blob: 64b3ec3f1b212fdace2d2bfa0e366eb39814eeaf (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
|
#include "ndpi_api.h"
#include "fuzz_common_code.h"
#include "reader_util.h"
#include <stdint.h>
#include <stdio.h>
#include "fuzzer/FuzzedDataProvider.h"
u_int8_t enable_payload_analyzer = 0;
u_int8_t enable_flow_stats = 0;
u_int8_t human_readeable_string_len = 5;
u_int8_t max_num_udp_dissected_pkts = 16 /* 8 is enough for most protocols, Signal requires more */, max_num_tcp_dissected_pkts = 80 /* due to telnet */;
int malloc_size_stats = 0;
FILE *fingerprint_fp = NULL;
bool do_load_lists = false;
char *addr_dump_path = NULL;
int monitoring_enabled = 0;
extern "C" int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) {
FuzzedDataProvider fuzzed_data(data, size);
int inverted_logic;
NDPI_PROTOCOL_BITMASK bitmask;
char *str;
/* To allow memory allocation failures */
fuzz_set_alloc_callbacks_and_seed(size);
inverted_logic = size % 2; /* pseudo-random */
if(inverted_logic) {
NDPI_BITMASK_SET_ALL(bitmask);
} else {
NDPI_BITMASK_RESET(bitmask);
}
str = (char *)ndpi_malloc(size + 1); /* We need a null-terminated string */
if(str) {
memcpy(str, data, size);
str[size] = '\0';
parse_proto_name_list(str, &bitmask, inverted_logic);
ndpi_free(str);
}
return 0;
}
|