2023-06-05 00:16:05 +01:00
|
|
|
/* SPDX-License-Identifier: MPL-2.0 */
|
2020-04-25 13:53:53 +01:00
|
|
|
|
|
|
|
#ifdef ZMQ_USE_FUZZING_ENGINE
|
|
|
|
#include <fuzzer/FuzzedDataProvider.h>
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#include "testutil.hpp"
|
|
|
|
#include "testutil_unity.hpp"
|
|
|
|
|
|
|
|
// Test that the ZMTP engine handles invalid handshake when connecting
|
|
|
|
// https://rfc.zeromq.org/spec/37/
|
|
|
|
extern "C" int LLVMFuzzerTestOneInput (const uint8_t *data, size_t size)
|
|
|
|
{
|
|
|
|
setup_test_context ();
|
|
|
|
char my_endpoint[MAX_SOCKET_STRING];
|
|
|
|
fd_t server = bind_socket_resolve_port ("127.0.0.1", "0", my_endpoint);
|
|
|
|
|
2020-05-04 01:54:34 +01:00
|
|
|
void *client = test_context_socket (ZMQ_SUB);
|
2020-05-04 22:03:31 +01:00
|
|
|
// As per API by default there's no limit to the size of a message,
|
|
|
|
// but the sanitizer allocator will barf over a gig or so
|
|
|
|
int64_t max_msg_size = 64 * 1024 * 1024;
|
|
|
|
TEST_ASSERT_SUCCESS_ERRNO (
|
|
|
|
zmq_setsockopt (client, ZMQ_MAXMSGSIZE, &max_msg_size, sizeof (int64_t)));
|
2020-05-04 01:54:34 +01:00
|
|
|
TEST_ASSERT_SUCCESS_ERRNO (zmq_setsockopt (client, ZMQ_SUBSCRIBE, "", 0));
|
2020-04-25 13:53:53 +01:00
|
|
|
TEST_ASSERT_SUCCESS_ERRNO (zmq_connect (client, my_endpoint));
|
|
|
|
|
|
|
|
fd_t server_accept =
|
|
|
|
TEST_ASSERT_SUCCESS_RAW_ERRNO (accept (server, NULL, NULL));
|
2020-05-04 01:54:34 +01:00
|
|
|
|
|
|
|
// If there is not enough data for a full greeting, just send what we can
|
|
|
|
// Otherwise send greeting first, as expected by the protocol
|
|
|
|
uint8_t buf[64];
|
|
|
|
if (size >= 64) {
|
|
|
|
send (server_accept, (void *) data, 64, MSG_NOSIGNAL);
|
|
|
|
data += 64;
|
|
|
|
size -= 64;
|
|
|
|
}
|
|
|
|
recv (server_accept, buf, 64, 0);
|
|
|
|
msleep (250);
|
2020-04-25 13:53:53 +01:00
|
|
|
for (ssize_t sent = 0; size > 0 && (sent != -1 || errno == EINTR);
|
|
|
|
size -= sent > 0 ? sent : 0, data += sent > 0 ? sent : 0)
|
|
|
|
sent = send (server_accept, (const char *) data, size, MSG_NOSIGNAL);
|
|
|
|
msleep (250);
|
|
|
|
|
2020-05-04 01:54:34 +01:00
|
|
|
zmq_msg_t msg;
|
|
|
|
zmq_msg_init (&msg);
|
2020-05-06 22:26:03 +01:00
|
|
|
while (-1 != zmq_msg_recv (&msg, client, ZMQ_DONTWAIT)) {
|
2020-05-04 01:54:34 +01:00
|
|
|
zmq_msg_close (&msg);
|
2020-05-06 22:26:03 +01:00
|
|
|
zmq_msg_init (&msg);
|
|
|
|
}
|
2020-05-04 01:54:34 +01:00
|
|
|
|
2020-04-25 13:53:53 +01:00
|
|
|
close (server_accept);
|
|
|
|
close (server);
|
|
|
|
|
|
|
|
test_context_socket_close_zero_linger (client);
|
|
|
|
teardown_test_context ();
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifndef ZMQ_USE_FUZZING_ENGINE
|
|
|
|
void test_connect_null_fuzzer ()
|
|
|
|
{
|
2020-05-04 22:30:37 +01:00
|
|
|
uint8_t **data;
|
|
|
|
size_t *len, num_cases = 0;
|
2020-05-04 01:54:34 +01:00
|
|
|
if (fuzzer_corpus_encode (
|
2020-07-04 14:53:03 +01:00
|
|
|
"tests/libzmq-fuzz-corpora/test_connect_null_fuzzer_seed_corpus",
|
|
|
|
&data, &len, &num_cases)
|
2020-05-04 01:54:34 +01:00
|
|
|
!= 0)
|
|
|
|
exit (77);
|
|
|
|
|
2020-05-04 22:30:37 +01:00
|
|
|
while (num_cases-- > 0) {
|
|
|
|
TEST_ASSERT_SUCCESS_ERRNO (
|
|
|
|
LLVMFuzzerTestOneInput (data[num_cases], len[num_cases]));
|
|
|
|
free (data[num_cases]);
|
|
|
|
}
|
2020-05-04 01:54:34 +01:00
|
|
|
|
|
|
|
free (data);
|
2020-05-04 22:30:37 +01:00
|
|
|
free (len);
|
2020-04-25 13:53:53 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
int main (int argc, char **argv)
|
|
|
|
{
|
2020-05-06 20:56:36 +01:00
|
|
|
setup_test_environment ();
|
2020-04-25 13:53:53 +01:00
|
|
|
|
|
|
|
UNITY_BEGIN ();
|
|
|
|
RUN_TEST (test_connect_null_fuzzer);
|
|
|
|
|
|
|
|
return UNITY_END ();
|
|
|
|
}
|
|
|
|
#endif
|