0afa8e065e
git-subtree-dir: contrib/libfido2 git-subtree-mainline: d586c978b9b4216869e589daa5bbcc33225a0e35 git-subtree-split: a58dee945a5da64d0e97f35a508928e0d17c9cc7
97 lines
2.5 KiB
C
97 lines
2.5 KiB
C
/*
|
|
* Copyright (c) 2019 Yubico AB. All rights reserved.
|
|
* Use of this source code is governed by a BSD-style
|
|
* license that can be found in the LICENSE file.
|
|
*/
|
|
|
|
#ifndef _MUTATOR_AUX_H
|
|
#define _MUTATOR_AUX_H
|
|
|
|
#include <stddef.h>
|
|
#include <stdint.h>
|
|
#include <cbor.h>
|
|
|
|
#include "../src/fido.h"
|
|
#include "../src/fido/bio.h"
|
|
#include "../src/fido/config.h"
|
|
#include "../src/fido/credman.h"
|
|
#include "../src/fido/eddsa.h"
|
|
#include "../src/fido/es256.h"
|
|
#include "../src/fido/es256.h"
|
|
#include "../src/fido/rs256.h"
|
|
#include "../src/netlink.h"
|
|
|
|
/*
|
|
* As of LLVM 10.0.0, MSAN support in libFuzzer was still experimental.
|
|
* We therefore have to be careful when using our custom mutator, or
|
|
* MSAN will flag uninitialised reads on memory populated by libFuzzer.
|
|
* Since there is no way to suppress MSAN without regenerating object
|
|
* code (in which case you might as well rebuild libFuzzer with MSAN),
|
|
* we adjust our mutator to make it less accurate while allowing
|
|
* fuzzing to proceed.
|
|
*/
|
|
|
|
#if defined(__has_feature)
|
|
# if __has_feature(memory_sanitizer)
|
|
# include <sanitizer/msan_interface.h>
|
|
# define NO_MSAN __attribute__((no_sanitize("memory")))
|
|
# define WITH_MSAN 1
|
|
# endif
|
|
#endif
|
|
|
|
#if !defined(WITH_MSAN)
|
|
# define NO_MSAN
|
|
#endif
|
|
|
|
#define MUTATE_SEED 0x01
|
|
#define MUTATE_PARAM 0x02
|
|
#define MUTATE_WIREDATA 0x04
|
|
#define MUTATE_ALL (MUTATE_SEED | MUTATE_PARAM | MUTATE_WIREDATA)
|
|
|
|
#define MAXSTR 1024
|
|
#define MAXBLOB 3072
|
|
|
|
struct blob {
|
|
uint8_t body[MAXBLOB];
|
|
size_t len;
|
|
};
|
|
|
|
struct param;
|
|
|
|
struct param *unpack(const uint8_t *, size_t);
|
|
size_t pack(uint8_t *, size_t, const struct param *);
|
|
size_t pack_dummy(uint8_t *, size_t);
|
|
void mutate(struct param *, unsigned int, unsigned int);
|
|
void test(const struct param *);
|
|
|
|
void consume(const void *, size_t);
|
|
void consume_str(const char *);
|
|
|
|
int unpack_blob(cbor_item_t *, struct blob *);
|
|
int unpack_byte(cbor_item_t *, uint8_t *);
|
|
int unpack_int(cbor_item_t *, int *);
|
|
int unpack_string(cbor_item_t *, char *);
|
|
|
|
cbor_item_t *pack_blob(const struct blob *);
|
|
cbor_item_t *pack_byte(uint8_t);
|
|
cbor_item_t *pack_int(int);
|
|
cbor_item_t *pack_string(const char *);
|
|
|
|
void mutate_byte(uint8_t *);
|
|
void mutate_int(int *);
|
|
void mutate_blob(struct blob *);
|
|
void mutate_string(char *);
|
|
|
|
ssize_t fd_read(int, void *, size_t);
|
|
ssize_t fd_write(int, const void *, size_t);
|
|
|
|
fido_dev_t *open_dev(int);
|
|
void set_wire_data(const uint8_t *, size_t);
|
|
|
|
void prng_init(unsigned long);
|
|
unsigned long prng_uint32(void);
|
|
|
|
uint32_t uniform_random(uint32_t);
|
|
|
|
#endif /* !_MUTATOR_AUX_H */
|