summaryrefslogtreecommitdiff
path: root/vcl
diff options
context:
space:
mode:
Diffstat (limited to 'vcl')
-rw-r--r--vcl/Executable_rtf2pdffuzzer.mk50
-rw-r--r--vcl/Module_vcl.mk1
-rw-r--r--vcl/workben/fftester.cxx10
-rw-r--r--vcl/workben/rtf2pdffuzzer.cxx62
-rw-r--r--vcl/workben/rtf2pdffuzzer.options3
5 files changed, 126 insertions, 0 deletions
diff --git a/vcl/Executable_rtf2pdffuzzer.mk b/vcl/Executable_rtf2pdffuzzer.mk
new file mode 100644
index 000000000000..78efef1748f4
--- /dev/null
+++ b/vcl/Executable_rtf2pdffuzzer.mk
@@ -0,0 +1,50 @@
+# -*- Mode: makefile-gmake; tab-width: 4; indent-tabs-mode: t -*-
+#
+#
+# This file is part of the LibreOffice project.
+#
+# This Source Code Form is subject to the terms of the Mozilla Public
+# License, v. 2.0. If a copy of the MPL was not distributed with this
+# file, You can obtain one at http://mozilla.org/MPL/2.0/.
+#
+
+include $(SRCDIR)/vcl/commonfuzzer.mk
+
+$(eval $(call gb_Executable_Executable,rtf2pdffuzzer))
+
+$(eval $(call gb_Executable_use_api,rtf2pdffuzzer,\
+ offapi \
+ udkapi \
+))
+
+$(eval $(call gb_Executable_use_externals,rtf2pdffuzzer,\
+ $(fuzzer_externals) \
+ epubgen \
+ revenge \
+))
+
+$(eval $(call gb_Executable_set_include,rtf2pdffuzzer,\
+ $$(INCLUDE) \
+ -I$(SRCDIR)/vcl/inc \
+))
+
+$(eval $(call gb_Executable_use_libraries,rtf2pdffuzzer,\
+ $(fuzzer_writer_libraries) \
+ $(fuzzer_core_libraries) \
+ pdffilter \
+))
+
+$(eval $(call gb_Executable_use_static_libraries,rtf2pdffuzzer,\
+ $(fuzzer_statics) \
+ fuzzer_writer \
+))
+
+$(eval $(call gb_Executable_add_exception_objects,rtf2pdffuzzer,\
+ vcl/workben/rtf2pdffuzzer \
+))
+
+$(eval $(call gb_Executable_add_libs,rtf2pdffuzzer,\
+ $(LIB_FUZZING_ENGINE) \
+))
+
+# vim: set noet sw=4 ts=4:
diff --git a/vcl/Module_vcl.mk b/vcl/Module_vcl.mk
index c0a624acdc95..a79262b1c757 100644
--- a/vcl/Module_vcl.mk
+++ b/vcl/Module_vcl.mk
@@ -183,6 +183,7 @@ $(eval $(call gb_Module_add_targets,vcl,\
Executable_olefuzzer \
Executable_pptfuzzer \
Executable_rtffuzzer \
+ Executable_rtf2pdffuzzer \
Executable_cgmfuzzer \
Executable_ww2fuzzer \
Executable_ww6fuzzer \
diff --git a/vcl/workben/fftester.cxx b/vcl/workben/fftester.cxx
index e086e2e22e79..75d511b1278f 100644
--- a/vcl/workben/fftester.cxx
+++ b/vcl/workben/fftester.cxx
@@ -332,6 +332,16 @@ SAL_IMPLEMENT_MAIN_WITH_ARGS(argc, argv)
SvFileStream aFileStream(out, StreamMode::READ);
ret = static_cast<int>((*pfnImport)(aFileStream));
}
+ else if (strcmp(argv[2], "rtf2pdf") == 0)
+ {
+ static FFilterCall pfnImport(nullptr);
+ if (!pfnImport)
+ {
+ pfnImport = load(u"libmswordlo.so", "TestPDFExportRTF");
+ }
+ SvFileStream aFileStream(out, StreamMode::READ);
+ ret = static_cast<int>((*pfnImport)(aFileStream));
+ }
else if (strcmp(argv[2], "fods2xls") == 0)
{
static FFilterCall pfnImport(nullptr);
diff --git a/vcl/workben/rtf2pdffuzzer.cxx b/vcl/workben/rtf2pdffuzzer.cxx
new file mode 100644
index 000000000000..9a5a6c5361c8
--- /dev/null
+++ b/vcl/workben/rtf2pdffuzzer.cxx
@@ -0,0 +1,62 @@
+/* -*- Mode: C++; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- */
+/*
+ * This file is part of the LibreOffice project.
+ *
+ * This Source Code Form is subject to the terms of the Mozilla Public
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/.
+ */
+
+#include <tools/stream.hxx>
+#include <vcl/FilterConfigItem.hxx>
+#include <com/sun/star/awt/XToolkit.hpp>
+#include <com/sun/star/ucb/XContentProvider.hpp>
+#include <com/sun/star/ucb/XUniversalContentBroker.hpp>
+#include <libxml/parser.h>
+#include "commonfuzzer.hxx"
+
+extern "C" bool TestPDFExportRTF(SvStream& rStream);
+
+static void silent_error_func(void*, const char* /*format*/, ...) {}
+
+extern "C" int LLVMFuzzerInitialize(int* argc, char*** argv)
+{
+ if (__lsan_disable)
+ __lsan_disable();
+
+ CommonInitialize(argc, argv);
+
+ // initialise unconfigured UCB:
+ css::uno::Reference<css::ucb::XUniversalContentBroker> xUcb(
+ comphelper::getProcessServiceFactory()->createInstance(
+ "com.sun.star.ucb.UniversalContentBroker"),
+ css::uno::UNO_QUERY_THROW);
+ css::uno::Sequence<css::uno::Any> aArgs{ css::uno::Any(OUString("NoConfig")) };
+ css::uno::Reference<css::ucb::XContentProvider> xFileProvider(
+ comphelper::getProcessServiceFactory()->createInstanceWithArguments(
+ "com.sun.star.ucb.FileContentProvider", aArgs),
+ css::uno::UNO_QUERY_THROW);
+ xUcb->registerContentProvider(xFileProvider, "file", true);
+
+ // create and hold a reference to XToolkit here to avoid the lsan warning about its leak
+ // due to getting created in the unusual case of no vcl main loop
+ static css::uno::Reference<css::awt::XToolkit> xTk(
+ comphelper::getProcessServiceFactory()->createInstance("com.sun.star.awt.Toolkit"),
+ css::uno::UNO_QUERY_THROW);
+
+ if (__lsan_enable)
+ __lsan_enable();
+
+ return 0;
+}
+
+extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size)
+{
+ SvMemoryStream aStream(const_cast<uint8_t*>(data), size, StreamMode::READ);
+ bool bRTFLoaded = TestPDFExportRTF(aStream);
+ // if the rtf didn't load then reject so that input will not be added to the corpus
+ // we're not interested in input that doesn't go on to exercise the pdf export
+ return bRTFLoaded ? 0 : -1;
+}
+
+/* vim:set shiftwidth=4 softtabstop=4 expandtab: */
diff --git a/vcl/workben/rtf2pdffuzzer.options b/vcl/workben/rtf2pdffuzzer.options
new file mode 100644
index 000000000000..0a8e8c36b319
--- /dev/null
+++ b/vcl/workben/rtf2pdffuzzer.options
@@ -0,0 +1,3 @@
+[libfuzzer]
+max_len = 512
+dict = rtf.dict