Coverage Report

Created: 2026-05-16 07:38

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/fuzzpcap/fuzz_pcap.c
Line
Count
Source
1
// Copyright (c) 2021 Catena cyber
2
// Author Philippe Antoine <p.antoine@catenacyber.fr>
3
4
#define _GNU_SOURCE
5
#include <stdint.h>
6
#include <stddef.h>
7
#include <string.h>
8
#include <stdlib.h>
9
10
#include <pcap/pcap.h>
11
12
#include "fuzz_pcap.h"
13
14
62.5k
int FPC_IsFuzzPacketCapture(const uint8_t *Data, size_t Size) {
15
62.5k
    if (Size < FPC0_HEADER_LEN) {
16
5
        return 0;
17
5
    }
18
62.5k
    if (memcmp(Data, FPC0_MAGIC, FPC0_MAGIC_LEN - 1) != 0) {
19
38
        return 0;
20
38
    }
21
62.4k
    if (FPC_datalink_to(Data[FPC0_MAGIC_LEN-1] & 0x7F) == FPC_DATALINK_ERROR) {
22
2
        return 0;
23
2
    }
24
62.4k
    return 1;
25
62.4k
}
26
27
124k
uint32_t FPC_datalink_to(uint8_t in) {
28
124k
    if (in == DLT_NULL || in == DLT_EN10MB) {
29
124k
        return in;
30
124k
    }
31
2
    return (uint32_t) FPC_DATALINK_ERROR;
32
124k
}
33
34
0
uint8_t FPC_datalink_from(uint32_t in) {
35
0
    if (in == DLT_NULL || in == DLT_EN10MB) {
36
0
        return in;
37
0
    }
38
0
    return FPC_DATALINK_ERROR;
39
0
}
40
41
62.5k
int FPC_init(FPC_buffer_t *r, const uint8_t *Data, size_t Size) {
42
62.5k
    if (!FPC_IsFuzzPacketCapture(Data, Size)) {
43
45
        return -1;
44
45
    }
45
62.4k
    r->Data = Data;
46
62.4k
    r->Size = Size;
47
62.4k
    r->datalink = FPC_datalink_to(Data[FPC0_MAGIC_LEN-1] & 0x7F);
48
62.4k
    r->tcpSingleStream = (Data[FPC0_MAGIC_LEN-1] & 0x80);
49
62.4k
    if (r->tcpSingleStream) {
50
30.9k
        r->offset = FPC0_HEADER_LEN;
51
31.5k
    } else {
52
31.5k
        r->offset = FPC0_MAGIC_LEN;
53
31.5k
    }
54
62.4k
    memset(r->pkt, 0, FPC_SNAPLEN);
55
62.4k
    r->tcpState = FPC_TCP_STATE_START;
56
62.4k
    r->seqCliAckSrv = 0x10000000;
57
62.4k
    r->seqSrvAckCli = 0x20000000;
58
62.4k
    r->nb = 0;
59
62.4k
    return 0;
60
62.5k
}
61
62
61.7k
#define FPC_TCP_FLAG_SYN 0x02
63
6.45M
#define FPC_TCP_FLAG_ACK 0x10
64
92.5k
#define FPC_TCP_FLAGS_NEG_OFFSET 7
65
66
6.44M
#define FPC_NULL_HEADER "\x02\x00\x00\x00"
67
12.8M
#define FPC_NULL_HEADER_LEN 4
68
69
12.5k
#define FPC_ETH_HEADER "\x00\x01\x02\x03\x04\x05\x00\x01\x02\x03\x04\x05\x08\x00"
70
25.0k
#define FPC_ETH_HEADER_LEN 14
71
72
6.45M
#define FPC_IP4_HEADER "\x45\x00\xff\xff\x00\x00\x40\x00\x40\x06\x00\x00\x7f\x00\x00\x01" \
73
6.45M
"\x7f\x00\x00\x01"
74
25.8M
#define FPC_IP4_HEADER_LEN 20
75
76
6.45M
#define FPC_TCP_HEADER_END "\xFF\xFF\x00\x00\x00\x00"
77
12.9M
#define FPC_TCP_HEADER_END_LEN 6
78
79
6.45M
static bpf_u_int32 buildTCPpacket(FPC_buffer_t *pkts, bool s2c, size_t plen) {
80
6.45M
    bpf_u_int32 r = 0;
81
6.45M
    if (pkts->datalink == DLT_NULL) {
82
6.44M
        memcpy(pkts->pkt, FPC_NULL_HEADER, FPC_NULL_HEADER_LEN);
83
6.44M
        r = FPC_NULL_HEADER_LEN;
84
6.44M
    } else if (pkts->datalink == DLT_EN10MB) {
85
12.5k
        memcpy(pkts->pkt, FPC_ETH_HEADER, FPC_ETH_HEADER_LEN);
86
12.5k
        r = FPC_ETH_HEADER_LEN;
87
12.5k
    } else {
88
        //unreachable
89
0
        abort();
90
0
    }
91
6.45M
    memcpy(pkts->pkt+r, FPC_IP4_HEADER, FPC_IP4_HEADER_LEN);
92
6.45M
    pkts->pkt[r+2] = (plen + FPC_IP4_HEADER_LEN + 20) >> 8;
93
6.45M
    pkts->pkt[r+3] = (plen + FPC_IP4_HEADER_LEN+ 20);
94
6.45M
    r += FPC_IP4_HEADER_LEN;
95
    //ports
96
6.45M
    if (s2c) {
97
2.90M
        memcpy(pkts->pkt+r, pkts->Data+FPC0_MAGIC_LEN, 2);
98
2.90M
        memcpy(pkts->pkt+r+2, pkts->Data+FPC0_MAGIC_LEN+2, 2);
99
2.90M
        pkts->pkt[r+4] = pkts->seqSrvAckCli >> 24;
100
2.90M
        pkts->pkt[r+5] = pkts->seqSrvAckCli >> 16;
101
2.90M
        pkts->pkt[r+6] = pkts->seqSrvAckCli >> 8;
102
2.90M
        pkts->pkt[r+7] = pkts->seqSrvAckCli;
103
2.90M
        pkts->pkt[r+8] = pkts->seqCliAckSrv >> 24;
104
2.90M
        pkts->pkt[r+9] = pkts->seqCliAckSrv >> 16;
105
2.90M
        pkts->pkt[r+10] = pkts->seqCliAckSrv >> 8;
106
2.90M
        pkts->pkt[r+11] = pkts->seqCliAckSrv;
107
3.54M
    } else {
108
3.54M
        memcpy(pkts->pkt+r, pkts->Data+FPC0_MAGIC_LEN+2, 2);
109
3.54M
        memcpy(pkts->pkt+r+2, pkts->Data+FPC0_MAGIC_LEN, 2);
110
3.54M
        pkts->pkt[r+4] = pkts->seqCliAckSrv >> 24;
111
3.54M
        pkts->pkt[r+5] = pkts->seqCliAckSrv >> 16;
112
3.54M
        pkts->pkt[r+6] = pkts->seqCliAckSrv >> 8;
113
3.54M
        pkts->pkt[r+7] = pkts->seqCliAckSrv;
114
3.54M
        if (pkts->tcpState != FPC_TCP_STATE_SYN) {
115
3.51M
            pkts->pkt[r+8] = pkts->seqSrvAckCli >> 24;
116
3.51M
            pkts->pkt[r+9] = pkts->seqSrvAckCli >> 16;
117
3.51M
            pkts->pkt[r+10] = pkts->seqSrvAckCli >> 8;
118
3.51M
            pkts->pkt[r+11] = pkts->seqSrvAckCli;
119
3.51M
        }
120
3.54M
    }
121
6.45M
    r += 12;
122
6.45M
    pkts->pkt[r] = 0x50; // TCP length
123
6.45M
    if (pkts->tcpState == FPC_TCP_STATE_ESTABLISHED) {
124
6.39M
        pkts->pkt[r+1] = FPC_TCP_FLAG_ACK; // flags
125
6.39M
    } else {
126
61.7k
        pkts->pkt[r+1] = 0; // flags
127
61.7k
    }
128
6.45M
    r+=2;
129
6.45M
    memcpy(pkts->pkt+r, FPC_TCP_HEADER_END, FPC_TCP_HEADER_END_LEN);
130
6.45M
    r+=FPC_TCP_HEADER_END_LEN;
131
6.45M
    return r;
132
6.45M
}
133
134
6.45M
#define FCP_BASE_TIME 0x601cf51a
135
136
9.06M
int FPC_next_pcap(FPC_buffer_t *pkts, struct pcap_pkthdr *header, const uint8_t **pkt) {
137
9.06M
    *pkt = pkts->Data + pkts->offset + FPC_TS_MAXSIZE;
138
9.06M
    const uint8_t *next = memmem(pkts->Data + pkts->offset, pkts->Size - pkts->offset, FPC0_MAGIC, FPC0_MAGIC_LEN);
139
9.06M
    if (next == NULL) {
140
24.8k
        next = pkts->Data + pkts->Size;
141
24.8k
    }
142
9.06M
    if (next < *pkt) {
143
        //wrong input
144
3.69k
        return -1;
145
3.69k
    }
146
147
9.05M
    memset(header, 0, sizeof(struct pcap_pkthdr));
148
9.05M
    header->ts.tv_sec = *((time_t *) (pkts->Data + pkts->offset));
149
9.05M
    if (header->ts.tv_sec < 0) {
150
707k
        header->ts.tv_sec = 0;
151
707k
    }
152
9.05M
    header->ts.tv_usec = *((suseconds_t *) (pkts->Data + pkts->offset + FPC_TS_MAXSIZE/2));
153
    // Limit microseconds to 1 million
154
9.05M
    header->ts.tv_usec = ((header->ts.tv_usec % 1000000) + 1000000) % 1000000;
155
9.05M
    header->caplen = next - (*pkt);
156
9.05M
    pkts->offset += header->caplen + FPC_TS_MAXSIZE + FPC0_MAGIC_LEN;
157
9.05M
    header->len = header->caplen;
158
9.05M
    return 1;
159
9.06M
}
160
161
6.45M
int FPC_next_tcp(FPC_buffer_t *pkts, struct pcap_pkthdr *header, const uint8_t **pkt) {
162
6.45M
    *pkt = pkts->Data + pkts->offset;
163
6.45M
    const uint8_t *next = memmem(pkts->Data + pkts->offset, pkts->Size - pkts->offset, FPC0_MAGIC, FPC0_MAGIC_LEN);
164
6.45M
    if (next == NULL) {
165
36.8k
        next = pkts->Data + pkts->Size;
166
36.8k
    }
167
6.45M
    if (next < *pkt) {
168
        //wrong input
169
0
        return -1;
170
0
    }
171
172
6.45M
    memset(header, 0, sizeof(struct pcap_pkthdr));
173
6.45M
    header->ts.tv_sec = FCP_BASE_TIME;
174
6.45M
    header->ts.tv_usec = pkts->nb;
175
6.45M
    pkts->nb++;
176
6.45M
    header->caplen = next - (*pkt);
177
178
6.45M
    if (pkts->tcpState > FPC_TCP_STATE_SYNACK) {
179
6.36M
        pkts->offset += header->caplen + FPC0_MAGIC_LEN;
180
6.36M
    }
181
6.45M
    switch (pkts->tcpState) {
182
30.8k
        case FPC_TCP_STATE_START:
183
30.8k
        pkts->tcpState = FPC_TCP_STATE_SYN;
184
30.8k
        header->caplen = buildTCPpacket(pkts, false, 0);
185
30.8k
        *pkt = pkts->pkt;
186
30.8k
        pkts->pkt[header->caplen-FPC_TCP_FLAGS_NEG_OFFSET] |= FPC_TCP_FLAG_SYN;
187
30.8k
        pkts->seqCliAckSrv++;
188
30.8k
        break;
189
190
30.8k
        case FPC_TCP_STATE_SYN:
191
30.8k
        pkts->tcpState = FPC_TCP_STATE_SYNACK;
192
30.8k
        header->caplen = buildTCPpacket(pkts, true, 0);
193
30.8k
        *pkt = pkts->pkt;
194
30.8k
        pkts->pkt[header->caplen-FPC_TCP_FLAGS_NEG_OFFSET] |= FPC_TCP_FLAG_SYN | FPC_TCP_FLAG_ACK;
195
30.8k
        pkts->seqSrvAckCli++;
196
30.8k
        break;
197
198
30.8k
        case FPC_TCP_STATE_SYNACK:
199
30.8k
        pkts->tcpState = FPC_TCP_STATE_ESTABLISHED;
200
30.8k
        header->caplen = buildTCPpacket(pkts, false, 0);
201
30.8k
        *pkt = pkts->pkt;
202
30.8k
        pkts->pkt[header->caplen-FPC_TCP_FLAGS_NEG_OFFSET] |= FPC_TCP_FLAG_ACK;
203
30.8k
        break;
204
205
6.36M
        case FPC_TCP_STATE_ESTABLISHED:
206
6.36M
        if (header->caplen < 1) {
207
80
            return -1;
208
80
        }
209
6.36M
        header->caplen--;
210
6.36M
        bool s2c = (*pkt[0]) & 1;
211
6.36M
        header->len = buildTCPpacket(pkts, s2c, header->caplen);
212
6.36M
        if (header->caplen + header->len > FPC_SNAPLEN) {
213
454
            header->caplen = FPC_SNAPLEN - header->len;
214
454
        }
215
6.36M
        memcpy(pkts->pkt+header->len, *pkt+1, header->caplen);
216
6.36M
        if (s2c) {
217
2.87M
            pkts->seqSrvAckCli += header->caplen;
218
3.48M
        } else {
219
3.48M
            pkts->seqCliAckSrv += header->caplen;
220
3.48M
        }
221
6.36M
        header->caplen += header->len;
222
6.36M
        *pkt = pkts->pkt;
223
6.36M
        break;
224
6.45M
    }
225
6.45M
    header->len = header->caplen;
226
6.45M
    return 1;
227
6.45M
}
228
229
15.5M
int FPC_next(FPC_buffer_t *pkts, struct pcap_pkthdr *header, const uint8_t **pkt) {
230
15.5M
    if (pkts->offset >= pkts->Size) {
231
54.4k
        return 0;
232
54.4k
    }
233
234
15.5M
    if (pkts->tcpSingleStream) {
235
6.45M
        return FPC_next_tcp(pkts, header, pkt);
236
6.45M
    } //else
237
9.06M
    return FPC_next_pcap(pkts, header, pkt);
238
15.5M
}