mirror of
https://github.com/yuzu-emu/mbedtls.git
synced 2024-11-26 20:45:37 +01:00
7233352432
Fuzz targets are x509 crt csr and crl parsing as well as private and public key parsing and client and server communication Fuzz targets for DTLS Simple corpus with valid DTLS connection Deterministic behavior for fuzzing, ie no timestamps
65 lines
1.7 KiB
C
65 lines
1.7 KiB
C
#include <stdint.h>
|
|
#include "mbedtls/pk.h"
|
|
|
|
//4 Kb should be enough for every bug ;-)
|
|
#define MAX_LEN 0x1000
|
|
|
|
|
|
int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) {
|
|
#ifdef MBEDTLS_PK_PARSE_C
|
|
int ret;
|
|
mbedtls_pk_context pk;
|
|
|
|
if (Size > MAX_LEN) {
|
|
//only work on small inputs
|
|
Size = MAX_LEN;
|
|
}
|
|
|
|
mbedtls_pk_init( &pk );
|
|
ret = mbedtls_pk_parse_key( &pk, Data, Size, NULL, 0 );
|
|
if (ret == 0) {
|
|
#if defined(MBEDTLS_RSA_C)
|
|
if( mbedtls_pk_get_type( &pk ) == MBEDTLS_PK_RSA )
|
|
{
|
|
mbedtls_mpi N, P, Q, D, E, DP, DQ, QP;
|
|
mbedtls_rsa_context *rsa;
|
|
|
|
mbedtls_mpi_init( &N ); mbedtls_mpi_init( &P ); mbedtls_mpi_init( &Q );
|
|
mbedtls_mpi_init( &D ); mbedtls_mpi_init( &E ); mbedtls_mpi_init( &DP );
|
|
mbedtls_mpi_init( &DQ ); mbedtls_mpi_init( &QP );
|
|
|
|
rsa = mbedtls_pk_rsa( pk );
|
|
mbedtls_rsa_export( rsa, &N, &P, &Q, &D, &E );
|
|
mbedtls_rsa_export_crt( rsa, &DP, &DQ, &QP );
|
|
|
|
mbedtls_mpi_free( &N ); mbedtls_mpi_free( &P ); mbedtls_mpi_free( &Q );
|
|
mbedtls_mpi_free( &D ); mbedtls_mpi_free( &E ); mbedtls_mpi_free( &DP );
|
|
mbedtls_mpi_free( &DQ ); mbedtls_mpi_free( &QP );
|
|
}
|
|
else
|
|
#endif
|
|
#if defined(MBEDTLS_ECP_C)
|
|
if( mbedtls_pk_get_type( &pk ) == MBEDTLS_PK_ECKEY )
|
|
{
|
|
mbedtls_ecp_keypair *ecp;
|
|
|
|
ecp = mbedtls_pk_ec( pk );
|
|
if (ecp) {
|
|
ret = 0;
|
|
}
|
|
}
|
|
else
|
|
#endif
|
|
{
|
|
ret = 0;
|
|
}
|
|
}
|
|
mbedtls_pk_free( &pk );
|
|
#else
|
|
(void) Data;
|
|
(void) Size;
|
|
#endif //MBEDTLS_PK_PARSE_C
|
|
|
|
return 0;
|
|
}
|