2018-05-15 13:49:10 +00:00
|
|
|
#include "no_warn_host.h"
|
2018-05-18 13:54:08 +00:00
|
|
|
|
2018-05-15 13:49:10 +00:00
|
|
|
#include "lwip/opt.h"
|
|
|
|
#include "lwip/udp.h"
|
2018-05-18 13:54:08 +00:00
|
|
|
#include "lwip/mem.h"
|
|
|
|
#include "lwip/memp.h"
|
2018-05-15 13:49:10 +00:00
|
|
|
#include "lwip/dns.h"
|
2018-05-18 13:54:08 +00:00
|
|
|
#include "lwip/ip_addr.h"
|
|
|
|
|
2018-05-15 13:49:10 +00:00
|
|
|
#include <string.h>
|
|
|
|
|
|
|
|
const ip_addr_t ip_addr_any;
|
|
|
|
const ip_addr_t ip_addr_broadcast;
|
|
|
|
struct ip_globals ip_data;
|
|
|
|
struct netif *netif_list;
|
|
|
|
struct netif mynetif;
|
|
|
|
ip4_addr_t server_ip;
|
|
|
|
|
|
|
|
//
|
|
|
|
// Dependency injected test functions
|
2018-05-18 13:54:08 +00:00
|
|
|
void dns_test_dns_recv(void *s, struct udp_pcb *pcb, struct pbuf *p, const ip_addr_t *addr, u16_t port);
|
|
|
|
void dns_test_inject_port_and_txid(int port, int txid);
|
|
|
|
|
2019-07-16 09:33:30 +00:00
|
|
|
void dns_test_init_di(void);
|
2018-05-18 13:54:08 +00:00
|
|
|
err_t dns_test_dns_enqueue(const char *name, size_t hostnamelen, dns_found_callback found, void *callback_arg, u8_t dns_addrtype);
|
2018-05-15 13:49:10 +00:00
|
|
|
|
|
|
|
//
|
|
|
|
// Test starts here
|
|
|
|
//
|
|
|
|
int main(int argc, char** argv)
|
|
|
|
{
|
|
|
|
uint8_t *buf;
|
|
|
|
struct pbuf *p;
|
|
|
|
FILE *file;
|
|
|
|
size_t len = 1460;
|
|
|
|
|
2018-05-18 13:54:08 +00:00
|
|
|
dns_test_init_di();
|
2020-11-10 07:40:01 +00:00
|
|
|
|
2018-05-15 13:49:10 +00:00
|
|
|
#ifdef INSTR_IS_OFF
|
|
|
|
p = pbuf_alloc(PBUF_RAW, len, PBUF_POOL);
|
|
|
|
buf = p->payload;
|
|
|
|
memset(buf, 0, 1460);
|
|
|
|
if (argc != 2)
|
|
|
|
{
|
|
|
|
printf("Non-instrumentation mode: please supply a file name created by AFL to reproduce crash\n");
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
//
|
|
|
|
// Note: parameter1 is a file (mangled packet) which caused the crash
|
|
|
|
file = fopen(argv[1], "r");
|
|
|
|
if (file) {
|
|
|
|
len = fread(buf, 1, 1460, file);
|
|
|
|
}
|
|
|
|
fclose(file);
|
|
|
|
int i;
|
|
|
|
for (i=0; i<1; i++) {
|
|
|
|
#else
|
|
|
|
while (__AFL_LOOP(1000)) {
|
|
|
|
p = pbuf_alloc(PBUF_RAW, len, PBUF_POOL);
|
|
|
|
buf = p->payload;
|
|
|
|
memset(buf, 0, 1460);
|
|
|
|
size_t len = read(0, buf, 1460);
|
|
|
|
#endif
|
|
|
|
p->len = len;
|
|
|
|
p->tot_len = len;
|
|
|
|
p->next = NULL;
|
|
|
|
|
2018-05-18 13:54:08 +00:00
|
|
|
// Pretend that the response is from our pending querries
|
2019-06-28 12:12:10 +00:00
|
|
|
IP4_ADDR(&server_ip, 8, 8, 8, 8);
|
|
|
|
dns_setserver(0, &server_ip);
|
2018-05-18 13:54:08 +00:00
|
|
|
dns_test_inject_port_and_txid(1024, (buf[0]<<8) + buf[1]);
|
|
|
|
dns_test_dns_enqueue("test", 4, NULL, NULL, 0);
|
|
|
|
|
|
|
|
// Process the packet
|
2020-11-10 07:40:01 +00:00
|
|
|
dns_test_dns_recv(NULL, NULL, p, &ip_addr_any, 0);
|
2018-05-15 13:49:10 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2020-11-10 07:40:01 +00:00
|
|
|
|
2018-05-15 13:49:10 +00:00
|
|
|
return 0;
|
|
|
|
}
|