| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469 | 
							- /* Fuzz testing for the nanopb core.
 
-  * Attempts to verify all the properties defined in the security model document.
 
-  *
 
-  * This program can run in three configurations:
 
-  * - Standalone fuzzer, generating its own inputs and testing against them.
 
-  * - Fuzzing target, reading input on stdin.
 
-  * - LLVM libFuzzer target, taking input as a function argument.
 
-  */
 
- #include <pb_decode.h>
 
- #include <pb_encode.h>
 
- #include <stdio.h>
 
- #include <stdlib.h>
 
- #include <string.h>
 
- #include <assert.h>
 
- #include <malloc_wrappers.h>
 
- #include "random_data.h"
 
- #include "validation.h"
 
- #include "flakystream.h"
 
- #include "test_helpers.h"
 
- #include "alltypes_static.pb.h"
 
- #include "alltypes_pointer.pb.h"
 
- #include "alltypes_callback.pb.h"
 
- #include "alltypes_proto3_static.pb.h"
 
- #include "alltypes_proto3_pointer.pb.h"
 
- /* Longer buffer size allows hitting more branches, but lowers performance. */
 
- #ifndef FUZZTEST_BUFSIZE
 
- #define FUZZTEST_BUFSIZE 256*1024
 
- #endif
 
- #ifndef FUZZTEST_MAX_STANDALONE_BUFSIZE
 
- #define FUZZTEST_MAX_STANDALONE_BUFSIZE 16384
 
- #endif
 
- static size_t g_bufsize = FUZZTEST_BUFSIZE;
 
- /* Focusing on a single test case at a time improves fuzzing performance.
 
-  * If no test case is specified, enable all tests.
 
-  */
 
- #if !defined(FUZZTEST_PROTO2_STATIC) && \
 
-     !defined(FUZZTEST_PROTO3_STATIC) && \
 
-     !defined(FUZZTEST_PROTO2_POINTER) && \
 
-     !defined(FUZZTEST_PROTO3_POINTER) && \
 
-     !defined(FUZZTEST_IO_ERRORS)
 
- #define FUZZTEST_PROTO2_STATIC
 
- #define FUZZTEST_PROTO3_STATIC
 
- #define FUZZTEST_PROTO2_POINTER
 
- #define FUZZTEST_PROTO3_POINTER
 
- #define FUZZTEST_IO_ERRORS
 
- #endif
 
- static uint32_t xor32_checksum(const void *data, size_t len)
 
- {
 
-     const uint8_t *buf = (const uint8_t*)data;
 
-     uint32_t checksum = 1234;
 
-     for (; len > 0; len--)
 
-     {
 
-         checksum ^= checksum << 13;
 
-         checksum ^= checksum >> 17;
 
-         checksum ^= checksum << 5;
 
-         checksum += *buf++;
 
-     }
 
-     return checksum;
 
- }
 
- static bool do_decode(const uint8_t *buffer, size_t msglen, size_t structsize, const pb_msgdesc_t *msgtype, unsigned flags, bool assert_success)
 
- {
 
-     bool status;
 
-     pb_istream_t stream;
 
-     size_t initial_alloc_count = get_alloc_count();
 
-     uint8_t *buf2 = malloc_with_check(g_bufsize); /* This is just to match the amount of memory allocations in do_roundtrips(). */
 
-     void *msg = malloc_with_check(structsize);
 
-     alltypes_static_TestExtension extmsg = alltypes_static_TestExtension_init_zero;
 
-     pb_extension_t ext = pb_extension_init_zero;
 
-     assert(msg);
 
-     memset(msg, 0, structsize);
 
-     ext.type = &alltypes_static_TestExtension_testextension;
 
-     ext.dest = &extmsg;
 
-     ext.next = NULL;
 
-     if (msgtype == alltypes_static_AllTypes_fields)
 
-     {
 
-         ((alltypes_static_AllTypes*)msg)->extensions = &ext;
 
-     }
 
-     else if (msgtype == alltypes_pointer_AllTypes_fields)
 
-     {
 
-         ((alltypes_pointer_AllTypes*)msg)->extensions = &ext;
 
-     }
 
-     stream = pb_istream_from_buffer(buffer, msglen);
 
-     status = pb_decode_ex(&stream, msgtype, msg, flags);
 
-     if (status)
 
-     {
 
-         validate_message(msg, structsize, msgtype);
 
-     }
 
-     if (assert_success)
 
-     {
 
-         if (!status) fprintf(stderr, "pb_decode: %s\n", PB_GET_ERROR(&stream));
 
-         assert(status);
 
-     }
 
-     pb_release(msgtype, msg);
 
-     free_with_check(msg);
 
-     free_with_check(buf2);
 
-     assert(get_alloc_count() == initial_alloc_count);
 
-     
 
-     return status;
 
- }
 
- static bool do_stream_decode(const uint8_t *buffer, size_t msglen, size_t fail_after, size_t structsize, const pb_msgdesc_t *msgtype, bool assert_success)
 
- {
 
-     bool status;
 
-     flakystream_t stream;
 
-     size_t initial_alloc_count = get_alloc_count();
 
-     void *msg = malloc_with_check(structsize);
 
-     assert(msg);
 
-     memset(msg, 0, structsize);
 
-     flakystream_init(&stream, buffer, msglen, fail_after);
 
-     status = pb_decode(&stream.stream, msgtype, msg);
 
-     if (status)
 
-     {
 
-         validate_message(msg, structsize, msgtype);
 
-     }
 
-     if (assert_success)
 
-     {
 
-         if (!status) fprintf(stderr, "pb_decode: %s\n", PB_GET_ERROR(&stream.stream));
 
-         assert(status);
 
-     }
 
-     pb_release(msgtype, msg);
 
-     free_with_check(msg);
 
-     assert(get_alloc_count() == initial_alloc_count);
 
-     return status;
 
- }
 
- static int g_sentinel;
 
- static bool field_callback(pb_istream_t *stream, const pb_field_t *field, void **arg)
 
- {
 
-     assert(stream);
 
-     assert(field);
 
-     assert(*arg == &g_sentinel);
 
-     return pb_read(stream, NULL, stream->bytes_left);
 
- }
 
- static bool submsg_callback(pb_istream_t *stream, const pb_field_t *field, void **arg)
 
- {
 
-     assert(stream);
 
-     assert(field);
 
-     assert(*arg == &g_sentinel);
 
-     return true;
 
- }
 
- bool do_callback_decode(const uint8_t *buffer, size_t msglen, bool assert_success)
 
- {
 
-     bool status;
 
-     pb_istream_t stream;
 
-     size_t initial_alloc_count = get_alloc_count();
 
-     alltypes_callback_AllTypes *msg = malloc_with_check(sizeof(alltypes_callback_AllTypes));
 
-     assert(msg);
 
-     memset(msg, 0, sizeof(alltypes_callback_AllTypes));
 
-     stream = pb_istream_from_buffer(buffer, msglen);
 
-     msg->rep_int32.funcs.decode = &field_callback;
 
-     msg->rep_int32.arg = &g_sentinel;
 
-     msg->rep_string.funcs.decode = &field_callback;
 
-     msg->rep_string.arg = &g_sentinel;
 
-     msg->rep_farray.funcs.decode = &field_callback;
 
-     msg->rep_farray.arg = &g_sentinel;
 
-     msg->req_limits.int64_min.funcs.decode = &field_callback;
 
-     msg->req_limits.int64_min.arg = &g_sentinel;
 
-     msg->cb_oneof.funcs.decode = &submsg_callback;
 
-     msg->cb_oneof.arg = &g_sentinel;
 
-     status = pb_decode(&stream, alltypes_callback_AllTypes_fields, msg);
 
-     if (assert_success)
 
-     {
 
-         if (!status) fprintf(stderr, "pb_decode: %s\n", PB_GET_ERROR(&stream));
 
-         assert(status);
 
-     }
 
-     pb_release(alltypes_callback_AllTypes_fields, msg);
 
-     free_with_check(msg);
 
-     assert(get_alloc_count() == initial_alloc_count);
 
-     return status;
 
- }
 
- /* Do a decode -> encode -> decode -> encode roundtrip */
 
- void do_roundtrip(const uint8_t *buffer, size_t msglen, size_t structsize, const pb_msgdesc_t *msgtype)
 
- {
 
-     bool status;
 
-     uint32_t checksum2, checksum3;
 
-     size_t msglen2, msglen3;
 
-     uint8_t *buf2 = malloc_with_check(g_bufsize);
 
-     void *msg = malloc_with_check(structsize);
 
-     /* For proto2 types, we also test extension fields */
 
-     alltypes_static_TestExtension extmsg = alltypes_static_TestExtension_init_zero;
 
-     pb_extension_t ext = pb_extension_init_zero;
 
-     pb_extension_t **ext_field = NULL;
 
-     ext.type = &alltypes_static_TestExtension_testextension;
 
-     ext.dest = &extmsg;
 
-     ext.next = NULL;
 
-     assert(buf2 && msg);
 
-     if (msgtype == alltypes_static_AllTypes_fields)
 
-     {
 
-         ext_field = &((alltypes_static_AllTypes*)msg)->extensions;
 
-     }
 
-     else if (msgtype == alltypes_pointer_AllTypes_fields)
 
-     {
 
-         ext_field = &((alltypes_pointer_AllTypes*)msg)->extensions;
 
-     }
 
-     
 
-     /* Decode and encode the input data.
 
-      * This will bring it into canonical format.
 
-      */
 
-     {
 
-         pb_istream_t stream = pb_istream_from_buffer(buffer, msglen);
 
-         memset(msg, 0, structsize);
 
-         if (ext_field) *ext_field = &ext;
 
-         status = pb_decode(&stream, msgtype, msg);
 
-         if (!status) fprintf(stderr, "pb_decode: %s\n", PB_GET_ERROR(&stream));
 
-         assert(status);
 
-         validate_message(msg, structsize, msgtype);
 
-     }
 
-     
 
-     {
 
-         pb_ostream_t stream = pb_ostream_from_buffer(buf2, g_bufsize);
 
-         status = pb_encode(&stream, msgtype, msg);
 
-         /* Some messages expand when re-encoding and might no longer fit
 
-          * in the buffer. */
 
-         if (!status && strcmp(PB_GET_ERROR(&stream), "stream full") != 0)
 
-         {
 
-             fprintf(stderr, "pb_encode: %s\n", PB_GET_ERROR(&stream));
 
-             assert(status);
 
-         }
 
-         msglen2 = stream.bytes_written;
 
-         checksum2 = xor32_checksum(buf2, msglen2);
 
-     }
 
-     
 
-     pb_release(msgtype, msg);
 
-     /* Then decode from canonical format and re-encode. Result should remain the same. */
 
-     if (status)
 
-     {
 
-         pb_istream_t stream = pb_istream_from_buffer(buf2, msglen2);
 
-         memset(msg, 0, structsize);
 
-         if (ext_field) *ext_field = &ext;
 
-         status = pb_decode(&stream, msgtype, msg);
 
-         if (!status) fprintf(stderr, "pb_decode: %s\n", PB_GET_ERROR(&stream));
 
-         assert(status);
 
-         validate_message(msg, structsize, msgtype);
 
-     }
 
-     
 
-     if (status)
 
-     {
 
-         pb_ostream_t stream = pb_ostream_from_buffer(buf2, g_bufsize);
 
-         status = pb_encode(&stream, msgtype, msg);
 
-         if (!status) fprintf(stderr, "pb_encode: %s\n", PB_GET_ERROR(&stream));
 
-         assert(status);
 
-         msglen3 = stream.bytes_written;
 
-         checksum3 = xor32_checksum(buf2, msglen3);
 
-         assert(msglen2 == msglen3);
 
-         assert(checksum2 == checksum3);
 
-     }
 
-     
 
-     pb_release(msgtype, msg);
 
-     free_with_check(msg);
 
-     free_with_check(buf2);
 
- }
 
- /* Run all enabled test cases for a given input */
 
- void do_roundtrips(const uint8_t *data, size_t size, bool expect_valid)
 
- {
 
-     size_t initial_alloc_count = get_alloc_count();
 
-     PB_UNUSED(expect_valid); /* Potentially unused depending on configuration */
 
- #ifdef FUZZTEST_PROTO2_STATIC
 
-     if (do_decode(data, size, sizeof(alltypes_static_AllTypes), alltypes_static_AllTypes_fields, 0, expect_valid))
 
-     {
 
-         do_roundtrip(data, size, sizeof(alltypes_static_AllTypes), alltypes_static_AllTypes_fields);
 
-         do_stream_decode(data, size, SIZE_MAX, sizeof(alltypes_static_AllTypes), alltypes_static_AllTypes_fields, true);
 
-         do_callback_decode(data, size, true);
 
-     }
 
- #endif
 
- #ifdef FUZZTEST_PROTO3_STATIC
 
-     if (do_decode(data, size, sizeof(alltypes_proto3_static_AllTypes), alltypes_proto3_static_AllTypes_fields, 0, expect_valid))
 
-     {
 
-         do_roundtrip(data, size, sizeof(alltypes_proto3_static_AllTypes), alltypes_proto3_static_AllTypes_fields);
 
-         do_stream_decode(data, size, SIZE_MAX, sizeof(alltypes_proto3_static_AllTypes), alltypes_proto3_static_AllTypes_fields, true);
 
-     }
 
- #endif
 
- #ifdef FUZZTEST_PROTO2_POINTER
 
-     if (do_decode(data, size, sizeof(alltypes_pointer_AllTypes), alltypes_pointer_AllTypes_fields, 0, expect_valid))
 
-     {
 
-         do_roundtrip(data, size, sizeof(alltypes_pointer_AllTypes), alltypes_pointer_AllTypes_fields);
 
-         do_stream_decode(data, size, SIZE_MAX, sizeof(alltypes_pointer_AllTypes), alltypes_pointer_AllTypes_fields, true);
 
-     }
 
- #endif
 
- #ifdef FUZZTEST_PROTO3_POINTER
 
-     if (do_decode(data, size, sizeof(alltypes_proto3_pointer_AllTypes), alltypes_proto3_pointer_AllTypes_fields, 0, expect_valid))
 
-     {
 
-         do_roundtrip(data, size, sizeof(alltypes_proto3_pointer_AllTypes), alltypes_proto3_pointer_AllTypes_fields);
 
-         do_stream_decode(data, size, SIZE_MAX, sizeof(alltypes_proto3_pointer_AllTypes), alltypes_proto3_pointer_AllTypes_fields, true);
 
-     }
 
- #endif
 
- #ifdef FUZZTEST_IO_ERRORS
 
-     {
 
-         size_t orig_max_alloc_bytes = get_max_alloc_bytes();
 
-         /* Test decoding when error conditions occur.
 
-          * The decoding will end either when running out of memory or when stream returns IO error.
 
-          * Testing proto2 is enough for good coverage here, as it has a superset of the field types of proto3.
 
-          */
 
-         set_max_alloc_bytes(get_alloc_bytes() + 4096);
 
-         do_stream_decode(data, size, size - 16, sizeof(alltypes_static_AllTypes), alltypes_static_AllTypes_fields, false);
 
-         do_stream_decode(data, size, size - 16, sizeof(alltypes_pointer_AllTypes), alltypes_pointer_AllTypes_fields, false);
 
-         set_max_alloc_bytes(orig_max_alloc_bytes);
 
-     }
 
-     /* Test pb_decode_ex() modes */
 
-     do_decode(data, size, sizeof(alltypes_static_AllTypes), alltypes_static_AllTypes_fields, PB_DECODE_NOINIT | PB_DECODE_DELIMITED, false);
 
-     do_decode(data, size, sizeof(alltypes_static_AllTypes), alltypes_static_AllTypes_fields, PB_DECODE_NULLTERMINATED, false);
 
-     /* Test callbacks also when message is not valid */
 
-     do_callback_decode(data, size, false);
 
- #endif
 
-     assert(get_alloc_count() == initial_alloc_count);
 
- }
 
- /* Fuzzer stub for Google OSSFuzz integration */
 
- int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size)
 
- {
 
-     if (size > g_bufsize)
 
-         return 0;
 
-     do_roundtrips(data, size, false);
 
-     return 0;
 
- }
 
- #ifndef LLVMFUZZER
 
- static bool generate_base_message(uint8_t *buffer, size_t *msglen)
 
- {
 
-     pb_ostream_t stream;
 
-     bool status;
 
-     static const alltypes_static_AllTypes initval = alltypes_static_AllTypes_init_default;
 
-     /* Allocate a message and fill it with defaults */
 
-     alltypes_static_AllTypes *msg = malloc_with_check(sizeof(alltypes_static_AllTypes));
 
-     memcpy(msg, &initval, sizeof(initval));
 
-     /* Apply randomness to the data before encoding */
 
-     while (rand_int(0, 7))
 
-         rand_mess((uint8_t*)msg, sizeof(alltypes_static_AllTypes));
 
-     msg->extensions = NULL;
 
-     stream = pb_ostream_from_buffer(buffer, g_bufsize);
 
-     status = pb_encode(&stream, alltypes_static_AllTypes_fields, msg);
 
-     assert(stream.bytes_written <= g_bufsize);
 
-     assert(stream.bytes_written <= alltypes_static_AllTypes_size);
 
-     
 
-     *msglen = stream.bytes_written;
 
-     pb_release(alltypes_static_AllTypes_fields, msg);
 
-     free_with_check(msg);
 
-     
 
-     return status;
 
- }
 
- /* Stand-alone fuzzer iteration, generates random data itself */
 
- static void run_iteration()
 
- {
 
-     uint8_t *buffer = malloc_with_check(g_bufsize);
 
-     size_t msglen;
 
-     
 
-     /* Fill the whole buffer with noise, to prepare for length modifications */
 
-     rand_fill(buffer, g_bufsize);
 
-     if (generate_base_message(buffer, &msglen))
 
-     {
 
-         rand_protobuf_noise(buffer, g_bufsize, &msglen);
 
-     
 
-         /* At this point the message should always be valid */
 
-         do_roundtrips(buffer, msglen, true);
 
-         
 
-         /* Apply randomness to the encoded data */
 
-         while (rand_bool())
 
-             rand_mess(buffer, g_bufsize);
 
-         
 
-         /* Apply randomness to encoded data length */
 
-         if (rand_bool())
 
-             msglen = rand_int(0, g_bufsize);
 
-         
 
-         /* In this step the message may be valid or invalid */
 
-         do_roundtrips(buffer, msglen, false);
 
-     }
 
-     
 
-     free_with_check(buffer);
 
-     assert(get_alloc_count() == 0);
 
- }
 
- int main(int argc, char **argv)
 
- {
 
-     int i;
 
-     int iterations;
 
-     if (argc >= 2)
 
-     {
 
-         /* Run in stand-alone mode */
 
-         if (g_bufsize > FUZZTEST_MAX_STANDALONE_BUFSIZE)
 
-             g_bufsize = FUZZTEST_MAX_STANDALONE_BUFSIZE;
 
-         random_set_seed(strtoul(argv[1], NULL, 0));
 
-         iterations = (argc >= 3) ? atol(argv[2]) : 10000;
 
-         for (i = 0; i < iterations; i++)
 
-         {
 
-             printf("Iteration %d/%d, seed %lu\n", i, iterations, (unsigned long)random_get_seed());
 
-             run_iteration();
 
-         }
 
-     }
 
-     else
 
-     {
 
-         /* Run as a stub for afl-fuzz and similar */
 
-         uint8_t *buffer;
 
-         size_t msglen;
 
-         buffer = malloc_with_check(g_bufsize);
 
-         SET_BINARY_MODE(stdin);
 
-         msglen = fread(buffer, 1, g_bufsize, stdin);
 
-         LLVMFuzzerTestOneInput(buffer, msglen);
 
-         if (!feof(stdin))
 
-         {
 
-             /* Read any leftover input data if our buffer is smaller than
 
-              * message size. */
 
-             fprintf(stderr, "Warning: input message too long\n");
 
-             while (fread(buffer, 1, g_bufsize, stdin) == g_bufsize);
 
-         }
 
-         free_with_check(buffer);
 
-     }
 
-     
 
-     return 0;
 
- }
 
- #endif
 
 
  |