Mercurial > dropbear
annotate fuzzer-preauth.c @ 1383:f03cfe9c76ac fuzz
Disable setnonblocking(), get_socket_address(), set_sock_priority()
for fuzzing
author | Matt Johnston <matt@ucc.asn.au> |
---|---|
date | Fri, 26 May 2017 22:10:51 +0800 |
parents | 7209a6e30932 |
children | ecdd4e8ae427 |
rev | line source |
---|---|
1348 | 1 #include "fuzz.h" |
2 #include "session.h" | |
1356
3677a510f545
add wrapfd. improve fuzzer in makefile
Matt Johnston <matt@ucc.asn.au>
parents:
1348
diff
changeset
|
3 #include "fuzz-wrapfd.h" |
1358
6b89eb92f872
glaring wrapfd problems fixed
Matt Johnston <matt@ucc.asn.au>
parents:
1357
diff
changeset
|
4 #include "debug.h" |
1348 | 5 |
1356
3677a510f545
add wrapfd. improve fuzzer in makefile
Matt Johnston <matt@ucc.asn.au>
parents:
1348
diff
changeset
|
6 static void setup_fuzzer(void) { |
1348 | 7 svr_setup_fuzzer(); |
1358
6b89eb92f872
glaring wrapfd problems fixed
Matt Johnston <matt@ucc.asn.au>
parents:
1357
diff
changeset
|
8 //debug_trace = 1; |
1348 | 9 } |
10 | |
11 int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) { | |
12 static int once = 0; | |
13 if (!once) { | |
14 setup_fuzzer(); | |
15 once = 1; | |
16 } | |
17 | |
1356
3677a510f545
add wrapfd. improve fuzzer in makefile
Matt Johnston <matt@ucc.asn.au>
parents:
1348
diff
changeset
|
18 if (fuzzer_set_input(Data, Size) == DROPBEAR_FAILURE) { |
3677a510f545
add wrapfd. improve fuzzer in makefile
Matt Johnston <matt@ucc.asn.au>
parents:
1348
diff
changeset
|
19 return 0; |
3677a510f545
add wrapfd. improve fuzzer in makefile
Matt Johnston <matt@ucc.asn.au>
parents:
1348
diff
changeset
|
20 } |
1348 | 21 |
1377
d4cc85e6c569
rearrange, all fuzzers now call fuzzer_set_input()
Matt Johnston <matt@ucc.asn.au>
parents:
1364
diff
changeset
|
22 // get prefix. input format is |
d4cc85e6c569
rearrange, all fuzzers now call fuzzer_set_input()
Matt Johnston <matt@ucc.asn.au>
parents:
1364
diff
changeset
|
23 // string prefix |
d4cc85e6c569
rearrange, all fuzzers now call fuzzer_set_input()
Matt Johnston <matt@ucc.asn.au>
parents:
1364
diff
changeset
|
24 // uint32 wrapfd seed |
d4cc85e6c569
rearrange, all fuzzers now call fuzzer_set_input()
Matt Johnston <matt@ucc.asn.au>
parents:
1364
diff
changeset
|
25 // ... to be extended later |
d4cc85e6c569
rearrange, all fuzzers now call fuzzer_set_input()
Matt Johnston <matt@ucc.asn.au>
parents:
1364
diff
changeset
|
26 // [bytes] ssh input stream |
d4cc85e6c569
rearrange, all fuzzers now call fuzzer_set_input()
Matt Johnston <matt@ucc.asn.au>
parents:
1364
diff
changeset
|
27 |
d4cc85e6c569
rearrange, all fuzzers now call fuzzer_set_input()
Matt Johnston <matt@ucc.asn.au>
parents:
1364
diff
changeset
|
28 // be careful to avoid triggering buffer.c assertions |
d4cc85e6c569
rearrange, all fuzzers now call fuzzer_set_input()
Matt Johnston <matt@ucc.asn.au>
parents:
1364
diff
changeset
|
29 if (fuzz.input->len < 8) { |
d4cc85e6c569
rearrange, all fuzzers now call fuzzer_set_input()
Matt Johnston <matt@ucc.asn.au>
parents:
1364
diff
changeset
|
30 return 0; |
d4cc85e6c569
rearrange, all fuzzers now call fuzzer_set_input()
Matt Johnston <matt@ucc.asn.au>
parents:
1364
diff
changeset
|
31 } |
d4cc85e6c569
rearrange, all fuzzers now call fuzzer_set_input()
Matt Johnston <matt@ucc.asn.au>
parents:
1364
diff
changeset
|
32 size_t prefix_size = buf_getint(fuzz.input); |
d4cc85e6c569
rearrange, all fuzzers now call fuzzer_set_input()
Matt Johnston <matt@ucc.asn.au>
parents:
1364
diff
changeset
|
33 if (prefix_size != 4) { |
d4cc85e6c569
rearrange, all fuzzers now call fuzzer_set_input()
Matt Johnston <matt@ucc.asn.au>
parents:
1364
diff
changeset
|
34 return 0; |
d4cc85e6c569
rearrange, all fuzzers now call fuzzer_set_input()
Matt Johnston <matt@ucc.asn.au>
parents:
1364
diff
changeset
|
35 } |
d4cc85e6c569
rearrange, all fuzzers now call fuzzer_set_input()
Matt Johnston <matt@ucc.asn.au>
parents:
1364
diff
changeset
|
36 uint32_t wrapseed = buf_getint(fuzz.input); |
d4cc85e6c569
rearrange, all fuzzers now call fuzzer_set_input()
Matt Johnston <matt@ucc.asn.au>
parents:
1364
diff
changeset
|
37 wrapfd_setseed(wrapseed); |
d4cc85e6c569
rearrange, all fuzzers now call fuzzer_set_input()
Matt Johnston <matt@ucc.asn.au>
parents:
1364
diff
changeset
|
38 |
1383
f03cfe9c76ac
Disable setnonblocking(), get_socket_address(), set_sock_priority()
Matt Johnston <matt@ucc.asn.au>
parents:
1378
diff
changeset
|
39 int fakesock = 20; |
1356
3677a510f545
add wrapfd. improve fuzzer in makefile
Matt Johnston <matt@ucc.asn.au>
parents:
1348
diff
changeset
|
40 wrapfd_add(fakesock, fuzz.input, PLAIN); |
1348 | 41 |
1361
f9f930e1a516
add dbmalloc epoch cleanup
Matt Johnston <matt@ucc.asn.au>
parents:
1358
diff
changeset
|
42 m_malloc_set_epoch(1); |
1348 | 43 if (setjmp(fuzz.jmp) == 0) { |
1356
3677a510f545
add wrapfd. improve fuzzer in makefile
Matt Johnston <matt@ucc.asn.au>
parents:
1348
diff
changeset
|
44 svr_session(fakesock, fakesock); |
1378 | 45 m_malloc_free_epoch(1, 0); |
1348 | 46 } else { |
1378 | 47 m_malloc_free_epoch(1, 1); |
1357 | 48 TRACE(("dropbear_exit longjmped")) |
1348 | 49 // dropbear_exit jumped here |
50 } | |
51 | |
52 return 0; | |
53 } |