Line | Count | Source |
1 | | // Copyright 2025 Google LLC |
2 | | // |
3 | | // Licensed under the Apache License, Version 2.0 (the "License"); |
4 | | // you may not use this file except in compliance with the License. |
5 | | // You may obtain a copy of the License at |
6 | | // |
7 | | // http://www.apache.org/licenses/LICENSE-2.0 |
8 | | // |
9 | | // Unless required by applicable law or agreed to in writing, software |
10 | | // distributed under the License is distributed on an "AS IS" BASIS, |
11 | | // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
12 | | // See the License for the specific language governing permissions and |
13 | | // limitations under the License. |
14 | | // |
15 | | //////////////////////////////////////////////////////////////////////////////// |
16 | | #include <stdint.h> |
17 | | #include <stddef.h> |
18 | | #include <unistd.h> |
19 | | #include <sys/types.h> |
20 | | |
21 | | #include <vector> |
22 | | #include <algorithm> |
23 | | |
24 | | #include "mhd_helper.h" |
25 | | |
26 | | static void request_ended_cb(void *cls, |
27 | | const struct MHD_RequestEndedData *data, |
28 | 0 | void *request_app_context) { |
29 | | // Do nothing |
30 | 0 | } |
31 | | |
32 | 2.19k | static enum MHD_HTTP_StatusCode pick_status_code(FuzzedDataProvider &fdp) { |
33 | | // Randomly pick a valid or invalid HTTP response status code |
34 | 2.19k | return fdp.ConsumeBool() |
35 | 2.19k | ? fdp.PickValueInArray({ |
36 | 1.94k | MHD_HTTP_STATUS_OK, MHD_HTTP_STATUS_CREATED, MHD_HTTP_STATUS_NO_CONTENT, |
37 | 1.94k | MHD_HTTP_STATUS_PARTIAL_CONTENT, MHD_HTTP_STATUS_BAD_REQUEST, |
38 | 1.94k | MHD_HTTP_STATUS_UNAUTHORIZED, MHD_HTTP_STATUS_FORBIDDEN, |
39 | 1.94k | MHD_HTTP_STATUS_NOT_FOUND, MHD_HTTP_STATUS_INTERNAL_SERVER_ERROR }) |
40 | 2.19k | : (enum MHD_HTTP_StatusCode)(fdp.ConsumeIntegralInRange<int>(0, 999)); |
41 | 2.19k | } |
42 | | |
43 | | static MHD_Response* create_response(FuzzedDataProvider &fdp, |
44 | 2.19k | enum MHD_HTTP_StatusCode sc) { |
45 | 2.19k | struct MHD_Response* r = nullptr; |
46 | | |
47 | | // Generate random response body |
48 | 2.19k | const size_t body_len = fdp.ConsumeIntegralInRange<size_t>( |
49 | 2.19k | 0, std::min<size_t>(fdp.remaining_bytes(), 8192)); |
50 | 2.19k | std::string body = fdp.ConsumeBytesAsString(body_len); |
51 | | |
52 | | |
53 | | // Randomly select which constructing function to use for respone object creation |
54 | 2.19k | enum CtorKind { |
55 | 2.19k | EMPTY, BUF_STATIC, BUF_COPY, IOVEC, FROM_FD, FROM_PIPE |
56 | 2.19k | }; |
57 | 2.19k | CtorKind ctor = fdp.PickValueInArray<CtorKind>( |
58 | 2.19k | {EMPTY, BUF_STATIC, BUF_COPY, IOVEC, FROM_FD, FROM_PIPE}); |
59 | | |
60 | 2.19k | switch (ctor) { |
61 | 0 | default: |
62 | 1.20k | case EMPTY: { |
63 | | // Create empty response |
64 | 1.20k | r = MHD_response_from_empty(sc); |
65 | 1.20k | break; |
66 | 0 | } |
67 | 170 | case BUF_STATIC: { |
68 | | // Create response with random body and static buffer status |
69 | 170 | r = MHD_response_from_buffer_static(sc, body.size(), body.c_str()); |
70 | 170 | break; |
71 | 0 | } |
72 | 357 | case BUF_COPY: { |
73 | | // Create response with random body and copy buffer in |
74 | 357 | r = MHD_response_from_buffer_copy(sc, body.size(), body.data()); |
75 | 357 | break; |
76 | 0 | } |
77 | 182 | case IOVEC: { |
78 | | // Create response from random IO vector |
79 | 182 | unsigned cnt = fdp.ConsumeIntegralInRange<unsigned>(0, 6); |
80 | 182 | std::vector<MHD_IoVec> iov(cnt); |
81 | 182 | std::vector<std::string> chunks; chunks.reserve(cnt); |
82 | 703 | for (unsigned i=0;i<cnt;i++) { |
83 | 521 | chunks.push_back(fdp.ConsumeBytesAsString( |
84 | 521 | fdp.ConsumeIntegralInRange<size_t>(0, 1024))); |
85 | 521 | iov[i].iov_base = chunks.back().data(); |
86 | 521 | iov[i].iov_len = chunks.back().size(); |
87 | 521 | } |
88 | 182 | r = MHD_response_from_iovec(sc, cnt ? cnt : 0, cnt ? iov.data() : nullptr, nullptr, nullptr); |
89 | 182 | break; |
90 | 0 | } |
91 | 152 | case FROM_FD: { |
92 | | // Create response from file with random data |
93 | 152 | char path[] = "/tmp/mhdrespXXXXXX"; |
94 | 152 | int fd = mkstemp(path); |
95 | 152 | if (fd >= 0) { |
96 | 152 | unlink(path); |
97 | 152 | if (!body.empty()) (void) ::write(fd, body.data(), body.size()); |
98 | 152 | uint64_t sz = (uint64_t)body.size(); |
99 | 152 | uint64_t off = 0; |
100 | 152 | if (fdp.ConsumeBool()) { |
101 | 68 | off = std::min<uint64_t>(sz, fdp.ConsumeIntegral<uint64_t>() % (sz + 1)); |
102 | 68 | } |
103 | 152 | uint64_t len = (sz > off) ? (fdp.ConsumeIntegral<uint64_t>() % (sz - off + 1)) : 0; |
104 | 152 | r = MHD_response_from_fd(sc, fd, off, len); |
105 | 152 | if (!r) { |
106 | 11 | close(fd); |
107 | 11 | } |
108 | 152 | } |
109 | 152 | break; |
110 | 0 | } |
111 | 121 | case FROM_PIPE: { |
112 | | // Create response by piping in random data |
113 | 121 | int pfd[2]; |
114 | 121 | if (0 == pipe(pfd)) { |
115 | 121 | std::string pbytes = fdp.ConsumeBytesAsString( |
116 | 121 | fdp.ConsumeIntegralInRange<size_t>(0, 2048)); |
117 | 121 | if (!pbytes.empty()) { |
118 | 50 | ::write(pfd[1], pbytes.data(), pbytes.size()); |
119 | 50 | } |
120 | 121 | close(pfd[1]); |
121 | 121 | r = MHD_response_from_pipe(sc, pfd[0]); |
122 | 121 | if (!r) { |
123 | 8 | close(pfd[0]); |
124 | 8 | } |
125 | 121 | } |
126 | 121 | break; |
127 | 0 | } |
128 | 2.19k | } |
129 | | |
130 | 2.19k | return r; |
131 | 2.19k | } |
132 | | |
133 | 2.11k | static void add_headers(FuzzedDataProvider &fdp, MHD_Response *r) { |
134 | 2.11k | const char* ct = fdp.ConsumeBool() ? "text/plain" : "application/octet-stream"; |
135 | 2.11k | MHD_response_add_header(r, "Content-Type", ct); |
136 | | |
137 | | // Add random standard headers |
138 | 2.11k | size_t num_headers = fdp.ConsumeIntegralInRange<size_t>(0, 10); |
139 | 4.18k | for (size_t i = 0; i < num_headers; i++) { |
140 | 2.07k | std::string name = safe_ascii(fdp.ConsumeRandomLengthString(20), false); |
141 | 2.07k | std::string val = safe_ascii(fdp.ConsumeRandomLengthString(60), true); |
142 | 2.07k | MHD_response_add_header(r, name.c_str(), val.c_str()); |
143 | 2.07k | } |
144 | | |
145 | | // Add random predefined header |
146 | 2.11k | enum MHD_PredefinedHeader which = |
147 | 2.11k | fdp.PickValueInArray<enum MHD_PredefinedHeader>( |
148 | 2.11k | { MHD_PREDEF_ACCEPT_CHARSET, MHD_PREDEF_ACCEPT_LANGUAGE }); |
149 | 2.11k | std::string value = safe_ascii(fdp.ConsumeRandomLengthString(32)); |
150 | 2.11k | MHD_response_add_predef_header(r, which, value.c_str()); |
151 | 2.11k | } |
152 | | |
153 | 2.11k | static void randomise_response_options(FuzzedDataProvider &fdp, MHD_Response *r) { |
154 | 2.11k | if (fdp.ConsumeBool()) { |
155 | 125 | auto o = MHD_R_OPTION_REUSABLE(ToMhdBool(fdp.ConsumeBool())); |
156 | 125 | MHD_response_set_option(r, &o); |
157 | 125 | } |
158 | 2.11k | if (fdp.ConsumeBool()) { |
159 | 108 | auto o = MHD_R_OPTION_HEAD_ONLY_RESPONSE(ToMhdBool(fdp.ConsumeBool())); |
160 | 108 | MHD_response_set_option(r, &o); |
161 | 108 | } |
162 | 2.11k | if (fdp.ConsumeBool()) { |
163 | 112 | auto o = MHD_R_OPTION_CHUNKED_ENC(ToMhdBool(fdp.ConsumeBool())); |
164 | 112 | MHD_response_set_option(r, &o); |
165 | 112 | } |
166 | 2.11k | if (fdp.ConsumeBool()) { |
167 | 115 | auto o = MHD_R_OPTION_CONN_CLOSE(ToMhdBool(fdp.ConsumeBool())); |
168 | 115 | MHD_response_set_option(r, &o); |
169 | 115 | } |
170 | 2.11k | if (fdp.ConsumeBool()) { |
171 | 119 | auto o = MHD_R_OPTION_HTTP_1_0_SERVER(ToMhdBool(fdp.ConsumeBool())); |
172 | 119 | MHD_response_set_option(r, &o); |
173 | 119 | } |
174 | 2.11k | if (fdp.ConsumeBool()) { |
175 | 100 | auto o = MHD_R_OPTION_HTTP_1_0_COMPATIBLE_STRICT(ToMhdBool(fdp.ConsumeBool())); |
176 | 100 | MHD_response_set_option(r, &o); |
177 | 100 | } |
178 | 2.11k | if (fdp.ConsumeBool()) { |
179 | 121 | auto o = MHD_R_OPTION_INSANITY_HEADER_CONTENT_LENGTH(ToMhdBool(fdp.ConsumeBool())); |
180 | 121 | MHD_response_set_option(r, &o); |
181 | 121 | } |
182 | 2.11k | if (fdp.ConsumeBool()) { |
183 | 454 | auto o = MHD_R_OPTION_TERMINATION_CALLBACK(&request_ended_cb, nullptr); |
184 | 454 | MHD_response_set_option(r, &o); |
185 | 454 | } |
186 | 2.11k | } |
187 | | |
188 | | static void add_auth(FuzzedDataProvider &fdp, MHD_Response *r, |
189 | 2.11k | enum MHD_HTTP_StatusCode sc) { |
190 | 2.11k | if (sc == MHD_HTTP_STATUS_UNAUTHORIZED) { |
191 | | // Randomly add different challenge under 401 status code |
192 | 952 | if (fdp.ConsumeBool()) { |
193 | | // Use digest challenge |
194 | 387 | std::string realm = safe_ascii(fdp.ConsumeRandomLengthString(24)); |
195 | 387 | MHD_response_add_auth_basic_challenge(r, realm.c_str(), ToMhdBool(fdp.ConsumeBool())); |
196 | 387 | if (fdp.ConsumeBool()) { |
197 | 322 | std::string drealm = safe_ascii(fdp.ConsumeRandomLengthString(24)); |
198 | 322 | const char* opaque = fdp.ConsumeBool() ? "opaque" : nullptr; |
199 | 322 | const char* domain = fdp.ConsumeBool() ? "/a /b" : nullptr; |
200 | 322 | enum MHD_DigestAuthMultiQOP mqop = |
201 | 322 | fdp.ConsumeBool()? MHD_DIGEST_AUTH_MULT_QOP_AUTH : MHD_DIGEST_AUTH_MULT_QOP_AUTH_INT; |
202 | 322 | enum MHD_DigestAuthMultiAlgo malgo = |
203 | 322 | fdp.ConsumeBool()? MHD_DIGEST_AUTH_MULT_ALGO_ANY : MHD_DIGEST_AUTH_MULT_ALGO_MD5; |
204 | 322 | MHD_response_add_auth_digest_challenge( |
205 | 322 | r, drealm.c_str(), opaque, domain, ToMhdBool(fdp.ConsumeBool()), |
206 | 322 | mqop, malgo, ToMhdBool(fdp.ConsumeBool()), ToMhdBool(fdp.ConsumeBool())); |
207 | 322 | } |
208 | 565 | } else { |
209 | | // Use basic challenge |
210 | 565 | std::string realm = safe_ascii(fdp.ConsumeRandomLengthString(24)); |
211 | 565 | const char* opaque = fdp.ConsumeBool() ? "opaque" : nullptr; |
212 | 565 | const char* domain = fdp.ConsumeBool() ? "/a /b" : nullptr; |
213 | 565 | enum MHD_DigestAuthMultiQOP mqop = |
214 | 565 | fdp.ConsumeBool()? MHD_DIGEST_AUTH_MULT_QOP_AUTH : MHD_DIGEST_AUTH_MULT_QOP_AUTH_INT; |
215 | 565 | enum MHD_DigestAuthMultiAlgo malgo = |
216 | 565 | fdp.ConsumeBool()? MHD_DIGEST_AUTH_MULT_ALGO_ANY : MHD_DIGEST_AUTH_MULT_ALGO_MD5; |
217 | 565 | MHD_response_add_auth_digest_challenge( |
218 | 565 | r, realm.c_str(), opaque, domain, ToMhdBool(fdp.ConsumeBool()), |
219 | 565 | mqop, malgo, ToMhdBool(fdp.ConsumeBool()), |
220 | 565 | ToMhdBool(fdp.ConsumeBool())); |
221 | 565 | if (fdp.ConsumeBool()) { |
222 | 269 | std::string brealm = safe_ascii(fdp.ConsumeRandomLengthString(24)); |
223 | 269 | MHD_response_add_auth_basic_challenge(r, brealm.c_str(), ToMhdBool(fdp.ConsumeBool())); |
224 | 269 | } |
225 | 565 | } |
226 | 1.16k | } else { |
227 | | // For all other status code, randomly determine if challenges are added |
228 | | |
229 | | // Randomly choose if basic challenge is used or not |
230 | 1.16k | if (fdp.ConsumeBool()) { |
231 | 186 | std::string realm = safe_ascii(fdp.ConsumeRandomLengthString(24)); |
232 | 186 | MHD_response_add_auth_basic_challenge(r, realm.c_str(), ToMhdBool(fdp.ConsumeBool())); |
233 | 186 | } |
234 | | |
235 | | // Randomly choose if disgest challenge is used or not |
236 | 1.16k | if (fdp.ConsumeBool()) { |
237 | 377 | std::string realm = safe_ascii(fdp.ConsumeRandomLengthString(24)); |
238 | 377 | const char* opaque = fdp.ConsumeBool() ? "opaque" : nullptr; |
239 | 377 | const char* domain = fdp.ConsumeBool() ? "/a /b" : nullptr; |
240 | 377 | enum MHD_DigestAuthMultiQOP mqop = |
241 | 377 | fdp.ConsumeBool()? MHD_DIGEST_AUTH_MULT_QOP_AUTH : MHD_DIGEST_AUTH_MULT_QOP_AUTH_INT; |
242 | 377 | enum MHD_DigestAuthMultiAlgo malgo = |
243 | 377 | fdp.ConsumeBool()? MHD_DIGEST_AUTH_MULT_ALGO_ANY : MHD_DIGEST_AUTH_MULT_ALGO_MD5; |
244 | 377 | MHD_response_add_auth_digest_challenge( |
245 | 377 | r, realm.c_str(), opaque, domain, ToMhdBool(fdp.ConsumeBool()), |
246 | 377 | mqop, malgo, ToMhdBool(fdp.ConsumeBool()), ToMhdBool(fdp.ConsumeBool())); |
247 | 377 | } |
248 | 1.16k | } |
249 | 2.11k | } |
250 | | |
251 | 2.19k | extern "C" int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { |
252 | 2.19k | if (size == 0) { |
253 | 0 | return 0; |
254 | 0 | } |
255 | 2.19k | FuzzedDataProvider fdp(data, size); |
256 | | |
257 | | // Pick a random response status code |
258 | 2.19k | enum MHD_HTTP_StatusCode sc = pick_status_code(fdp); |
259 | | |
260 | | // Create a random response object |
261 | 2.19k | struct MHD_Response* r = create_response(fdp, sc); |
262 | 2.19k | if (!r) { |
263 | 75 | return 0; |
264 | 75 | } |
265 | | |
266 | | // Add random headers into the response object |
267 | 2.11k | add_headers(fdp, r); |
268 | | |
269 | | // Set random options for the response object |
270 | 2.11k | randomise_response_options(fdp, r); |
271 | | |
272 | | // Add authentication challenges to response |
273 | 2.11k | add_auth(fdp, r, sc); |
274 | | |
275 | | // Fuzz additional targets on response status |
276 | 2.11k | MHD_HTTP_status_code_to_string(sc); |
277 | 2.11k | MHD_status_code_to_string((enum MHD_StatusCode)sc); |
278 | | |
279 | | // Destory the response object |
280 | 2.11k | MHD_response_destroy(r); |
281 | 2.11k | return 0; |
282 | 2.19k | } |