2017-05-13 14:50:54 +00:00
|
|
|
#include "fuzz.h"
|
|
|
|
#include "session.h"
|
2017-05-18 16:48:46 +00:00
|
|
|
#include "fuzz-wrapfd.h"
|
2017-05-20 14:47:19 +00:00
|
|
|
#include "debug.h"
|
2017-05-13 14:50:54 +00:00
|
|
|
|
2017-05-18 16:48:46 +00:00
|
|
|
static void setup_fuzzer(void) {
|
2017-05-13 14:50:54 +00:00
|
|
|
svr_setup_fuzzer();
|
2017-05-20 14:47:19 +00:00
|
|
|
//debug_trace = 1;
|
2017-05-13 14:50:54 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) {
|
|
|
|
static int once = 0;
|
|
|
|
if (!once) {
|
|
|
|
setup_fuzzer();
|
|
|
|
once = 1;
|
|
|
|
}
|
|
|
|
|
2017-05-18 16:48:46 +00:00
|
|
|
if (fuzzer_set_input(Data, Size) == DROPBEAR_FAILURE) {
|
|
|
|
return 0;
|
|
|
|
}
|
2017-05-13 14:50:54 +00:00
|
|
|
|
2017-05-25 14:21:49 +00:00
|
|
|
// get prefix. input format is
|
|
|
|
// string prefix
|
|
|
|
// uint32 wrapfd seed
|
|
|
|
// ... to be extended later
|
|
|
|
// [bytes] ssh input stream
|
|
|
|
|
|
|
|
// be careful to avoid triggering buffer.c assertions
|
|
|
|
if (fuzz.input->len < 8) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
size_t prefix_size = buf_getint(fuzz.input);
|
|
|
|
if (prefix_size != 4) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
uint32_t wrapseed = buf_getint(fuzz.input);
|
|
|
|
wrapfd_setseed(wrapseed);
|
|
|
|
|
2017-05-18 16:48:46 +00:00
|
|
|
int fakesock = 1;
|
|
|
|
wrapfd_add(fakesock, fuzz.input, PLAIN);
|
2017-05-13 14:50:54 +00:00
|
|
|
|
2017-05-21 02:54:11 +00:00
|
|
|
m_malloc_set_epoch(1);
|
2017-05-13 14:50:54 +00:00
|
|
|
if (setjmp(fuzz.jmp) == 0) {
|
2017-05-18 16:48:46 +00:00
|
|
|
svr_session(fakesock, fakesock);
|
2017-05-13 14:50:54 +00:00
|
|
|
} else {
|
2017-05-21 02:54:11 +00:00
|
|
|
m_malloc_free_epoch(1);
|
2017-05-20 05:23:16 +00:00
|
|
|
TRACE(("dropbear_exit longjmped"))
|
2017-05-13 14:50:54 +00:00
|
|
|
// dropbear_exit jumped here
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|