fuzz coverage

Coverage Report

Created: 2025-09-17 22:41

/Users/eugenesiegel/btc/bitcoin/src/util/obfuscation.h
Line
Count
Source (jump to first uncovered line)
1
// Copyright (c) 2025-present The Bitcoin Core developers
2
// Distributed under the MIT software license, see the accompanying
3
// file COPYING or http://www.opensource.org/licenses/mit-license.php.
4
5
#ifndef BITCOIN_UTIL_OBFUSCATION_H
6
#define BITCOIN_UTIL_OBFUSCATION_H
7
8
#include <cstdint>
9
#include <span.h>
10
#include <tinyformat.h>
11
#include <util/strencodings.h>
12
13
#include <array>
14
#include <bit>
15
#include <climits>
16
#include <ios>
17
#include <memory>
18
19
class Obfuscation
20
{
21
public:
22
    using KeyType = uint64_t;
23
    static constexpr size_t KEY_SIZE{sizeof(KeyType)};
24
25
116k
    Obfuscation() { SetRotations(0); }
26
    explicit Obfuscation(std::span<const std::byte, KEY_SIZE> key_bytes)
27
38.8k
    {
28
38.8k
        SetRotations(ToKey(key_bytes));
29
38.8k
    }
30
31
12.5M
    operator bool() const { return m_rotations[0] != 0; }
32
33
    void operator()(std::span<std::byte> target, size_t key_offset = 0) const
34
10.6M
    {
35
10.6M
        if (!*this) 
return8.01M
;
36
37
2.59M
        KeyType rot_key{m_rotations[key_offset % KEY_SIZE]}; // Continue obfuscation from where we left off
38
2.59M
        if (target.size() > KEY_SIZE) {
39
            // Obfuscate until KEY_SIZE alignment boundary
40
1.61M
            if (const auto misalign{reinterpret_cast<uintptr_t>(target.data()) % KEY_SIZE}) {
41
0
                const size_t alignment{KEY_SIZE - misalign};
42
0
                XorWord(target.first(alignment), rot_key);
43
44
0
                target = {std::assume_aligned<KEY_SIZE>(target.data() + alignment), target.size() - alignment};
45
0
                rot_key = m_rotations[(key_offset + alignment) % KEY_SIZE];
46
0
            }
47
            // Aligned obfuscation in 8*KEY_SIZE chunks
48
486M
            for (constexpr auto unroll{8}; target.size() >= KEY_SIZE * unroll; 
target = target.subspan(KEY_SIZE * unroll)485M
) {
49
4.36G
                for (size_t i{0}; i < unroll; 
++i3.88G
) {
50
3.88G
                    XorWord(target.subspan(i * KEY_SIZE, KEY_SIZE), rot_key);
51
3.88G
                }
52
485M
            }
53
            // Aligned obfuscation in KEY_SIZE chunks
54
5.57M
            for (; target.size() >= KEY_SIZE; 
target = target.subspan(KEY_SIZE)3.95M
) {
55
3.95M
                XorWord(target.first<KEY_SIZE>(), rot_key);
56
3.95M
            }
57
1.61M
        }
58
2.59M
        XorWord(target, rot_key);
59
2.59M
    }
60
61
    template <typename Stream>
62
    void Serialize(Stream& s) const
63
0
    {
64
        // Use vector serialization for convenient compact size prefix.
65
0
        std::vector<std::byte> bytes{KEY_SIZE};
66
0
        std::memcpy(bytes.data(), &m_rotations[0], KEY_SIZE);
67
0
        s << bytes;
68
0
    }
Unexecuted instantiation: _ZNK11Obfuscation9SerializeI10DataStreamEEvRT_
Unexecuted instantiation: _ZNK11Obfuscation9SerializeI8AutoFileEEvRT_
69
70
    template <typename Stream>
71
    void Unserialize(Stream& s)
72
38.8k
    {
73
38.8k
        std::vector<std::byte> bytes{KEY_SIZE};
74
38.8k
        s >> bytes;
75
38.8k
        if (bytes.size() != KEY_SIZE) 
throw std::ios_base::failure(0
strprintf0
("Obfuscation key size should be exactly %s bytes long", KEY_SIZE));
Line
Count
Source
1172
0
#define strprintf tfm::format
        if (bytes.size() != KEY_SIZE) 
throw std::ios_base::failure(0
strprintf0
("Obfuscation key size should be exactly %s bytes long", KEY_SIZE));
Line
Count
Source
1172
0
#define strprintf tfm::format
76
38.8k
        SetRotations(ToKey(std::span<std::byte, KEY_SIZE>(bytes)));
77
38.8k
    }
_ZN11Obfuscation11UnserializeI10DataStreamEEvRT_
Line
Count
Source
72
38.8k
    {
73
38.8k
        std::vector<std::byte> bytes{KEY_SIZE};
74
38.8k
        s >> bytes;
75
38.8k
        if (bytes.size() != KEY_SIZE) 
throw std::ios_base::failure(0
strprintf0
("Obfuscation key size should be exactly %s bytes long", KEY_SIZE));
Line
Count
Source
1172
0
#define strprintf tfm::format
76
38.8k
        SetRotations(ToKey(std::span<std::byte, KEY_SIZE>(bytes)));
77
38.8k
    }
Unexecuted instantiation: _ZN11Obfuscation11UnserializeI8AutoFileEEvRT_
78
79
    std::string HexKey() const
80
77.7k
    {
81
77.7k
        return HexStr(std::as_bytes(std::span{&m_rotations[0], 1}));
82
77.7k
    }
83
84
private:
85
    // Cached key rotations for different offsets.
86
    std::array<KeyType, KEY_SIZE> m_rotations;
87
88
    void SetRotations(KeyType key)
89
194k
    {
90
1.75M
        for (size_t i{0}; i < KEY_SIZE; 
++i1.55M
) {
91
1.55M
            int key_rotation_bits{int(CHAR_BIT * i)};
92
            if constexpr (std::endian::native == std::endian::big) key_rotation_bits *= -1;
93
1.55M
            m_rotations[i] = std::rotr(key, key_rotation_bits);
94
1.55M
        }
95
194k
    }
96
97
    static KeyType ToKey(std::span<const std::byte, KEY_SIZE> key_span)
98
77.7k
    {
99
77.7k
        KeyType key{};
100
77.7k
        std::memcpy(&key, key_span.data(), KEY_SIZE);
101
77.7k
        return key;
102
77.7k
    }
103
104
    static void XorWord(std::span<std::byte> target, KeyType key)
105
3.88G
    {
106
3.88G
        assert(target.size() <= KEY_SIZE);
107
3.88G
        if (target.empty()) 
return597k
;
108
3.88G
        KeyType raw{};
109
3.88G
        std::memcpy(&raw, target.data(), target.size());
110
3.88G
        raw ^= key;
111
3.88G
        std::memcpy(target.data(), &raw, target.size());
112
3.88G
    }
113
};
114
115
#endif // BITCOIN_UTIL_OBFUSCATION_H