Some checks failed
CI / lint (push) Successful in 1m37s
CI / test-python (push) Successful in 1m49s
CI / test-zig (push) Successful in 1m39s
CI / test-wasm (push) Successful in 1m54s
CI / test (push) Successful in 14m44s
CI / miri (push) Successful in 14m18s
CI / build (push) Successful in 1m9s
CI / fuzz-regression (push) Successful in 9m9s
CI / publish (push) Failing after 1m10s
CI / publish-python (push) Failing after 1m46s
CI / publish-wasm (push) Has been cancelled
Signed-off-by: Kamal Tufekcic <kamal@lo.sh>
18 lines
747 B
Rust
18 lines
747 B
Rust
#![no_main]
|
|
use libfuzzer_sys::fuzz_target;
|
|
use soliton::verification::verification_phrase;
|
|
|
|
fuzz_target!(|data: &[u8]| {
|
|
// verification_phrase validates exact size (3200 bytes each).
|
|
// Fixed split: inputs ≥ 6400 bytes always produce two exact 3200-byte
|
|
// halves regardless of total length, so the SHA-512 word derivation and
|
|
// rejection-sampling loop (20-rehash cap) are reachable from any input
|
|
// of 6400+ bytes. A midpoint split would only reach that path for
|
|
// inputs of exactly 6400 bytes.
|
|
const PK_SIZE: usize = 3200; // SOLITON_PUBLIC_KEY_SIZE
|
|
const MIN: usize = 2 * PK_SIZE;
|
|
if data.len() < MIN {
|
|
return;
|
|
}
|
|
let _ = verification_phrase(&data[..PK_SIZE], &data[PK_SIZE..MIN]);
|
|
});
|