| /* $OpenBSD: test_sshbuf_getput_fuzz.c,v 1.2 2014/05/02 02:54:00 djm Exp $ */ |
| /* |
| * Regress test for sshbuf.h buffer API |
| * |
| * Placed in the public domain |
| */ |
| |
| #include "includes.h" |
| |
| #include <sys/types.h> |
| #include <sys/param.h> |
| #include <stdio.h> |
| #ifdef HAVE_STDINT_H |
| # include <stdint.h> |
| #endif |
| #include <stdlib.h> |
| #include <string.h> |
| |
| #include <openssl/bn.h> |
| #include <openssl/ec.h> |
| #include <openssl/objects.h> |
| |
| #include "../test_helper/test_helper.h" |
| #include "ssherr.h" |
| #include "sshbuf.h" |
| |
| void sshbuf_getput_fuzz_tests(void); |
| |
| static void |
| attempt_parse_blob(u_char *blob, size_t len) |
| { |
| struct sshbuf *p1; |
| BIGNUM *bn; |
| #ifdef OPENSSL_HAS_NISTP256 |
| EC_KEY *eck; |
| #endif |
| u_char *s; |
| size_t l; |
| u_int8_t u8; |
| u_int16_t u16; |
| u_int32_t u32; |
| u_int64_t u64; |
| |
| p1 = sshbuf_new(); |
| ASSERT_PTR_NE(p1, NULL); |
| ASSERT_INT_EQ(sshbuf_put(p1, blob, len), 0); |
| sshbuf_get_u8(p1, &u8); |
| sshbuf_get_u16(p1, &u16); |
| sshbuf_get_u32(p1, &u32); |
| sshbuf_get_u64(p1, &u64); |
| if (sshbuf_get_string(p1, &s, &l) == 0) { |
| bzero(s, l); |
| free(s); |
| } |
| bn = BN_new(); |
| sshbuf_get_bignum1(p1, bn); |
| BN_clear_free(bn); |
| bn = BN_new(); |
| sshbuf_get_bignum2(p1, bn); |
| BN_clear_free(bn); |
| #ifdef OPENSSL_HAS_NISTP256 |
| eck = EC_KEY_new_by_curve_name(NID_X9_62_prime256v1); |
| ASSERT_PTR_NE(eck, NULL); |
| sshbuf_get_eckey(p1, eck); |
| EC_KEY_free(eck); |
| #endif |
| sshbuf_free(p1); |
| } |
| |
| |
| static void |
| onerror(void *fuzz) |
| { |
| fprintf(stderr, "Failed during fuzz:\n"); |
| fuzz_dump((struct fuzz *)fuzz); |
| } |
| |
| void |
| sshbuf_getput_fuzz_tests(void) |
| { |
| u_char blob[] = { |
| /* u8 */ |
| 0xd0, |
| /* u16 */ |
| 0xc0, 0xde, |
| /* u32 */ |
| 0xfa, 0xce, 0xde, 0xad, |
| /* u64 */ |
| 0xfe, 0xed, 0xac, 0x1d, 0x1f, 0x1c, 0xbe, 0xef, |
| /* string */ |
| 0x00, 0x00, 0x00, 0x09, |
| 'O', ' ', 'G', 'o', 'r', 'g', 'o', 'n', '!', |
| /* bignum1 */ |
| 0x79, |
| 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, |
| 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, |
| /* bignum2 */ |
| 0x00, 0x00, 0x00, 0x14, |
| 0x00, |
| 0xf0, 0xe0, 0xd0, 0xc0, 0xb0, 0xa0, 0x90, 0x80, |
| 0x70, 0x60, 0x50, 0x40, 0x30, 0x20, 0x10, 0x00, |
| 0x7f, 0xff, 0x11, |
| /* EC point (NIST-256 curve) */ |
| 0x00, 0x00, 0x00, 0x41, |
| 0x04, |
| 0x0c, 0x82, 0x80, 0x04, 0x83, 0x9d, 0x01, 0x06, |
| 0xaa, 0x59, 0x57, 0x52, 0x16, 0x19, 0x13, 0x57, |
| 0x34, 0xb4, 0x51, 0x45, 0x9d, 0xad, 0xb5, 0x86, |
| 0x67, 0x7e, 0xf9, 0xdf, 0x55, 0x78, 0x49, 0x99, |
| 0x4d, 0x19, 0x6b, 0x50, 0xf0, 0xb4, 0xe9, 0x4b, |
| 0x3c, 0x73, 0xe3, 0xa9, 0xd4, 0xcd, 0x9d, 0xf2, |
| 0xc8, 0xf9, 0xa3, 0x5e, 0x42, 0xbd, 0xd0, 0x47, |
| 0x55, 0x0f, 0x69, 0xd8, 0x0e, 0xc2, 0x3c, 0xd4, |
| }; |
| struct fuzz *fuzz; |
| |
| TEST_START("fuzz blob parsing"); |
| fuzz = fuzz_begin(FUZZ_1_BIT_FLIP | FUZZ_2_BIT_FLIP | |
| FUZZ_1_BYTE_FLIP | FUZZ_2_BYTE_FLIP | |
| FUZZ_TRUNCATE_START | FUZZ_TRUNCATE_END, blob, sizeof(blob)); |
| TEST_ONERROR(onerror, fuzz); |
| for(; !fuzz_done(fuzz); fuzz_next(fuzz)) |
| attempt_parse_blob(blob, sizeof(blob)); |
| fuzz_cleanup(fuzz); |
| TEST_DONE(); |
| TEST_ONERROR(NULL, NULL); |
| } |
| |