mirror of
https://github.com/vel21ripn/nDPI.git
synced 2026-04-29 07:29:39 +00:00
The goal of this fuzzer is to test init and deinit of the library, with different configurations. In details: * random memory allocation failures, even during init phase * random `ndpi_init_prefs` parameter of `ndpi_init_detection_module()` * random LRU caches sizes * random bitmask of enabled protocols * random parameters of `ndpi_set_detection_preferences()` * random initialization of opportunistic TLS * random load/don't load of configuration files This new fuzzer is a C++ file, because it uses `FuzzedDataProvider` class (see https://github.com/google/fuzzing/blob/master/docs/split-inputs.md). Note that the (existing) fuzzers need to be linked with C++ compiler anyway, so this new fuzzer doesn't add any new requirements.
61 lines
1.6 KiB
C
61 lines
1.6 KiB
C
|
|
#include "fuzz_common_code.h"
|
|
|
|
|
|
#ifdef ENABLE_MEM_ALLOC_FAILURES
|
|
|
|
static int mem_alloc_state = 0;
|
|
|
|
__attribute__((no_sanitize("integer")))
|
|
static int fastrand ()
|
|
{
|
|
if(!mem_alloc_state) return 1; /* No failures */
|
|
mem_alloc_state = (214013 * mem_alloc_state + 2531011);
|
|
return (mem_alloc_state >> 16) & 0x7FFF;
|
|
}
|
|
|
|
void *malloc_wrapper(size_t size) {
|
|
return (fastrand () % 16) ? malloc (size) : NULL;
|
|
}
|
|
void free_wrapper(void *freeable) {
|
|
free(freeable);
|
|
}
|
|
|
|
void set_mem_alloc_state(int value) {
|
|
mem_alloc_state = value;
|
|
}
|
|
|
|
#endif
|
|
|
|
void fuzz_init_detection_module(struct ndpi_detection_module_struct **ndpi_info_mod,
|
|
int enable_log)
|
|
{
|
|
ndpi_init_prefs prefs = ndpi_enable_ja3_plus;
|
|
NDPI_PROTOCOL_BITMASK all, debug_bitmask;
|
|
|
|
if(*ndpi_info_mod == NULL) {
|
|
#ifdef ENABLE_MEM_ALLOC_FAILURES
|
|
set_ndpi_malloc(malloc_wrapper);
|
|
set_ndpi_free(free_wrapper);
|
|
#endif
|
|
*ndpi_info_mod = ndpi_init_detection_module(prefs);
|
|
NDPI_BITMASK_SET_ALL(all);
|
|
ndpi_set_protocol_detection_bitmask2(*ndpi_info_mod, &all);
|
|
|
|
if(enable_log) {
|
|
NDPI_BITMASK_SET_ALL(debug_bitmask);
|
|
ndpi_set_log_level(*ndpi_info_mod, 4);
|
|
ndpi_set_debug_bitmask(*ndpi_info_mod, debug_bitmask);
|
|
}
|
|
|
|
ndpi_load_protocols_file(*ndpi_info_mod, "protos.txt");
|
|
ndpi_load_categories_file(*ndpi_info_mod, "categories.txt", NULL);
|
|
ndpi_load_risk_domain_file(*ndpi_info_mod, "risky_domains.txt");
|
|
ndpi_load_malicious_ja3_file(*ndpi_info_mod, "ja3_fingerprints.csv");
|
|
ndpi_load_malicious_sha1_file(*ndpi_info_mod, "sha1_fingerprints.csv");
|
|
|
|
ndpi_finalize_initialization(*ndpi_info_mod);
|
|
}
|
|
}
|
|
|
|
|