| /* |
| * Copyright (C) 2017-2019 Felix Weinrank |
| * |
| * All rights reserved. |
| * |
| * Redistribution and use in source and binary forms, with or without |
| * modification, are permitted provided that the following conditions |
| * are met: |
| * 1. Redistributions of source code must retain the above copyright |
| * notice, this list of conditions and the following disclaimer. |
| * 2. Redistributions in binary form must reproduce the above copyright |
| * notice, this list of conditions and the following disclaimer in the |
| * documentation and/or other materials provided with the distribution. |
| * 3. Neither the name of the project nor the names of its contributors |
| * may be used to endorse or promote products derived from this software |
| * without specific prior written permission. |
| * |
| * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND |
| * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
| * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
| * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE |
| * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL |
| * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS |
| * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
| * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT |
| * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
| * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
| * SUCH DAMAGE. |
| */ |
| |
| #include <stdio.h> |
| #include <stdlib.h> |
| #include <string.h> |
| #include <stdarg.h> |
| #include <sys/time.h> |
| #include <usrsctp.h> |
| #include "../programs/programs_helper.h" |
| |
| //#define FUZZ_VERBOSE |
| #define FUZZ_INTERLEAVING |
| #define FUZZ_EXPLICIT_EOR |
| #define FUZZ_STREAM_RESET |
| #define FUZZ_DISABLE_LINGER |
| |
| #define BUFFERSIZE 4096 |
| |
| static uint32_t assoc_vtag = 0; |
| |
| #ifdef FUZZ_VERBOSE |
| #define fuzzer_printf(...) \ |
| do { \ |
| fprintf(stderr, "[P]"); \ |
| debug_printf_runtime(); \ |
| fprintf(stderr, __VA_ARGS__); \ |
| } while (0) |
| #else |
| #define fuzzer_printf(...) |
| #endif |
| |
| static void |
| dump_packet(const void *buffer, size_t bufferlen, int inout) { |
| #ifdef FUZZ_VERBOSE |
| static char *dump_buf; |
| if ((dump_buf = usrsctp_dumppacket(buffer, bufferlen, inout)) != NULL) { |
| fprintf(stderr, "%s", dump_buf); |
| usrsctp_freedumpbuffer(dump_buf); |
| } |
| #endif |
| } |
| |
| static int |
| conn_output(void *addr, void *buf, size_t length, uint8_t tos, uint8_t set_df) |
| { |
| struct sctp_init_chunk *init_chunk; |
| const char *init_chunk_first_bytes = "\x13\x88\x13\x89\x00\x00\x00\x00\x00\x00\x00\x00\x01"; |
| // length >= (12 Common + 16 min INIT) |
| if ((length >= 28) && (memcmp(buf, init_chunk_first_bytes, 12) == 0)) { |
| //fuzzer_printf("length %d / sizeof %lu\n", length, sizeof(struct sctp_common_header)); |
| init_chunk = (struct sctp_init_chunk*) ((char *)buf + sizeof(struct sctp_common_header)); |
| fuzzer_printf("Found outgoing INIT, extracting VTAG : %u\n", init_chunk->initiate_tag); |
| assoc_vtag = init_chunk->initiate_tag; |
| } |
| |
| dump_packet(buf, length, SCTP_DUMP_OUTBOUND); |
| return (0); |
| } |
| |
| |
| static void |
| handle_upcall(struct socket *sock, void *arg, int flgs) |
| { |
| fuzzer_printf("handle_upcall()\n"); |
| int events = usrsctp_get_events(sock); |
| |
| while (events & SCTP_EVENT_READ) { |
| struct sctp_recvv_rn rn; |
| ssize_t n; |
| struct sockaddr_in addr; |
| char *buf = calloc(1, BUFFERSIZE); |
| int flags = 0; |
| socklen_t len = (socklen_t)sizeof(struct sockaddr_in); |
| unsigned int infotype = 0; |
| socklen_t infolen = sizeof(struct sctp_recvv_rn); |
| memset(&rn, 0, sizeof(struct sctp_recvv_rn)); |
| n = usrsctp_recvv(sock, buf, BUFFERSIZE, (struct sockaddr *) &addr, &len, (void *)&rn, &infolen, &infotype, &flags); |
| fuzzer_printf("usrsctp_recvv() - returned %zd\n", n); |
| |
| if (flags & MSG_NOTIFICATION) { |
| fuzzer_printf("NOTIFICATION received\n"); |
| #ifdef FUZZ_VERBOSE |
| handle_notification((union sctp_notification *)buf, n); |
| #endif |
| } else { |
| fuzzer_printf("DATA received\n"); |
| } |
| |
| free(buf); |
| |
| if (n <= 0) { |
| break; |
| } |
| |
| events = usrsctp_get_events(sock); |
| } |
| } |
| |
| |
| int |
| initialize_fuzzer(void) { |
| #ifdef FUZZ_VERBOSE |
| usrsctp_init(0, conn_output, debug_printf_stack); |
| #else |
| usrsctp_init(0, conn_output, NULL); |
| #endif |
| |
| usrsctp_enable_crc32c_offload(); |
| /* set up a connected UDP socket */ |
| #ifdef SCTP_DEBUG |
| usrsctp_sysctl_set_sctp_debug_on(SCTP_DEBUG_ALL); |
| #endif |
| usrsctp_register_address((void *)1); |
| |
| fuzzer_printf("usrsctp initialized\n"); |
| return (1); |
| } |
| |
| |
| int |
| LLVMFuzzerTestOneInput(const uint8_t* data, size_t data_size) |
| { |
| static int initialized; |
| char *fuzzed_packet_buffer; |
| struct sockaddr_in bind4; |
| struct sockaddr_conn sconn; |
| struct socket *socket_client; |
| struct linger so_linger; |
| struct sctp_event event; |
| unsigned long i; |
| struct sctp_common_header* common_header; |
| uint16_t event_types[] = { |
| SCTP_ASSOC_CHANGE, |
| SCTP_PEER_ADDR_CHANGE, |
| SCTP_SEND_FAILED_EVENT, |
| SCTP_REMOTE_ERROR, |
| SCTP_SHUTDOWN_EVENT, |
| SCTP_ADAPTATION_INDICATION, |
| SCTP_PARTIAL_DELIVERY_EVENT |
| }; |
| uint8_t fuzzing_stage = FUZZING_STAGE; |
| int fuzzed_packet_size; |
| int enable; |
| #if defined(FUZZ_STREAM_RESET) || defined(FUZZ_INTERLEAVING) |
| struct sctp_assoc_value assoc_val; |
| #endif |
| |
| // WITH COMMON HEADER! |
| char fuzz_init_ack[] = "\x13\x89\x13\x88\x54\xc2\x7c\x46\x00\x00\x00\x00\x02\x00\x01\xf8" \ |
| "\xc7\xa1\xb0\x4d\x00\x1c\x71\xc7\x00\x0a\xff\xff\x03\x91\x94\x1b" \ |
| "\x80\x00\x00\x04\xc0\x00\x00\x04\x80\x08\x00\x09\xc0\x0f\xc1\x80" \ |
| "\x82\x00\x00\x00\x80\x02\x00\x24\x61\x6c\x7e\x52\x2a\xdb\xe0\xa2" \ |
| "\xaa\x78\x25\x1e\x12\xc5\x01\x9e\x4c\x60\x16\xdf\x01\x6d\xa1\xd5" \ |
| "\xcd\xbe\xa7\x5d\xa2\x73\xf4\x1b\x80\x04\x00\x08\x00\x03\x00\x01" \ |
| "\x80\x03\x00\x07\x00\x80\xc1\x00\x00\x06\x00\x14\x2a\x02\xc6\xa0" \ |
| "\x40\x15\x00\x11\x00\x00\x00\x00\x00\x00\x00\x83\x00\x05\x00\x08" \ |
| "\xd4\xc9\x79\x53\x00\x07\x01\x80\x4b\x41\x4d\x45\x2d\x42\x53\x44" \ |
| "\x20\x31\x2e\x31\x00\x00\x00\x00\x64\x11\x49\x00\x00\x00\x00\x00" \ |
| "\xac\xde\x0c\x00\x00\x00\x00\x00\x60\xea\x00\x00\x00\x00\x00\x00" \ |
| "\x00\x00\x00\x00\xb2\xd4\x38\x45\xc7\xa1\xb0\x4d\xd4\xc9\x79\x52" \ |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00" \ |
| "\xd4\xc9\x79\x53\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" \ |
| "\x05\x00\x00\x00\x00\x00\x00\x00\xd9\x05\x13\x89\x01\x01\x00\x00" \ |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x80\x45\x38\xd4\xb2" \ |
| "\x00\x1c\x71\xc7\x00\x01\xff\xff\xac\x40\x9b\x94\x80\x00\x00\x04" \ |
| "\xc0\x00\x00\x04\x80\x08\x00\x09\xc0\x0f\xc1\x80\x82\x00\x00\x00" \ |
| "\x80\x02\x00\x24\xc8\x24\x46\x8c\x7e\x88\x2e\xb7\x88\x8b\xdd\xa1" \ |
| "\x55\x8b\xb4\xc0\x26\xe3\x21\xbb\xb0\x66\xfd\xb2\xd4\xde\xf9\x77" \ |
| "\x4f\xe4\x7c\xbf\x80\x04\x00\x08\x00\x03\x00\x01\x80\x03\x00\x07" \ |
| "\x00\x80\xc1\x00\x00\x0c\x00\x08\x00\x05\x00\x06\x00\x06\x00\x14" \ |
| "\x2a\x02\xc6\xa0\x40\x15\x00\x11\x00\x00\x00\x00\x00\x00\x00\x82" \ |
| "\x00\x05\x00\x08\xd4\xc9\x79\x52\x02\x00\x01\xf8\xc7\xa1\xb0\x4d" \ |
| "\x00\x1c\x71\xc7\x00\x01\xff\xff\x03\x91\x94\x1b\x80\x00\x00\x04" \ |
| "\xc0\x00\x00\x04\x80\x08\x00\x09\xc0\x0f\xc1\x80\x82\x00\x00\x00" \ |
| "\x80\x02\x00\x24\x61\x6c\x7e\x52\x2a\xdb\xe0\xa2\xaa\x78\x25\x1e" \ |
| "\x12\xc5\x01\x9e\x4c\x60\x16\xdf\x01\x6d\xa1\xd5\xcd\xbe\xa7\x5d" \ |
| "\xa2\x73\xf4\x1b\x80\x04\x00\x08\x00\x03\x00\x01\x80\x03\x00\x07" \ |
| "\x00\x80\xc1\x00\x00\x06\x00\x14\x2a\x02\xc6\xa0\x40\x15\x00\x11" \ |
| "\x00\x00\x00\x00\x00\x00\x00\x83\x00\x05\x00\x08\xd4\xc9\x79\x53" \ |
| "\x64\x30\x8a\xb9\x7c\xe5\x93\x69\x52\xa9\xc8\xd5\xa1\x1b\x7d\xef" \ |
| "\xea\xfa\x23\x32"; |
| |
| // WITH COMMON HEADER! |
| char fuzz_cookie_ack[] = "\x13\x89\x13\x88\x54\xc2\x7c\x46\x00\x00\x00\x00\x0b\x00\x00\x04"; |
| |
| // WITH COMMON HEADER! |
| char fuzz_abort[] = "\x13\x89\x13\x88\x54\xc2\x7c\x46\x00\x00\x00\x00\x06\x00\x00\x08\x00\x0c\x00\x04"; |
| |
| // WITH COMMON HEADER! |
| char fuzz_i_data[] = "\x13\x89\x13\x88\x54\xc2\x7c\x46\x00\x00\x00\x00" \ |
| "\x00\x1b\x04\x42\xa3\x58\x90\xe2\xba\x9e\x8c\xfc\x08\x00\x45\x02" \ |
| "\x04\x34\x00\x00\x40\x00\x40\x84\x9a\x0b\xd4\xc9\x79\x52\xd4\xc9" \ |
| "\x79\x53\x65\x75\x13\x89\x11\x97\x93\x37\x26\x6c\xb7\x65\x40\x02" \ |
| "\x04\x14\x96\xff\xad\xc1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" \ |
| "\x00\x27\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" \ |
| "\x41\x41"; |
| |
| char fuzz_common_header[] = "\x13\x89\x13\x88\x54\xc2\x7c\x46\x00\x00\x00\x00"; |
| |
| if (!fuzzing_stage) { |
| fuzzing_stage = (data[0] % 5) + 1; |
| } |
| |
| fuzzer_printf("LLVMFuzzerTestOneInput() - Stage %d\n", fuzzing_stage); |
| |
| if (!initialized) { |
| initialized = initialize_fuzzer(); |
| } |
| |
| if (data_size < 8 || data_size > 65535) { |
| // Skip too small and too large packets |
| fuzzer_printf("data_size %zu makes no sense, skipping\n", data_size); |
| return (0); |
| } |
| |
| if ((socket_client = usrsctp_socket(AF_CONN, SOCK_STREAM, IPPROTO_SCTP, NULL, NULL, 0, 0)) == NULL) { |
| perror("usrsctp_socket"); |
| exit(EXIT_FAILURE); |
| } |
| |
| usrsctp_set_non_blocking(socket_client, 1); |
| |
| so_linger.l_onoff = 1; |
| so_linger.l_linger = 0; |
| if (usrsctp_setsockopt(socket_client, SOL_SOCKET, SO_LINGER, &so_linger, sizeof(struct linger)) < 0) { |
| perror("usrsctp_setsockopt 1"); |
| exit(EXIT_FAILURE); |
| } |
| |
| memset(&event, 0, sizeof(event)); |
| event.se_assoc_id = SCTP_FUTURE_ASSOC; |
| event.se_on = 1; |
| for (i = 0; i < (sizeof(event_types) / sizeof(uint16_t)); i++) { |
| event.se_type = event_types[i]; |
| if (usrsctp_setsockopt(socket_client, IPPROTO_SCTP, SCTP_EVENT, &event, sizeof(event)) < 0) { |
| perror("setsockopt SCTP_EVENT socket_client"); |
| exit(EXIT_FAILURE); |
| } |
| } |
| |
| enable = 1; |
| if (usrsctp_setsockopt(socket_client, IPPROTO_SCTP, SCTP_RECVRCVINFO, &enable, sizeof(enable)) < 0) { |
| perror("setsockopt SCTP_RECVRCVINFO socket_client"); |
| exit(EXIT_FAILURE); |
| } |
| |
| enable = 1; |
| if (usrsctp_setsockopt(socket_client, IPPROTO_SCTP, SCTP_RECVNXTINFO, &enable, sizeof(enable)) < 0) { |
| perror("setsockopt SCTP_RECVNXTINFO socket_client"); |
| exit(EXIT_FAILURE); |
| } |
| |
| #if defined(FUZZ_EXPLICIT_EOR) |
| enable = 1; |
| if (usrsctp_setsockopt(socket_client, IPPROTO_SCTP, SCTP_EXPLICIT_EOR, &enable, sizeof(enable)) < 0) { |
| perror("setsockopt SCTP_EXPLICIT_EOR socket_client"); |
| exit(EXIT_FAILURE); |
| } |
| #endif // defined(FUZZ_EXPLICIT_EOR) |
| |
| #if defined(FUZZ_STREAM_RESET) |
| assoc_val.assoc_id = SCTP_ALL_ASSOC; |
| assoc_val.assoc_value = SCTP_ENABLE_RESET_STREAM_REQ | SCTP_ENABLE_CHANGE_ASSOC_REQ; |
| if (usrsctp_setsockopt(socket_client, IPPROTO_SCTP, SCTP_ENABLE_STREAM_RESET, &assoc_val, sizeof(struct sctp_assoc_value)) < 0) { |
| perror("setsockopt SCTP_ENABLE_STREAM_RESET socket_client"); |
| exit(EXIT_FAILURE); |
| } |
| #endif //defined(FUZZ_STREAM_RESET) |
| |
| #if defined(FUZZ_INTERLEAVING) |
| #if !defined(SCTP_INTERLEAVING_SUPPORTED) |
| #define SCTP_INTERLEAVING_SUPPORTED 0x00001206 |
| #endif // !defined(SCTP_INTERLEAVING_SUPPORTED) |
| enable = 2; |
| if (usrsctp_setsockopt(socket_client, IPPROTO_SCTP, SCTP_FRAGMENT_INTERLEAVE, &enable, sizeof(enable)) < 0) { |
| perror("usrsctp_setsockopt SCTP_FRAGMENT_INTERLEAVE socket_client"); |
| exit(EXIT_FAILURE); |
| } |
| |
| memset(&assoc_val, 0, sizeof(assoc_val)); |
| assoc_val.assoc_value = 1; |
| if (usrsctp_setsockopt(socket_client, IPPROTO_SCTP, SCTP_INTERLEAVING_SUPPORTED, &assoc_val, sizeof(assoc_val)) < 0) { |
| perror("usrsctp_setsockopt SCTP_INTERLEAVING_SUPPORTED socket_client"); |
| exit(EXIT_FAILURE); |
| } |
| #endif // defined(FUZZ_INTERLEAVING) |
| |
| memset((void *)&bind4, 0, sizeof(struct sockaddr_in)); |
| #ifdef HAVE_SIN_LEN |
| bind4.sin_len = sizeof(struct sockaddr_in6); |
| #endif |
| bind4.sin_family = AF_INET; |
| bind4.sin_port = htons(5000); |
| bind4.sin_addr.s_addr = htonl(INADDR_ANY); |
| |
| if (usrsctp_bind(socket_client, (struct sockaddr *)&bind4, sizeof(bind4)) < 0) { |
| perror("bind"); |
| usrsctp_close(socket_client); |
| exit(EXIT_FAILURE); |
| } |
| |
| usrsctp_set_upcall(socket_client, handle_upcall, NULL); |
| |
| memset(&sconn, 0, sizeof(struct sockaddr_conn)); |
| sconn.sconn_family = AF_CONN; |
| #ifdef HAVE_SCONN_LEN |
| sconn.sconn_len = sizeof(struct sockaddr_conn); |
| #endif |
| sconn.sconn_port = htons(5001); |
| sconn.sconn_addr = (void *)1; |
| |
| fuzzer_printf("Calling usrsctp_connect()\n"); |
| if (usrsctp_connect(socket_client, (struct sockaddr *)&sconn, sizeof(struct sockaddr_conn)) < 0) { |
| if (errno != EINPROGRESS) { |
| perror("usrsctp_connect"); |
| exit(EXIT_FAILURE); |
| } |
| } |
| |
| if (fuzzing_stage > 0) { |
| fuzzer_printf("Injecting INIT_ACK\n"); |
| |
| common_header = (struct sctp_common_header*) fuzz_init_ack; |
| common_header->verification_tag = assoc_vtag; |
| |
| dump_packet(fuzz_init_ack, 516, SCTP_DUMP_INBOUND); |
| usrsctp_conninput((void *)1, fuzz_init_ack, 516, 0); |
| } |
| |
| if (fuzzing_stage > 1) { |
| fuzzer_printf("Injecting COOKIE_ACK\n"); |
| |
| common_header = (struct sctp_common_header*) fuzz_cookie_ack; |
| common_header->verification_tag = assoc_vtag; |
| |
| dump_packet(fuzz_cookie_ack, 16, SCTP_DUMP_INBOUND); |
| usrsctp_conninput((void *)1, fuzz_cookie_ack, 16, 0); |
| } |
| |
| if (fuzzing_stage == 4) { |
| const char *sendbuffer = "Geologie ist keine richtige Wissenschaft!"; |
| fuzzer_printf("Calling usrsctp_sendv()\n"); |
| usrsctp_sendv(socket_client, sendbuffer, strlen(sendbuffer), NULL, 0, NULL, 0, SCTP_SENDV_NOINFO, 0); |
| } |
| |
| if (fuzzing_stage == 5) { |
| fuzzer_printf("Injecting I_DATA\n"); |
| |
| common_header = (struct sctp_common_header*) fuzz_i_data; |
| common_header->verification_tag = assoc_vtag; |
| |
| dump_packet(fuzz_i_data, 1102, SCTP_DUMP_INBOUND); |
| usrsctp_conninput((void *)1, fuzz_i_data, 1102, 0); |
| } |
| |
| // Inject fuzzed packet - we skip the first byte cause we are using it for stage decision |
| fuzzed_packet_size = data_size + 12 - 1; |
| fuzzed_packet_buffer = malloc(fuzzed_packet_size); |
| memcpy(fuzzed_packet_buffer, fuzz_common_header, 12); // common header |
| memcpy(fuzzed_packet_buffer + 12, data + 1, data_size - 1); |
| |
| common_header = (struct sctp_common_header*) fuzzed_packet_buffer; |
| common_header->verification_tag = assoc_vtag; |
| |
| fuzzer_printf("Injecting FUZZER-Packet\n"); |
| dump_packet(fuzzed_packet_buffer, fuzzed_packet_size, SCTP_DUMP_INBOUND); |
| usrsctp_conninput((void *)1, fuzzed_packet_buffer, fuzzed_packet_size, 0); |
| |
| fuzzer_printf("Calling usrsctp_close()\n"); |
| usrsctp_close(socket_client); |
| |
| free(fuzzed_packet_buffer); |
| |
| #if 0 |
| fuzzer_printf("Calling usrsctp_finish()\n"); |
| while (usrsctp_finish() != 0) { |
| } |
| fuzzer_printf("Done!\n"); |
| #endif |
| |
| return (0); |
| } |
| |
| |
| |