dropbear/fuzzer-preauth.c

60 lines
1.2 KiB
C
Raw Normal View History

2017-05-13 14:50:54 +00:00
#include "fuzz.h"
#include "session.h"
#include "fuzz-wrapfd.h"
#include "debug.h"
2017-05-13 14:50:54 +00:00
static void setup_fuzzer(void) {
2017-05-13 14:50:54 +00:00
svr_setup_fuzzer();
//debug_trace = 1;
2017-05-13 14:50:54 +00:00
}
int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) {
static int once = 0;
if (!once) {
setup_fuzzer();
// XXX temporarily disable setjmp to debug asan segv
fuzz.do_jmp = 0;
2017-05-13 14:50:54 +00:00
once = 1;
}
if (fuzzer_set_input(Data, Size) == DROPBEAR_FAILURE) {
return 0;
}
2017-05-13 14:50:54 +00:00
// get prefix. input format is
// string prefix
// uint32 wrapfd seed
// ... to be extended later
// [bytes] ssh input stream
// be careful to avoid triggering buffer.c assertions
if (fuzz.input->len < 8) {
return 0;
}
size_t prefix_size = buf_getint(fuzz.input);
if (prefix_size != 4) {
return 0;
}
uint32_t wrapseed = buf_getint(fuzz.input);
wrapfd_setseed(wrapseed);
int fakesock = 20;
wrapfd_add(fakesock, fuzz.input, PLAIN);
2017-05-13 14:50:54 +00:00
m_malloc_set_epoch(1);
// XXX temporarily disable setjmp to debug asan segv
svr_session(fakesock, fakesock);
#if 0
2017-05-13 14:50:54 +00:00
if (setjmp(fuzz.jmp) == 0) {
svr_session(fakesock, fakesock);
m_malloc_free_epoch(1, 0);
2017-05-13 14:50:54 +00:00
} else {
m_malloc_free_epoch(1, 1);
2017-05-20 05:23:16 +00:00
TRACE(("dropbear_exit longjmped"))
2017-05-13 14:50:54 +00:00
// dropbear_exit jumped here
}
#endif
2017-05-13 14:50:54 +00:00
return 0;
}