mirror of
https://github.com/zeromq/libzmq.git
synced 2024-12-12 10:33:52 +01:00
8cdc4ed71a
Solution: fix them
73 lines
1.7 KiB
C++
73 lines
1.7 KiB
C++
/* SPDX-License-Identifier: MPL-2.0 */
|
|
|
|
#ifdef ZMQ_USE_FUZZING_ENGINE
|
|
#include <fuzzer/FuzzedDataProvider.h>
|
|
#endif
|
|
|
|
#include <string>
|
|
|
|
#include "testutil.hpp"
|
|
#include "testutil_unity.hpp"
|
|
|
|
#ifndef PATH_MAX
|
|
#define PATH_MAX 1024
|
|
#endif
|
|
|
|
// Test that zmq_bind can handle malformed strings
|
|
extern "C" int LLVMFuzzerTestOneInput (const uint8_t *data, size_t size)
|
|
{
|
|
// This test might create socket files, so move to /tmp to avoid clobbering
|
|
// the working directory with random filenames
|
|
char *pwd = (char *) malloc (PATH_MAX + 1);
|
|
TEST_ASSERT_NOT_NULL (pwd);
|
|
TEST_ASSERT_NOT_NULL (getcwd (pwd, PATH_MAX + 1));
|
|
TEST_ASSERT_SUCCESS_ERRNO (chdir ("/tmp"));
|
|
|
|
setup_test_context ();
|
|
std::string my_endpoint (reinterpret_cast<const char *> (data), size);
|
|
void *socket = test_context_socket (ZMQ_PUB);
|
|
zmq_bind (socket, my_endpoint.c_str ());
|
|
|
|
test_context_socket_close_zero_linger (socket);
|
|
teardown_test_context ();
|
|
TEST_ASSERT_SUCCESS_ERRNO (chdir (pwd));
|
|
free (pwd);
|
|
|
|
return 0;
|
|
}
|
|
|
|
#ifndef ZMQ_USE_FUZZING_ENGINE
|
|
void test_bind_fuzzer ()
|
|
{
|
|
uint8_t **data;
|
|
size_t *len, num_cases = 0;
|
|
if (fuzzer_corpus_encode (
|
|
"tests/libzmq-fuzz-corpora/test_bind_fuzzer_seed_corpus", &data, &len,
|
|
&num_cases)
|
|
!= 0)
|
|
exit (77);
|
|
|
|
while (num_cases-- > 0) {
|
|
TEST_ASSERT_SUCCESS_ERRNO (
|
|
LLVMFuzzerTestOneInput (data[num_cases], len[num_cases]));
|
|
free (data[num_cases]);
|
|
}
|
|
|
|
free (data);
|
|
free (len);
|
|
}
|
|
|
|
int main (int argc, char **argv)
|
|
{
|
|
LIBZMQ_UNUSED (argc);
|
|
LIBZMQ_UNUSED (argv);
|
|
|
|
setup_test_environment ();
|
|
|
|
UNITY_BEGIN ();
|
|
RUN_TEST (test_bind_fuzzer);
|
|
|
|
return UNITY_END ();
|
|
}
|
|
#endif
|