test_sshbuf_getput_fuzz.c 3.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132
  1. /* $OpenBSD: test_sshbuf_getput_fuzz.c,v 1.4 2019/01/21 12:29:35 djm Exp $ */
  2. /*
  3. * Regress test for sshbuf.h buffer API
  4. *
  5. * Placed in the public domain
  6. */
  7. #include "includes.h"
  8. #include <sys/types.h>
  9. #include <sys/param.h>
  10. #include <stdio.h>
  11. #ifdef HAVE_STDINT_H
  12. # include <stdint.h>
  13. #endif
  14. #include <stdlib.h>
  15. #include <string.h>
  16. #include <openssl/bn.h>
  17. #include <openssl/objects.h>
  18. #ifdef OPENSSL_HAS_NISTP256
  19. # include <openssl/ec.h>
  20. #endif
  21. #include "../test_helper/test_helper.h"
  22. #include "ssherr.h"
  23. #include "sshbuf.h"
  24. void sshbuf_getput_fuzz_tests(void);
  25. static void
  26. attempt_parse_blob(u_char *blob, size_t len)
  27. {
  28. struct sshbuf *p1;
  29. #ifdef WITH_OPENSSL
  30. BIGNUM *bn;
  31. #if defined(OPENSSL_HAS_ECC) && defined(OPENSSL_HAS_NISTP256)
  32. EC_KEY *eck;
  33. #endif /* defined(OPENSSL_HAS_ECC) && defined(OPENSSL_HAS_NISTP256) */
  34. #endif /* WITH_OPENSSL */
  35. u_char *s;
  36. size_t l;
  37. u_int8_t u8;
  38. u_int16_t u16;
  39. u_int32_t u32;
  40. u_int64_t u64;
  41. p1 = sshbuf_new();
  42. ASSERT_PTR_NE(p1, NULL);
  43. ASSERT_INT_EQ(sshbuf_put(p1, blob, len), 0);
  44. sshbuf_get_u8(p1, &u8);
  45. sshbuf_get_u16(p1, &u16);
  46. sshbuf_get_u32(p1, &u32);
  47. sshbuf_get_u64(p1, &u64);
  48. if (sshbuf_get_string(p1, &s, &l) == 0) {
  49. bzero(s, l);
  50. free(s);
  51. }
  52. #ifdef WITH_OPENSSL
  53. bn = NULL;
  54. sshbuf_get_bignum2(p1, &bn);
  55. BN_clear_free(bn);
  56. #if defined(OPENSSL_HAS_ECC) && defined(OPENSSL_HAS_NISTP256)
  57. eck = EC_KEY_new_by_curve_name(NID_X9_62_prime256v1);
  58. ASSERT_PTR_NE(eck, NULL);
  59. sshbuf_get_eckey(p1, eck);
  60. EC_KEY_free(eck);
  61. #endif /* defined(OPENSSL_HAS_ECC) && defined(OPENSSL_HAS_NISTP256) */
  62. #endif /* WITH_OPENSSL */
  63. sshbuf_free(p1);
  64. }
  65. static void
  66. onerror(void *fuzz)
  67. {
  68. fprintf(stderr, "Failed during fuzz:\n");
  69. fuzz_dump((struct fuzz *)fuzz);
  70. }
  71. void
  72. sshbuf_getput_fuzz_tests(void)
  73. {
  74. u_char blob[] = {
  75. /* u8 */
  76. 0xd0,
  77. /* u16 */
  78. 0xc0, 0xde,
  79. /* u32 */
  80. 0xfa, 0xce, 0xde, 0xad,
  81. /* u64 */
  82. 0xfe, 0xed, 0xac, 0x1d, 0x1f, 0x1c, 0xbe, 0xef,
  83. /* string */
  84. 0x00, 0x00, 0x00, 0x09,
  85. 'O', ' ', 'G', 'o', 'r', 'g', 'o', 'n', '!',
  86. /* bignum2 */
  87. 0x00, 0x00, 0x00, 0x14,
  88. 0x00,
  89. 0xf0, 0xe0, 0xd0, 0xc0, 0xb0, 0xa0, 0x90, 0x80,
  90. 0x70, 0x60, 0x50, 0x40, 0x30, 0x20, 0x10, 0x00,
  91. 0x7f, 0xff, 0x11,
  92. /* EC point (NIST-256 curve) */
  93. 0x00, 0x00, 0x00, 0x41,
  94. 0x04,
  95. 0x0c, 0x82, 0x80, 0x04, 0x83, 0x9d, 0x01, 0x06,
  96. 0xaa, 0x59, 0x57, 0x52, 0x16, 0x19, 0x13, 0x57,
  97. 0x34, 0xb4, 0x51, 0x45, 0x9d, 0xad, 0xb5, 0x86,
  98. 0x67, 0x7e, 0xf9, 0xdf, 0x55, 0x78, 0x49, 0x99,
  99. 0x4d, 0x19, 0x6b, 0x50, 0xf0, 0xb4, 0xe9, 0x4b,
  100. 0x3c, 0x73, 0xe3, 0xa9, 0xd4, 0xcd, 0x9d, 0xf2,
  101. 0xc8, 0xf9, 0xa3, 0x5e, 0x42, 0xbd, 0xd0, 0x47,
  102. 0x55, 0x0f, 0x69, 0xd8, 0x0e, 0xc2, 0x3c, 0xd4,
  103. };
  104. struct fuzz *fuzz;
  105. u_int fuzzers = FUZZ_1_BIT_FLIP | FUZZ_2_BIT_FLIP |
  106. FUZZ_1_BYTE_FLIP | FUZZ_2_BYTE_FLIP |
  107. FUZZ_TRUNCATE_START | FUZZ_TRUNCATE_END;
  108. if (test_is_fast())
  109. fuzzers &= ~(FUZZ_2_BYTE_FLIP|FUZZ_2_BIT_FLIP);
  110. TEST_START("fuzz blob parsing");
  111. fuzz = fuzz_begin(fuzzers, blob, sizeof(blob));
  112. TEST_ONERROR(onerror, fuzz);
  113. for(; !fuzz_done(fuzz); fuzz_next(fuzz))
  114. attempt_parse_blob(blob, sizeof(blob));
  115. fuzz_cleanup(fuzz);
  116. TEST_DONE();
  117. TEST_ONERROR(NULL, NULL);
  118. }