Path: blob/main/crypto/krb5/src/tests/fuzzing/fuzz_crypto.c
34879 views
/* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */1/* tests/fuzzing/fuzz_crypto.c - fuzzing harness for general crypto */2/*3* Copyright (C) 2024 by Arjun. All rights reserved.4*5* Redistribution and use in source and binary forms, with or without6* modification, are permitted provided that the following conditions7* are met:8*9* * Redistributions of source code must retain the above copyright10* notice, this list of conditions and the following disclaimer.11*12* * Redistributions in binary form must reproduce the above copyright13* notice, this list of conditions and the following disclaimer in14* the documentation and/or other materials provided with the15* distribution.16*17* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS18* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT19* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS20* FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE21* COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,22* INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES23* (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR24* SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)25* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,26* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)27* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED28* OF THE POSSIBILITY OF SUCH DAMAGE.29*/3031#include "autoconf.h"32#include <k5-int.h>33#include <crypto_int.h>3435#define kMinInputLength 236#define kMaxInputLength 5123738extern int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size);3940static void41fuzz_checksum(krb5_cksumtype sumtype, krb5_keyblock keyblock,42krb5_keyusage usage, krb5_data data)43{44krb5_error_code ret;45krb5_checksum cksum;46krb5_boolean valid;4748ret = krb5_c_make_checksum(NULL, sumtype, &keyblock, usage, &data, &cksum);49if (ret)50return;5152ret = krb5_c_verify_checksum(NULL, &keyblock, usage, &data, &cksum,53&valid);54if (ret || !valid)55abort();5657krb5_free_checksum_contents(NULL, &cksum);58}5960static void61fuzz_crypt(krb5_keyblock keyblock, krb5_enctype enctype,62krb5_keyusage usage, krb5_data data)63{64krb5_error_code ret;65krb5_enc_data encoded = { 0 };66krb5_data decoded = empty_data();67size_t enclen;6869ret = krb5_c_encrypt_length(NULL, enctype, data.length, &enclen);70if (ret)71return;7273encoded.magic = KV5M_ENC_DATA;74encoded.enctype = enctype;7576ret = alloc_data(&encoded.ciphertext, enclen);77if (ret)78return;7980ret = alloc_data(&decoded, data.length);81if (ret) {82krb5_free_data_contents(NULL, &encoded.ciphertext);83return;84}8586ret = krb5_c_encrypt(NULL, &keyblock, usage, NULL, &data, &encoded);87if (ret)88goto cleanup;8990ret = krb5_c_decrypt(NULL, &keyblock, usage, NULL, &encoded, &decoded);91if (ret)92goto cleanup;9394if (memcmp(data.data, decoded.data, data.length) != 0)95abort();9697cleanup:98krb5_free_data_contents(NULL, &encoded.ciphertext);99krb5_free_data_contents(NULL, &decoded);100}101102static void103fuzz_prf(krb5_keyblock keyblock, krb5_enctype enctype, krb5_data data)104{105krb5_error_code ret;106krb5_data output;107size_t prfsz;108109ret = krb5_c_prf_length(NULL, enctype, &prfsz);110if (ret)111return;112113ret = alloc_data(&output, prfsz);114if (ret)115return;116117krb5_c_prf(NULL, &keyblock, &data, &output);118119krb5_free_data_contents(NULL, &output);120}121122static void123fuzz_setup(krb5_enctype enctype, krb5_cksumtype sumtype,124krb5_keyusage usage, krb5_data data)125{126krb5_error_code ret;127krb5_keyblock keyblock;128129ret = krb5_c_make_random_key(NULL, enctype, &keyblock);130if (ret)131return;132133fuzz_checksum(sumtype, keyblock, usage, data);134fuzz_crypt(keyblock, enctype, usage, data);135fuzz_prf(keyblock, enctype, data);136137krb5_free_keyblock_contents(NULL, &keyblock);138}139140int141LLVMFuzzerTestOneInput(const uint8_t *data, size_t size)142{143krb5_data data_in;144145if (size < kMinInputLength || size > kMaxInputLength)146return 0;147148data_in = make_data((void *)data, size);149150fuzz_setup(ENCTYPE_DES3_CBC_SHA1, CKSUMTYPE_HMAC_SHA1_DES3, 0, data_in);151fuzz_setup(ENCTYPE_ARCFOUR_HMAC, CKSUMTYPE_MD5_HMAC_ARCFOUR, 1, data_in);152fuzz_setup(ENCTYPE_ARCFOUR_HMAC, CKSUMTYPE_HMAC_MD5_ARCFOUR, 2, data_in);153fuzz_setup(ENCTYPE_ARCFOUR_HMAC_EXP, CKSUMTYPE_RSA_MD4, 3, data_in);154fuzz_setup(ENCTYPE_ARCFOUR_HMAC_EXP, CKSUMTYPE_RSA_MD5, 4, data_in);155fuzz_setup(ENCTYPE_ARCFOUR_HMAC_EXP, CKSUMTYPE_SHA1, 5, data_in);156fuzz_setup(ENCTYPE_AES128_CTS_HMAC_SHA1_96, CKSUMTYPE_HMAC_SHA1_96_AES128,1576, data_in);158fuzz_setup(ENCTYPE_AES256_CTS_HMAC_SHA1_96, CKSUMTYPE_HMAC_SHA1_96_AES256,1597, data_in);160fuzz_setup(ENCTYPE_CAMELLIA128_CTS_CMAC, CKSUMTYPE_CMAC_CAMELLIA128,1618, data_in);162fuzz_setup(ENCTYPE_CAMELLIA256_CTS_CMAC, CKSUMTYPE_CMAC_CAMELLIA256,1639, data_in);164fuzz_setup(ENCTYPE_AES128_CTS_HMAC_SHA256_128,165CKSUMTYPE_HMAC_SHA256_128_AES128, 10, data_in);166fuzz_setup(ENCTYPE_AES256_CTS_HMAC_SHA384_192,167CKSUMTYPE_HMAC_SHA384_192_AES256, 11, data_in);168169return 0;170}171172173