Merge pull request #2702 from lucas-clemente/oss-fuzz

update fuzzing code for oss-fuzz
This commit is contained in:
Marten Seemann 2020-08-06 23:31:56 +07:00 committed by GitHub
commit d7c2169c55
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
5 changed files with 32 additions and 15 deletions

1
.gitignore vendored
View file

@ -11,6 +11,7 @@ fuzzing/*/crashers
fuzzing/*/sonarprofile
fuzzing/*/suppressions
fuzzing/*/corpus/
fuzzing/*-fuzz.zip
!fuzzing/frames/single-frame*
!fuzzing/frames/multiple-frame*
!fuzzing/header/header*

View file

@ -1,5 +1,3 @@
// +build !gofuzz
package main
import (

View file

@ -1,5 +1,3 @@
// +build gofuzz
package frames
import (
@ -10,9 +8,10 @@ import (
"github.com/lucas-clemente/quic-go/internal/wire"
)
const version = protocol.VersionTLS
//go:generate go run ./cmd/corpus.go
func Fuzz(data []byte) int {
const version = protocol.VersionTLS
if len(data) < 1 {
return 0
}

View file

@ -1,5 +1,3 @@
// +build !gofuzz
package main
import (

View file

@ -1,5 +1,3 @@
// +build gofuzz
package header
import (
@ -12,6 +10,7 @@ import (
const version = protocol.VersionTLS
//go:generate go run ./cmd/corpus.go
func Fuzz(data []byte) int {
if len(data) < 1 {
return 0
@ -19,7 +18,9 @@ func Fuzz(data []byte) int {
connIDLen := int(data[0] % 21)
data = data[1:]
isVNP := wire.IsVersionNegotiationPacket(data)
if wire.IsVersionNegotiationPacket(data) {
return fuzzVNP(data)
}
connID, err := wire.ParseConnectionID(data, connIDLen)
if err != nil {
return 0
@ -48,17 +49,37 @@ func Fuzz(data []byte) int {
// We are able to parse packets with connection IDs longer than 20 bytes,
// but in QUIC version 1, we don't write headers with longer connection IDs.
if hdr.DestConnectionID.Len() <= protocol.MaxConnIDLen &&
hdr.SrcConnectionID.Len() <= protocol.MaxConnIDLen &&
hdr.OrigDestConnectionID.Len() <= protocol.MaxConnIDLen {
hdr.SrcConnectionID.Len() <= protocol.MaxConnIDLen {
panic(err)
}
return 0
}
// GetLength is not implemented for Retry and Version Negotiation.
if !isVNP && hdr.Type != protocol.PacketTypeRetry {
// GetLength is not implemented for Retry packets
if hdr.Type != protocol.PacketTypeRetry {
if expLen := extHdr.GetLength(version); expLen != protocol.ByteCount(b.Len()) {
panic(fmt.Sprintf("inconsistent header length: %#v. Expected %d, got %d", extHdr, expLen, b.Len()))
}
}
return 0
}
func fuzzVNP(data []byte) int {
connID, err := wire.ParseConnectionID(data, 0)
if err != nil {
return 0
}
hdr, versions, err := wire.ParseVersionNegotiationPacket(bytes.NewReader(data))
if err != nil {
return 0
}
if !hdr.DestConnectionID.Equal(connID) {
panic("connection IDs don't match")
}
if len(versions) == 0 {
panic("no versions")
}
if _, err := wire.ComposeVersionNegotiation(hdr.SrcConnectionID, hdr.DestConnectionID, versions); err != nil {
panic(err)
}
return 0
}