// Copyright (c) 2020 The Bitcoin Core developers // Distributed under the MIT software license, see the accompanying // file COPYING or http://www.opensource.org/licenses/mit-license.php. #include #include #include #include #include #include #include #include #include #include #include #include #include void test_one_input(const std::vector& buffer) { FuzzedDataProvider fuzzed_data_provider{buffer.data(), buffer.size()}; std::vector data = ConsumeRandomLengthByteVector(fuzzed_data_provider); if (data.empty()) { data.resize(fuzzed_data_provider.ConsumeIntegralInRange(1, 4096), fuzzed_data_provider.ConsumeIntegral()); } CHash160 hash160; CHash256 hash256; CHMAC_SHA256 hmac_sha256{data.data(), data.size()}; CHMAC_SHA512 hmac_sha512{data.data(), data.size()}; CRIPEMD160 ripemd160; CSHA1 sha1; CSHA256 sha256; CSHA512 sha512; SHA3_256 sha3; CSipHasher sip_hasher{fuzzed_data_provider.ConsumeIntegral(), fuzzed_data_provider.ConsumeIntegral()}; while (fuzzed_data_provider.ConsumeBool()) { switch (fuzzed_data_provider.ConsumeIntegralInRange(0, 2)) { case 0: { if (fuzzed_data_provider.ConsumeBool()) { data = ConsumeRandomLengthByteVector(fuzzed_data_provider); if (data.empty()) { data.resize(fuzzed_data_provider.ConsumeIntegralInRange(1, 4096), fuzzed_data_provider.ConsumeIntegral()); } } (void)hash160.Write(data); (void)hash256.Write(data); (void)hmac_sha256.Write(data.data(), data.size()); (void)hmac_sha512.Write(data.data(), data.size()); (void)ripemd160.Write(data.data(), data.size()); (void)sha1.Write(data.data(), data.size()); (void)sha256.Write(data.data(), data.size()); (void)sha3.Write(data); (void)sha512.Write(data.data(), data.size()); (void)sip_hasher.Write(data.data(), data.size()); (void)Hash(data); (void)Hash160(data); (void)sha512.Size(); break; } case 1: { (void)hash160.Reset(); (void)hash256.Reset(); (void)ripemd160.Reset(); (void)sha1.Reset(); (void)sha256.Reset(); (void)sha3.Reset(); (void)sha512.Reset(); break; } case 2: { switch (fuzzed_data_provider.ConsumeIntegralInRange(0, 9)) { case 0: { data.resize(CHash160::OUTPUT_SIZE); hash160.Finalize(data); break; } case 1: { data.resize(CHash256::OUTPUT_SIZE); hash256.Finalize(data); break; } case 2: { data.resize(CHMAC_SHA256::OUTPUT_SIZE); hmac_sha256.Finalize(data.data()); break; } case 3: { data.resize(CHMAC_SHA512::OUTPUT_SIZE); hmac_sha512.Finalize(data.data()); break; } case 4: { data.resize(CRIPEMD160::OUTPUT_SIZE); ripemd160.Finalize(data.data()); break; } case 5: { data.resize(CSHA1::OUTPUT_SIZE); sha1.Finalize(data.data()); break; } case 6: { data.resize(CSHA256::OUTPUT_SIZE); sha256.Finalize(data.data()); break; } case 7: { data.resize(CSHA512::OUTPUT_SIZE); sha512.Finalize(data.data()); break; } case 8: { data.resize(1); data[0] = sip_hasher.Finalize() % 256; break; } case 9: { data.resize(SHA3_256::OUTPUT_SIZE); sha3.Finalize(data); break; } } break; } } } if (fuzzed_data_provider.ConsumeBool()) { uint64_t state[25]; for (size_t i = 0; i < 25; ++i) { state[i] = fuzzed_data_provider.ConsumeIntegral(); } KeccakF(state); } }