Coverage Report

Created: 2026-04-12 06:54

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/ntpsec/fuzz/FuzzClient.c
Line
Count
Source
1
/* Copyright 2022 Google LLC
2
Licensed under the Apache License, Version 2.0 (the "License");
3
you may not use this file except in compliance with the License.
4
You may obtain a copy of the License at
5
      http://www.apache.org/licenses/LICENSE-2.0
6
Unless required by applicable law or agreed to in writing, software
7
distributed under the License is distributed on an "AS IS" BASIS,
8
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
9
See the License for the specific language governing permissions and
10
limitations under the License.
11
*/
12
13
#include <stdio.h>
14
#include <stdlib.h>
15
#include <string.h>
16
#include "ntpd.h"
17
18
610
#define kMinInputLength 20
19
297
#define kMaxInputLength 1024
20
21
bool nts_client_process_response_core(uint8_t *buff, int transferred, struct peer* peer);
22
23
305
extern int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) {//ntpsec/tests/ntpd/nts_client.c
24
25
305
    if (Size < kMinInputLength || Size > kMaxInputLength){
26
32
        return 0;
27
32
    }
28
29
273
  struct peer peer;
30
31
273
  peer.nts_state.aead = 42; /* Dummy init values */
32
273
  peer.nts_state.cookielen = 0;
33
273
  peer.nts_state.writeIdx = 0;
34
273
  peer.nts_state.count = 0;
35
36
273
  peer.srcadr.sa4.sin_family = AF_INET;
37
273
  peer.srcadr.sa4.sin_port = htons(9999);
38
273
  peer.srcadr.sa4.sin_addr.s_addr= htonl(0x04030201);
39
40
273
  return nts_client_process_response_core((uint8_t*)Data,Size, &peer);
41
305
}