() { + static const ECCVerifyHandle ecc_verify_handle; + ECC_Start(); + SelectParams(CBaseChainParams::REGTEST); +} + +void test_one_input(const std::vector &buffer) { + const Config &config = GetConfig(); + const CChainParams &chainparams = config.GetChainParams(); + FuzzedDataProvider fuzzed_data_provider(buffer.data(), buffer.size()); + const std::string random_message = + fuzzed_data_provider.ConsumeRandomLengthString(1024); + { + const std::vector random_bytes = + ConsumeRandomLengthByteVector(fuzzed_data_provider); + CKey private_key; + private_key.Set(random_bytes.begin(), random_bytes.end(), + fuzzed_data_provider.ConsumeBool()); + std::string signature; + const bool message_signed = + MessageSign(private_key, random_message, signature); + if (private_key.IsValid()) { + assert(message_signed); + const MessageVerificationResult verification_result = MessageVerify( + chainparams, + EncodeDestination(PKHash(private_key.GetPubKey().GetID()), + config), + signature, random_message); + assert(verification_result == MessageVerificationResult::OK); + } + } + { + (void)MessageHash(random_message); + (void)MessageVerify( + chainparams, fuzzed_data_provider.ConsumeRandomLengthString(1024), + fuzzed_data_provider.ConsumeRandomLengthString(1024), + random_message); + (void)SigningResultString(fuzzed_data_provider.PickValueInArray( + {SigningResult::OK, SigningResult::PRIVATE_KEY_NOT_AVAILABLE, + SigningResult::SIGNING_FAILED})); + } +}