diff options
author | Nardi Ivan <nardi.ivan@gmail.com> | 2023-10-03 09:13:43 +0200 |
---|---|---|
committer | Ivan Nardi <12729895+IvanNardi@users.noreply.github.com> | 2023-10-07 13:34:37 +0200 |
commit | 86115a8a65c98d0665100b5ae85cc661d1404783 (patch) | |
tree | 44e8a5617892586a224e40d4ef90392324035523 /fuzz/fuzz_gcrypt_aes.cpp | |
parent | 8ca842edecbe8ff5db155f9c1c00edadae17120d (diff) |
fuzz: extend fuzzing coverage
Diffstat (limited to 'fuzz/fuzz_gcrypt_aes.cpp')
-rw-r--r-- | fuzz/fuzz_gcrypt_aes.cpp | 62 |
1 files changed, 62 insertions, 0 deletions
diff --git a/fuzz/fuzz_gcrypt_aes.cpp b/fuzz/fuzz_gcrypt_aes.cpp new file mode 100644 index 000000000..1469ab0ce --- /dev/null +++ b/fuzz/fuzz_gcrypt_aes.cpp @@ -0,0 +1,62 @@ +#include <stdlib.h> +#include <stdint.h> +#include "fuzzer/FuzzedDataProvider.h" + +#define MBEDTLS_CHECK_RETURN_TYPICAL +#include "../src/lib/third_party/include/gcrypt/aes.h" + +extern int force_no_aesni; + +extern "C" int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { + FuzzedDataProvider fuzzed_data(data, size); + mbedtls_aes_context *ctx; + int key_lens[] = { 128, 192, 256, 512 /* invalid */ }; + unsigned char *input, *output, *key; + int i, key_len, mode, rc; + + /* No real memory allocations involved */ + + if(fuzzed_data.remaining_bytes() < 1 + 1 + 4 + 512 / 8 + 16) + return -1; + + posix_memalign((void **)&input, 8, 16); + posix_memalign((void **)&output, 8, 16); + posix_memalign((void **)&key, 8, 512 / 8); + ctx = (mbedtls_aes_context *)malloc(sizeof(mbedtls_aes_context)); + + force_no_aesni = 0; + if(fuzzed_data.ConsumeBool()) + force_no_aesni = 1; + + mode = MBEDTLS_AES_ENCRYPT; + if(fuzzed_data.ConsumeBool()) + mode = MBEDTLS_AES_DECRYPT; + + mbedtls_aes_init(ctx); + + key_len = fuzzed_data.PickValueInArray(key_lens); + std::vector<unsigned char>k = fuzzed_data.ConsumeBytes<u_int8_t>(key_len / 8); + std::vector<u_int8_t>in = fuzzed_data.ConsumeBytes<uint8_t>(16); + + for(i = 0; i < 16; i++) + input[i] = in[i]; + for(i = 0; i < key_len / 8; i++) + key[i] = k[i]; + + if(mode == MBEDTLS_AES_ENCRYPT) + rc = mbedtls_aes_setkey_enc(ctx, key, key_len); + else + rc = mbedtls_aes_setkey_dec(ctx, key, key_len); + + if(rc == 0) + mbedtls_aes_crypt_ecb(ctx, mode, input, output); + + mbedtls_aes_free(ctx); + + free(ctx); + free(key); + free(input); + free(output); + + return 0; +} |