mysql/test/fuzzing/fuzz_handshake_server_response.cpp
Anarthal (Rubén Pérez) 90405e79e4
Handshake is now more resilient
Errors issued by the server for caching_sha2_password users after a fast
auth OK packet has been received (e.g. bad database errors) are now
reported correctly
Handshake now correctly detects protocol violation errors, like double
auth switches

close #469 
close #468
2025-05-07 13:11:52 +02:00

28 lines
982 B
C++

//
// Copyright (c) 2019-2025 Ruben Perez Hidalgo (rubenperez038 at gmail dot com)
//
// Distributed under the Boost Software License, Version 1.0. (See accompanying
// file LICENSE_1_0.txt or copy at http://www.boost.org/LICENSE_1_0.txt)
//
#include <boost/mysql/diagnostics.hpp>
#include <boost/mysql/impl/internal/protocol/db_flavor.hpp>
#include <boost/mysql/impl/internal/protocol/deserialization.hpp>
using namespace boost::mysql::detail;
static bool parse_handshake_server_response(const uint8_t* data, size_t size) noexcept
{
boost::mysql::diagnostics diag;
auto msg = deserialize_handshake_server_response({data, size}, db_flavor::mysql, diag);
return msg.type == handshake_server_response::type_t::error && diag.server_message().empty();
}
extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size)
{
// Note: this code should never throw exceptions, for any kind of input
parse_handshake_server_response(data, size);
return 0;
}