aboutsummaryrefslogtreecommitdiff
path: root/tests/fuzz (follow)
AgeCommit message (Collapse)AuthorFilesLines
2018-09-14Merge pull request #4254Riccardo Spagni1-0/+4
de905d4b fuzz_tests: use __AFL_INIT when available (moneromooo-monero)
2018-09-11fuzz_tests: add a bulletproof fuzz testmoneromooo-monero2-0/+85
2018-08-14fuzz: set address properlystoffu1-0/+1
2018-08-13fuzz_tests: use __AFL_INIT when availablemoneromooo-monero1-0/+4
alleged to speed things up
2018-06-10epee: adaptive connection timeout systemmoneromooo-monero1-0/+1
a connection's timeout is halved for every extra connection from the same host. Also keep track of when we don't need to use a connection anymore, so we can close it and free the resource for another connection. Also use the longer timeout for non routable local addresses.
2018-03-14fuzz_tests: set small subaddress lookahead for speedmoneromooo-monero3-0/+3
2018-03-05Stagenetstoffu3-4/+4
2018-03-04Code modifications to integrate Ledger HW device into monero-wallet-cli.cslashm1-0/+5
The basic approach it to delegate all sensitive data (master key, secret ephemeral key, key derivation, ....) and related operations to the device. As device has low memory, it does not keep itself the values (except for view/spend keys) but once computed there are encrypted (with AES are equivalent) and return back to monero-wallet-cli. When they need to be manipulated by the device, they are decrypted on receive. Moreover, using the client for storing the value in encrypted form limits the modification in the client code. Those values are transfered from one C-structure to another one as previously. The code modification has been done with the wishes to be open to any other hardware wallet. To achieve that a C++ class hw::Device has been introduced. Two initial implementations are provided: the "default", which remaps all calls to initial Monero code, and the "Ledger", which delegates all calls to Ledger device.
2018-02-02fuzz_tests: fix an uninitialized var in setupmoneromooo-monero1-2/+3
and comment it out, it's only used to generate a starting test case Coverity 182506
2018-01-28Tests: Fix building of two fuzz tests on WindowsiDunk54001-0/+2
2018-01-26Readd copyright starting datexmr-eric13-13/+13
2018-01-26Update 2018 copyrightxmr-eric14-14/+14
2018-01-02Merge pull request #2963Riccardo Spagni3-27/+3
0e19a394 tests: test wallets don't need a dummy temp file anymore (moneromooo-monero)
2017-12-23tests: add levin fuzz testmoneromooo-monero2-0/+359
2017-12-23tests: add http client fuzz testmoneromooo-monero2-0/+112
2017-12-23add parse_url fuzz testmoneromooo-monero2-0/+87
2017-12-23tests: add base58 fuzz testmoneromooo-monero2-0/+86
2017-12-23tests: don't init stuff we don't need in fuzz tests - fastermoneromooo-monero1-32/+1
2017-12-23add load_from_binary/load_from_json fuzzersmoneromooo-monero3-0/+176
2017-12-19tests: test wallets don't need a dummy temp file anymoremoneromooo-monero3-27/+3
2017-12-16move includes around to lessen overall loadmoneromooo-monero6-5/+6
2017-11-14move cryptonote command line options to cryptonote_coremoneromooo-monero4-4/+0
Those have no reason to be in a generic module
2017-10-21Initialize openssl on startupmoneromooo-monero1-0/+2
2017-10-07Subaddresseskenshi841-3/+2
2017-08-29Revert "Cleanup test impact of moving blockchain_db_types()"Howard Chu1-10/+0
This reverts commit 3dd34a49efd2954b0a5eb020abd168d9379b98c4.
2017-08-22Cleanup test impact of moving blockchain_db_types()Howard Chu1-0/+10
2017-06-24Add fuzz testing using american fuzzy lopmoneromooo-monero8-0/+682
Existing tests: block, transaction, signature, cold outputs, cold transaction. Data for these is in tests/data/fuzz. A convenience shell script is in contrib/fuzz_testing/fuzz.sh, eg: contrib/fuzz_testing/fuzz.sh signature The fuzzer will run indefinitely, ^C to stop. Fuzzing is currently supported for GCC only. I can't get CLANG to build Monero here as it dies on some system headers, so if someone wants to make it work on both, that'd be great. In particular, the __AFL_LOOP construct should be made to work so that a given run can fuzz multiple inputs, as the C++ load time is substantial.