aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--.gitignore2
-rw-r--r--example/ndpiReader.c19
-rw-r--r--example/reader_util.c38
-rw-r--r--example/reader_util.h3
-rw-r--r--fuzz/Makefile.am36
-rw-r--r--fuzz/fuzz_ds_domain_classify.cpp4
-rw-r--r--fuzz/fuzz_gcrypt_aes.cpp62
-rw-r--r--fuzz/fuzz_gcrypt_gcm.cpp101
-rw-r--r--fuzz/fuzz_readerutils_workflow.cpp16
-rw-r--r--src/lib/ndpi_main.c4
-rw-r--r--src/lib/third_party/src/gcrypt/gcm.c2
11 files changed, 245 insertions, 42 deletions
diff --git a/.gitignore b/.gitignore
index 732142831..26c887e79 100644
--- a/.gitignore
+++ b/.gitignore
@@ -78,6 +78,8 @@
/fuzz/fuzz_dga
/fuzz/fuzz_ds_cmsketch
/fuzz/fuzz_gcrypt_light
+/fuzz/fuzz_gcrypt_aes
+/fuzz/fuzz_gcrypt_gcm
/fuzz/fuzz_ndpi_reader_payload_analyzer
/fuzz/fuzz_filecfg_protocols
/fuzz/fuzz_readerutils_workflow
diff --git a/example/ndpiReader.c b/example/ndpiReader.c
index 2a7c3b232..3601978c0 100644
--- a/example/ndpiReader.c
+++ b/example/ndpiReader.c
@@ -31,6 +31,7 @@
#include <stdio.h>
#include <stdlib.h>
#include <getopt.h>
+#include <float.h> /* FLT_EPSILON */
#ifdef WIN32
#include <winsock2.h> /* winsock.h is included automatically */
#include <windows.h>
@@ -407,6 +408,22 @@ static void ndpiCheckIPMatch(char *testChar) {
/********************** FUNCTIONS ********************* */
+static double ndpi_flow_get_byte_count_entropy(const uint32_t byte_count[256],
+ unsigned int num_bytes)
+{
+ int i;
+ double sum = 0.0;
+
+ for(i=0; i<256; i++) {
+ double tmp = (double) byte_count[i] / (double) num_bytes;
+
+ if(tmp > FLT_EPSILON) {
+ sum -= tmp * logf(tmp);
+ }
+ }
+ return(sum / log(2.0));
+}
+
/**
* @brief Set main components necessary to the detection
*/
@@ -433,6 +450,8 @@ flowGetBDMeanandVariance(struct ndpi_flow_info* flow) {
* Sum up the byte_count array for outbound and inbound flows,
* if this flow is bidirectional
*/
+ /* TODO: we could probably use ndpi_data_* generic functions to simplify the code and
+ to get rid of `ndpi_flow_get_byte_count_entropy()` */
if (!flow->bidirectional) {
array = last_entropy->src2dst_byte_count;
num_bytes = last_entropy->src2dst_l4_bytes;
diff --git a/example/reader_util.c b/example/reader_util.c
index 86c45b351..566c64607 100644
--- a/example/reader_util.c
+++ b/example/reader_util.c
@@ -220,10 +220,7 @@ void ndpi_payload_analyzer(struct ndpi_flow_info *flow,
for(j=min_pattern_len; j <= max_pattern_len; j++) {
if((i+j) < payload_len) {
if(ndpi_analyze_payload(flow, src_to_dst_direction, &payload[i], j, packet_id) == -1) {
-#ifndef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
- /* Avoid too much logging while fuzzing */
LOG(NDPI_LOG_ERROR, "Error ndpi_analyze_payload (allocation failure)\n");
-#endif
}
}
}
@@ -462,8 +459,11 @@ struct ndpi_workflow* ndpi_workflow_init(const struct ndpi_workflow_prefs * pref
static NDPI_PROTOCOL_BITMASK debug_bitmask;
static int _debug_protocols_ok = 0;
+ /* On some fuzzers we don't want to use these memory allocators, but some custom ones */
+#ifndef DISABLE_CUSTOM_ALLOCATOR_ON_READERUTILS
set_ndpi_malloc(ndpi_malloc_wrapper), set_ndpi_free(free_wrapper);
set_ndpi_flow_malloc(NULL), set_ndpi_flow_free(NULL);
+#endif
/* TODO: just needed here to init ndpi ndpi_malloc wrapper */
module = ndpi_init_detection_module(init_prefs);
@@ -500,8 +500,14 @@ struct ndpi_workflow* ndpi_workflow_init(const struct ndpi_workflow_prefs * pref
if(_debug_protocols_ok)
ndpi_set_debug_bitmask(module, debug_bitmask);
- if(do_init_flows_root)
+ if(do_init_flows_root) {
workflow->ndpi_flows_root = ndpi_calloc(workflow->prefs.num_roots, sizeof(void *));
+ if(!workflow->ndpi_flows_root) {
+ ndpi_exit_detection_module(module);
+ ndpi_free(workflow);
+ return NULL;
+ }
+ }
workflow->ndpi_serialization_format = serialization_format;
@@ -742,24 +748,6 @@ ndpi_flow_update_byte_dist_mean_var(ndpi_flow_info_t *flow, const void *x,
/* ***************************************************** */
-double ndpi_flow_get_byte_count_entropy(const uint32_t byte_count[256],
- unsigned int num_bytes)
-{
- int i;
- double sum = 0.0;
-
- for(i=0; i<256; i++) {
- double tmp = (double) byte_count[i] / (double) num_bytes;
-
- if(tmp > FLT_EPSILON) {
- sum -= tmp * logf(tmp);
- }
- }
- return(sum / log(2.0));
-}
-
-/* ***************************************************** */
-
static struct ndpi_flow_info *get_ndpi_flow_info(struct ndpi_workflow * workflow,
const u_int8_t version,
u_int16_t vlan_id,
@@ -908,10 +896,7 @@ static struct ndpi_flow_info *get_ndpi_flow_info(struct ndpi_workflow * workflow
struct ndpi_flow_info *newflow = (struct ndpi_flow_info*)ndpi_malloc(sizeof(struct ndpi_flow_info));
if(newflow == NULL) {
-#ifndef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
- /* Avoid too much logging while fuzzing */
LOG(NDPI_LOG_ERROR, "[NDPI] %s(1): not enough memory\n", __FUNCTION__);
-#endif
return(NULL);
} else
workflow->num_allocated_flows++;
@@ -952,10 +937,7 @@ static struct ndpi_flow_info *get_ndpi_flow_info(struct ndpi_workflow * workflow
}
if((newflow->ndpi_flow = ndpi_flow_malloc(SIZEOF_FLOW_STRUCT)) == NULL) {
-#ifndef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
- /* Avoid too much logging while fuzzing */
LOG(NDPI_LOG_ERROR, "[NDPI] %s(2): not enough memory\n", __FUNCTION__);
-#endif
ndpi_flow_info_free_data(newflow);
ndpi_free(newflow);
return(NULL);
diff --git a/example/reader_util.h b/example/reader_util.h
index 6466d9d90..f152c2ecd 100644
--- a/example/reader_util.h
+++ b/example/reader_util.h
@@ -414,12 +414,11 @@ void process_ndpi_collected_info(struct ndpi_workflow * workflow, struct ndpi_fl
void ndpi_flow_info_free_data(struct ndpi_flow_info *flow);
void ndpi_flow_info_freer(void *node);
const char* print_cipher_id(u_int32_t cipher);
-double ndpi_flow_get_byte_count_entropy(const uint32_t byte_count[256], unsigned int num_bytes);
int parse_proto_name_list(char *str, NDPI_PROTOCOL_BITMASK *bitmask, int inverted_logic);
extern int nDPI_LogLevel;
-#ifdef NDPI_ENABLE_DEBUG_MESSAGES
+#if defined(NDPI_ENABLE_DEBUG_MESSAGES) && !defined(FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION)
#define LOG(log_level, args...) \
{ \
if(log_level <= nDPI_LogLevel) \
diff --git a/fuzz/Makefile.am b/fuzz/Makefile.am
index 3903c85cd..2568af4b1 100644
--- a/fuzz/Makefile.am
+++ b/fuzz/Makefile.am
@@ -6,7 +6,7 @@ bin_PROGRAMS += fuzz_ds_patricia fuzz_ds_ahocorasick fuzz_ds_libcache fuzz_ds_tr
#Third party
bin_PROGRAMS += fuzz_libinjection fuzz_binaryfusefilter
#Internal crypto
-bin_PROGRAMS += fuzz_gcrypt_light
+bin_PROGRAMS += fuzz_gcrypt_light fuzz_gcrypt_aes fuzz_gcrypt_gcm
#Configuration files
bin_PROGRAMS += fuzz_filecfg_protocols
#Reader utils
@@ -427,6 +427,36 @@ fuzz_gcrypt_light_LINK=$(LIBTOOL) $(AM_V_lt) --tag=CC $(AM_LIBTOOLFLAGS) \
$(LIBTOOLFLAGS) --mode=link $(CXX) @NDPI_CFLAGS@ $(AM_CXXFLAGS) $(CXXFLAGS) \
$(fuzz_gcrypt_light_LDFLAGS) @NDPI_LDFLAGS@ $(LDFLAGS) -o $@
+fuzz_gcrypt_aes_SOURCES = fuzz_gcrypt_aes.cpp
+fuzz_gcrypt_aes_CXXFLAGS = @NDPI_CFLAGS@ $(CXXFLAGS) -I ../src/lib/third_party/include/
+fuzz_gcrypt_aes_CFLAGS = @NDPI_CFLAGS@ $(CXXFLAGS) -I ../src/lib/third_party/include/
+fuzz_gcrypt_aes_LDADD = ../src/lib/libndpi.a $(ADDITIONAL_LIBS)
+fuzz_gcrypt_aes_LDFLAGS = $(LIBS)
+if HAS_FUZZLDFLAGS
+fuzz_gcrypt_aes_CXXFLAGS += $(LIB_FUZZING_ENGINE)
+fuzz_gcrypt_aes_CFLAGS += $(LIB_FUZZING_ENGINE)
+fuzz_gcrypt_aes_LDFLAGS += $(LIB_FUZZING_ENGINE)
+endif
+# force usage of CXX for linker
+fuzz_gcrypt_aes_LINK=$(LIBTOOL) $(AM_V_lt) --tag=CC $(AM_LIBTOOLFLAGS) \
+ $(LIBTOOLFLAGS) --mode=link $(CXX) @NDPI_CFLAGS@ $(AM_CXXFLAGS) $(CXXFLAGS) \
+ $(fuzz_gcrypt_aes_LDFLAGS) @NDPI_LDFLAGS@ $(LDFLAGS) -o $@
+
+fuzz_gcrypt_gcm_SOURCES = fuzz_gcrypt_gcm.cpp
+fuzz_gcrypt_gcm_CXXFLAGS = @NDPI_CFLAGS@ $(CXXFLAGS) -I ../src/lib/third_party/include/
+fuzz_gcrypt_gcm_CFLAGS = @NDPI_CFLAGS@ $(CXXFLAGS) -I ../src/lib/third_party/include/
+fuzz_gcrypt_gcm_LDADD = ../src/lib/libndpi.a $(ADDITIONAL_LIBS)
+fuzz_gcrypt_gcm_LDFLAGS = $(LIBS)
+if HAS_FUZZLDFLAGS
+fuzz_gcrypt_gcm_CXXFLAGS += $(LIB_FUZZING_ENGINE)
+fuzz_gcrypt_gcm_CFLAGS += $(LIB_FUZZING_ENGINE)
+fuzz_gcrypt_gcm_LDFLAGS += $(LIB_FUZZING_ENGINE)
+endif
+# force usage of CXX for linker
+fuzz_gcrypt_gcm_LINK=$(LIBTOOL) $(AM_V_lt) --tag=CC $(AM_LIBTOOLFLAGS) \
+ $(LIBTOOLFLAGS) --mode=link $(CXX) @NDPI_CFLAGS@ $(AM_CXXFLAGS) $(CXXFLAGS) \
+ $(fuzz_gcrypt_gcm_LDFLAGS) @NDPI_LDFLAGS@ $(LDFLAGS) -o $@
+
fuzz_filecfg_protocols_SOURCES = fuzz_filecfg_protocols.c fuzz_common_code.c
fuzz_filecfg_protocols_CFLAGS = @NDPI_CFLAGS@ $(CXXFLAGS)
fuzz_filecfg_protocols_LDADD = ../src/lib/libndpi.a $(ADDITIONAL_LIBS)
@@ -441,8 +471,8 @@ fuzz_filecfg_protocols_LINK=$(LIBTOOL) $(AM_V_lt) --tag=CC $(AM_LIBTOOLFLAGS) \
$(fuzz_filecfg_protocols_LDFLAGS) @NDPI_LDFLAGS@ $(LDFLAGS) -o $@
fuzz_readerutils_workflow_SOURCES = fuzz_readerutils_workflow.cpp fuzz_common_code.c ../example/reader_util.c
-fuzz_readerutils_workflow_CXXFLAGS = -I../example/ @NDPI_CFLAGS@ $(CXXFLAGS)
-fuzz_readerutils_workflow_CFLAGS = @NDPI_CFLAGS@ $(CXXFLAGS)
+fuzz_readerutils_workflow_CXXFLAGS = -I../example/ @NDPI_CFLAGS@ $(CXXFLAGS) -DDISABLE_CUSTOM_ALLOCATOR_ON_READERUTILS
+fuzz_readerutils_workflow_CFLAGS = @NDPI_CFLAGS@ $(CXXFLAGS) -DDISABLE_CUSTOM_ALLOCATOR_ON_READERUTILS
fuzz_readerutils_workflow_LDADD = ../src/lib/libndpi.a $(ADDITIONAL_LIBS)
fuzz_readerutils_workflow_LDFLAGS = $(PCAP_LIB) $(LIBS)
if HAS_FUZZLDFLAGS
diff --git a/fuzz/fuzz_ds_domain_classify.cpp b/fuzz/fuzz_ds_domain_classify.cpp
index 9a945deff..40acd9b18 100644
--- a/fuzz/fuzz_ds_domain_classify.cpp
+++ b/fuzz/fuzz_ds_domain_classify.cpp
@@ -33,7 +33,9 @@ extern "C" int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) {
}
}
- ndpi_domain_classify_add_domains(d, NDPI_PROTOCOL_UNKNOWN, "random_list.list");
+ ndpi_domain_classify_add_domains(d,
+ fuzzed_data.ConsumeIntegralInRange(0, NDPI_LAST_IMPLEMENTED_PROTOCOL - 1),
+ (char *)"random_list.list");
if (fuzzed_data.ConsumeBool())
ndpi_domain_classify_finalize(d);
diff --git a/fuzz/fuzz_gcrypt_aes.cpp b/fuzz/fuzz_gcrypt_aes.cpp
new file mode 100644
index 000000000..1469ab0ce
--- /dev/null
+++ b/fuzz/fuzz_gcrypt_aes.cpp
@@ -0,0 +1,62 @@
+#include <stdlib.h>
+#include <stdint.h>
+#include "fuzzer/FuzzedDataProvider.h"
+
+#define MBEDTLS_CHECK_RETURN_TYPICAL
+#include "../src/lib/third_party/include/gcrypt/aes.h"
+
+extern int force_no_aesni;
+
+extern "C" int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) {
+ FuzzedDataProvider fuzzed_data(data, size);
+ mbedtls_aes_context *ctx;
+ int key_lens[] = { 128, 192, 256, 512 /* invalid */ };
+ unsigned char *input, *output, *key;
+ int i, key_len, mode, rc;
+
+ /* No real memory allocations involved */
+
+ if(fuzzed_data.remaining_bytes() < 1 + 1 + 4 + 512 / 8 + 16)
+ return -1;
+
+ posix_memalign((void **)&input, 8, 16);
+ posix_memalign((void **)&output, 8, 16);
+ posix_memalign((void **)&key, 8, 512 / 8);
+ ctx = (mbedtls_aes_context *)malloc(sizeof(mbedtls_aes_context));
+
+ force_no_aesni = 0;
+ if(fuzzed_data.ConsumeBool())
+ force_no_aesni = 1;
+
+ mode = MBEDTLS_AES_ENCRYPT;
+ if(fuzzed_data.ConsumeBool())
+ mode = MBEDTLS_AES_DECRYPT;
+
+ mbedtls_aes_init(ctx);
+
+ key_len = fuzzed_data.PickValueInArray(key_lens);
+ std::vector<unsigned char>k = fuzzed_data.ConsumeBytes<u_int8_t>(key_len / 8);
+ std::vector<u_int8_t>in = fuzzed_data.ConsumeBytes<uint8_t>(16);
+
+ for(i = 0; i < 16; i++)
+ input[i] = in[i];
+ for(i = 0; i < key_len / 8; i++)
+ key[i] = k[i];
+
+ if(mode == MBEDTLS_AES_ENCRYPT)
+ rc = mbedtls_aes_setkey_enc(ctx, key, key_len);
+ else
+ rc = mbedtls_aes_setkey_dec(ctx, key, key_len);
+
+ if(rc == 0)
+ mbedtls_aes_crypt_ecb(ctx, mode, input, output);
+
+ mbedtls_aes_free(ctx);
+
+ free(ctx);
+ free(key);
+ free(input);
+ free(output);
+
+ return 0;
+}
diff --git a/fuzz/fuzz_gcrypt_gcm.cpp b/fuzz/fuzz_gcrypt_gcm.cpp
new file mode 100644
index 000000000..37bb35e3d
--- /dev/null
+++ b/fuzz/fuzz_gcrypt_gcm.cpp
@@ -0,0 +1,101 @@
+#include <stdlib.h>
+#include <stdint.h>
+#include <assert.h>
+#include "fuzzer/FuzzedDataProvider.h"
+
+#define MBEDTLS_CHECK_RETURN_TYPICAL
+#define MBEDTLS_INTERNAL_VALIDATE_RET( cond, ret ) do { } while( 0 )
+#include "../src/lib/third_party/include/gcrypt/aes.h"
+#include "../src/lib/third_party/include/gcrypt/cipher.h"
+#include "../src/lib/third_party/include/gcrypt/gcm.h"
+
+extern int force_no_aesni;
+
+extern "C" int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) {
+ FuzzedDataProvider fuzzed_data(data, size);
+ mbedtls_aes_context *aes_e_ctx, *aes_d_ctx;
+ mbedtls_gcm_context *gcm_e_ctx, *gcm_d_ctx;
+ int key_lens[] = { 128, 192, 256, 512 /* invalid */ };
+ unsigned char *output, *decrypted;
+ int key_len, rc_e, rc_d;
+ mbedtls_cipher_id_t cipher;
+ unsigned char *tag;
+ int iv_len, tag_len, input_length;
+
+ /* No real memory allocations involved */
+
+ if(fuzzed_data.remaining_bytes() < 1 + 4 + 512 / 8 +
+ 1 + 64 + /* iv */
+ 1 + /* tag_len */
+ 1 + 64 + /* input */
+ 1 /* useless data: to be able to add the check with assert */)
+ return -1;
+
+ gcm_e_ctx = (mbedtls_gcm_context *)malloc(sizeof(mbedtls_gcm_context));
+ gcm_d_ctx = (mbedtls_gcm_context *)malloc(sizeof(mbedtls_gcm_context));
+ aes_e_ctx = (mbedtls_aes_context *)malloc(sizeof(mbedtls_aes_context));
+ aes_d_ctx = (mbedtls_aes_context *)malloc(sizeof(mbedtls_aes_context));
+
+ /* Not sure if it is really necessary... */
+ force_no_aesni = 0;
+ if(fuzzed_data.ConsumeBool())
+ force_no_aesni = 1;
+
+ key_len = fuzzed_data.PickValueInArray(key_lens);
+ std::vector<unsigned char>key = fuzzed_data.ConsumeBytes<u_int8_t>(key_len / 8);
+
+ iv_len = fuzzed_data.ConsumeIntegralInRange(0, 64);
+ std::vector<u_int8_t>iv = fuzzed_data.ConsumeBytes<uint8_t>(iv_len);
+
+ tag_len = fuzzed_data.ConsumeIntegralInRange(0, 17);
+ tag = (unsigned char *)malloc(tag_len);
+
+ input_length = fuzzed_data.ConsumeIntegralInRange(16, 64);
+ std::vector<unsigned char>input = fuzzed_data.ConsumeBytes<u_int8_t>(input_length);
+ output = (unsigned char *)malloc(input_length);
+ decrypted = (unsigned char *)malloc(input_length);
+
+ cipher = static_cast<mbedtls_cipher_id_t>(fuzzed_data.ConsumeIntegralInRange(0, (int)MBEDTLS_CIPHER_ID_CHACHA20));
+
+ assert(fuzzed_data.remaining_bytes() > 0);
+
+ mbedtls_gcm_init(gcm_e_ctx, aes_e_ctx);
+ mbedtls_gcm_init(gcm_d_ctx, aes_d_ctx);
+
+ rc_e = mbedtls_gcm_setkey(gcm_e_ctx, cipher, key.data(), key.size() * 8);
+ rc_d = mbedtls_gcm_setkey(gcm_d_ctx, cipher, key.data(), key.size() * 8);
+
+ if (rc_e == 0 && rc_d == 0) {
+ rc_e = mbedtls_gcm_crypt_and_tag(gcm_e_ctx, MBEDTLS_GCM_ENCRYPT,
+ input.size(),
+ iv.data(), iv.size(),
+ NULL, 0, /* TODO */
+ input.data(),
+ output,
+ tag_len, tag);
+ if(rc_e == 0) {
+ rc_d = mbedtls_gcm_auth_decrypt(gcm_d_ctx,
+ input.size(),
+ iv.data(), iv.size(),
+ NULL, 0, /* TODO */
+ tag, tag_len,
+ output,
+ decrypted);
+ if (rc_d == 0)
+ assert(memcmp(input.data(), decrypted, input.size()) == 0);
+ }
+ }
+
+ mbedtls_gcm_free(gcm_e_ctx);
+ mbedtls_gcm_free(gcm_d_ctx);
+
+ free(tag);
+ free(gcm_e_ctx);
+ free(gcm_d_ctx);
+ free(aes_e_ctx);
+ free(aes_d_ctx);
+ free(output);
+ free(decrypted);
+
+ return 0;
+}
diff --git a/fuzz/fuzz_readerutils_workflow.cpp b/fuzz/fuzz_readerutils_workflow.cpp
index 90d0ac094..f753560f2 100644
--- a/fuzz/fuzz_readerutils_workflow.cpp
+++ b/fuzz/fuzz_readerutils_workflow.cpp
@@ -31,7 +31,7 @@ extern "C" int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) {
ndpi_risk flow_risk;
const u_char *pkt;
struct pcap_pkthdr *header;
- int r;
+ int r, rc;
char errbuf[PCAP_ERRBUF_SIZE];
FILE *fd;
u_int8_t debug_protos_index;
@@ -91,14 +91,16 @@ extern "C" int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) {
w = ndpi_workflow_init(&prefs, pcap_handle, 1, serialization_format);
if(w) {
NDPI_BITMASK_SET_ALL(enabled_bitmask);
- ndpi_set_protocol_detection_bitmask2(w->ndpi_struct, &enabled_bitmask);
- ndpi_finalize_initialization(w->ndpi_struct);
+ rc = ndpi_set_protocol_detection_bitmask2(w->ndpi_struct, &enabled_bitmask);
+ if(rc == 0) {
+ ndpi_finalize_initialization(w->ndpi_struct);
- header = NULL;
- r = pcap_next_ex(pcap_handle, &header, &pkt);
- while (r > 0) {
- ndpi_workflow_process_packet(w, header, pkt, &flow_risk);
+ header = NULL;
r = pcap_next_ex(pcap_handle, &header, &pkt);
+ while (r > 0) {
+ ndpi_workflow_process_packet(w, header, pkt, &flow_risk);
+ r = pcap_next_ex(pcap_handle, &header, &pkt);
+ }
}
ndpi_workflow_free(w);
diff --git a/src/lib/ndpi_main.c b/src/lib/ndpi_main.c
index 0cc26233d..274273cb9 100644
--- a/src/lib/ndpi_main.c
+++ b/src/lib/ndpi_main.c
@@ -2670,12 +2670,16 @@ void ndpi_debug_printf(unsigned int proto, struct ndpi_detection_module_struct *
ndpi_vsnprintf(str, sizeof(str) - 1, format, args);
va_end(args);
+ /* While fuzzing, we want to test log code, but we don't want to log anything! */
+#ifndef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
if(ndpi_str != NULL || (file_name != NULL && func_name != NULL)) {
printf("%s:%s:%-3d - [%u]: %s", file_name, func_name, line_number, proto, str);
} else {
printf("Proto: %u, %s", proto, str);
}
#endif
+
+#endif
}
/* ****************************************** */
diff --git a/src/lib/third_party/src/gcrypt/gcm.c b/src/lib/third_party/src/gcrypt/gcm.c
index e793465f5..98ef9afbd 100644
--- a/src/lib/third_party/src/gcrypt/gcm.c
+++ b/src/lib/third_party/src/gcrypt/gcm.c
@@ -84,7 +84,7 @@ static void xorbytes3e( unsigned char *output, unsigned char *buf,
n -= LBLOCKSIZE;
}
while(n) {
- *output++ = *input++ ^ *ectr++;
+ *output = *input++ ^ *ectr++;
*buf++ ^= *output++;
n--;
}