aboutsummaryrefslogtreecommitdiff
path: root/tests/fuzz (follow)
AgeCommit message (Collapse)AuthorFilesLines
2022-03-04Copyright: Update to 2022mj-xmr17-17/+18
2021-01-23Improve cryptonote (block and tx) binary read performanceLee Clagett3-11/+3
2021-01-19Remove payload copy in all outgoing p2p messagesLee Clagett1-2/+2
2021-04-16Revert "Merge pull request #7136"luigi11111-2/+2
This reverts commit 63c7ca07fba2f063c760f786a986fb3e02fb040e, reversing changes made to 2218e23e84a89e9a1e4c0be5d50f891ab836754f.
2021-04-16Merge pull request #7136luigi11111-2/+2
23aae55 Remove payload copy in all outgoing p2p messages (Lee Clagett)
2021-03-05fix serialization being different on macmoneromooo-monero1-1/+1
On Mac, size_t is a distinct type from uint64_t, and some types (in wallet cache as well as cold/hot wallet transfer data) use pairs/containers with size_t as fields. Mac would save those as full size, while other platforms would save them as varints. Might apply to other platforms where the types are distinct. There's a nasty hack for backward compatibility, which can go after a couple forks.
2021-01-16Remove payload copy in all outgoing p2p messagesLee Clagett1-2/+2
2021-01-15Merge pull request #7149luigi11112-0/+49
0660db3 fuzz_tests: add a test for utf8canonical (moneromooo-monero)
2021-01-03add a max levin packet size by command typemoneromooo-monero1-0/+1
2020-12-17Add aggressive restrictions to pre-handshake p2p buffer limitLee Clagett1-0/+2
2020-12-14fuzz_tests: add a test for utf8canonicalmoneromooo-monero2-0/+49
2020-10-10Change epee binary output from std::stringstream to byte_streamLee Clagett2-6/+6
2020-10-28Add RELINK_TARGETS, monero_add_target_no_relink and use ↵mj-xmr1-13/+13
monero_add_executable/monero_add_library where possible (mj-xmr) Add monero_add_minimal_executable and use in tests This is done in order not to have to relink targets, when just an .so changed, but not its interface.
2020-09-24fuzz_tests: fix build error in signature fuzz testmoneromooo-monero1-1/+1
2020-08-28wallet: allow signing a message with spend or view keymoneromooo-monero1-2/+2
2020-08-17replace most boost serialization with existing monero serializationmoneromooo-monero2-8/+8
This reduces the attack surface for data that can come from malicious sources (exported output and key images, multisig transactions...) since the monero serialization is already exposed to the outside, and the boost lib we were using had a few known crashers. For interoperability, a new load-deprecated-formats wallet setting is added (off by default). This allows loading boost format data if there is no alternative. It will likely go at some point, along with the ability to load those. Notably, the peer lists file still uses the boost serialization code, as the data it stores is define in epee, while the new serialization code is in monero, and migrating it was fairly hairy. Since this file is local and not obtained from anyone else, the marginal risk is minimal, but it could be migrated later if needed. Some tests and tools also do, this will stay as is for now.
2020-07-20wallet2_api: implement runtime proxy configurationxiphon3-3/+3
2020-07-19Merge pull request #6512Alexander Blair15-15/+15
5ef0607da Update copyright year to 2020 (SomaticFanatic)
2020-06-14fuzz_tests: fix init check in oss-fuzz modemoneromooo-monero1-1/+1
2020-06-14fix leaks in fuzz testsmoneromooo-monero4-17/+34
2020-06-14fuzz_tests: add a tx extra fuzz testmoneromooo-monero2-0/+58
2020-05-15fuzz_tests: refactor and add OSS-Fuzz compatibilitymoneromooo-monero15-540/+228
2020-05-06Update copyright year to 2020SomaticFanatic15-15/+15
Update copyright year to 2020
2020-04-15Allow wallet2.h to run in WebAssemblywoodser1-0/+5
- Add abstract_http_client.h which http_client.h extends. - Replace simple_http_client with abstract_http_client in wallet2, message_store, message_transporter, and node_rpc_proxy. - Import and export wallet data in wallet2. - Use #if defined __EMSCRIPTEN__ directives to skip incompatible code.
2019-07-16Add ref-counted buffer byte_slice. Currently used for sending TCP data.Lee Clagett1-2/+2
2019-03-25Added socks proxy (tor/i2pd/kovri) support to walletLee Clagett3-3/+3
2019-03-24Merge pull request #5274Riccardo Spagni3-3/+3
dc0c0c91 tests: disable wallet SSL init for tests involving wallet2 (moneromooo-monero)
2019-03-12tests: disable wallet SSL init for tests involving wallet2moneromooo-monero3-3/+3
2019-03-05Update 2019 copyrightbinaryFate15-15/+15
2018-12-23epee: better network buffer data structuremoneromooo-monero1-4/+4
avoids pointless allocs and memcpy
2018-11-04wallet2: only export necessary outputs and key imagesmoneromooo-monero1-1/+1
and disable annoying test that requires ridiculous amounts of skullduggery every time some format changes
2018-10-02Catch more exceptions in dtorsmoneromooo-monero12-0/+24
Misc coverity reports
2018-09-29Merge pull request #4459Riccardo Spagni1-0/+4
bcf3f6af fuzz_tests: catch unhandled exceptions (moneromooo-monero) 3ebd05d4 miner: restore stream flags after changing them (moneromooo-monero) a093092e levin_protocol_handler_async: do not propagate exception through dtor (moneromooo-monero) 1eebb82b net_helper: do not propagate exceptions through dtor (moneromooo-monero) fb6a3630 miner: do not propagate exceptions through dtor (moneromooo-monero) 2e2139ff epee: do not propagate exception through dtor (moneromooo-monero) 0749a8bd db_lmdb: do not propagate exceptions in dtor (moneromooo-monero) 1b0afeeb wallet_rpc_server: exit cleanly on unhandled exceptions (moneromooo-monero) 418a9936 unit_tests: catch unhandled exceptions (moneromooo-monero) ea7f9543 threadpool: do not propagate exceptions through the dtor (moneromooo-monero) 6e855422 gen_multisig: nice exit on unhandled exception (moneromooo-monero) 53df2deb db_lmdb: catch error in mdb_stat calls during migration (moneromooo-monero) e67016dd blockchain_blackball: catch failure to commit db transaction (moneromooo-monero) 661439f4 mlog: don't remove old logs if we failed to rename the current file (moneromooo-monero) 5fdcda50 easylogging++: test for NULL before dereference (moneromooo-monero) 7ece1550 performance_test: fix bad last argument calling add_arg (moneromooo-monero) a085da32 unit_tests: add check for page size > 0 before dividing (moneromooo-monero) d8b1ec8b unit_tests: use std::shared_ptr to shut coverity up about leaks (moneromooo-monero) 02563bf4 simplewallet: top level exception catcher to print nicer messages (moneromooo-monero) c57a65b2 blockchain_blackball: fix shift range for 32 bit archs (moneromooo-monero)
2018-09-14Merge pull request #4254Riccardo Spagni1-0/+4
de905d4b fuzz_tests: use __AFL_INIT when available (moneromooo-monero)
2018-09-11fuzz_tests: add a bulletproof fuzz testmoneromooo-monero2-0/+85
2018-08-14fuzz: set address properlystoffu1-0/+1
2018-08-13fuzz_tests: use __AFL_INIT when availablemoneromooo-monero1-0/+4
alleged to speed things up
2018-06-10epee: adaptive connection timeout systemmoneromooo-monero1-0/+1
a connection's timeout is halved for every extra connection from the same host. Also keep track of when we don't need to use a connection anymore, so we can close it and free the resource for another connection. Also use the longer timeout for non routable local addresses.
2018-03-14fuzz_tests: set small subaddress lookahead for speedmoneromooo-monero3-0/+3
2018-03-05Stagenetstoffu3-4/+4
2018-03-04Code modifications to integrate Ledger HW device into monero-wallet-cli.cslashm1-0/+5
The basic approach it to delegate all sensitive data (master key, secret ephemeral key, key derivation, ....) and related operations to the device. As device has low memory, it does not keep itself the values (except for view/spend keys) but once computed there are encrypted (with AES are equivalent) and return back to monero-wallet-cli. When they need to be manipulated by the device, they are decrypted on receive. Moreover, using the client for storing the value in encrypted form limits the modification in the client code. Those values are transfered from one C-structure to another one as previously. The code modification has been done with the wishes to be open to any other hardware wallet. To achieve that a C++ class hw::Device has been introduced. Two initial implementations are provided: the "default", which remaps all calls to initial Monero code, and the "Ledger", which delegates all calls to Ledger device.
2018-02-02fuzz_tests: fix an uninitialized var in setupmoneromooo-monero1-2/+3
and comment it out, it's only used to generate a starting test case Coverity 182506
2018-01-28Tests: Fix building of two fuzz tests on WindowsiDunk54001-0/+2
2018-01-26Readd copyright starting datexmr-eric13-13/+13
2018-01-26Update 2018 copyrightxmr-eric14-14/+14
2018-01-02Merge pull request #2963Riccardo Spagni3-27/+3
0e19a394 tests: test wallets don't need a dummy temp file anymore (moneromooo-monero)
2017-12-23tests: add levin fuzz testmoneromooo-monero2-0/+359
2017-12-23tests: add http client fuzz testmoneromooo-monero2-0/+112
2017-12-23add parse_url fuzz testmoneromooo-monero2-0/+87
2017-12-23tests: add base58 fuzz testmoneromooo-monero2-0/+86
2017-12-23tests: don't init stuff we don't need in fuzz tests - fastermoneromooo-monero1-32/+1
2017-12-23add load_from_binary/load_from_json fuzzersmoneromooo-monero3-0/+176
2017-12-19tests: test wallets don't need a dummy temp file anymoremoneromooo-monero3-27/+3
2017-12-16move includes around to lessen overall loadmoneromooo-monero6-5/+6
2017-11-14move cryptonote command line options to cryptonote_coremoneromooo-monero4-4/+0
Those have no reason to be in a generic module
2017-10-21Initialize openssl on startupmoneromooo-monero1-0/+2
2017-10-07Subaddresseskenshi841-3/+2
2017-08-29Revert "Cleanup test impact of moving blockchain_db_types()"Howard Chu1-10/+0
This reverts commit 3dd34a49efd2954b0a5eb020abd168d9379b98c4.
2017-08-22Cleanup test impact of moving blockchain_db_types()Howard Chu1-0/+10
2017-06-24Add fuzz testing using american fuzzy lopmoneromooo-monero8-0/+682
Existing tests: block, transaction, signature, cold outputs, cold transaction. Data for these is in tests/data/fuzz. A convenience shell script is in contrib/fuzz_testing/fuzz.sh, eg: contrib/fuzz_testing/fuzz.sh signature The fuzzer will run indefinitely, ^C to stop. Fuzzing is currently supported for GCC only. I can't get CLANG to build Monero here as it dies on some system headers, so if someone wants to make it work on both, that'd be great. In particular, the __AFL_LOOP construct should be made to work so that a given run can fuzz multiple inputs, as the C++ load time is substantial.