-
Notifications
You must be signed in to change notification settings - Fork 440
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
a6e0bfc
commit a4c5fc5
Showing
4 changed files
with
141 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,21 @@ | ||
let | ||
pkgs = import <nixpkgs> {}; | ||
in | ||
with pkgs; | ||
stdenv.mkDerivation { | ||
name = "clang-env-with-nightly-rust"; | ||
buildInputs = [ | ||
clang | ||
llvmPackages.libclang | ||
openssl | ||
cmake | ||
ninja | ||
]; | ||
shellHook = '' | ||
export LIBCLANG_PATH="${pkgs.llvmPackages.libclang}/lib"; | ||
export CC=clang; | ||
export CXX=clang++; | ||
export CFLAGS=-fsanitize=fuzzer-no-link,address | ||
export LDFLAGS=-fsanitize=address | ||
''; | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,94 @@ | ||
/* | ||
* fuzz_test_sig.c | ||
* | ||
* Minimal fuzz test for liboqs. | ||
* | ||
* SPDX-License-Identifier: MIT | ||
*/ | ||
|
||
#include <stdbool.h> | ||
#include <stdio.h> | ||
#include <stdlib.h> | ||
#include <string.h> | ||
|
||
#include <oqs/oqs.h> | ||
|
||
void cleanup_heap(uint8_t *public_key, uint8_t *secret_key, | ||
uint8_t *signature, | ||
OQS_SIG *sig); | ||
|
||
static OQS_STATUS fuzz_dilithium_2(const uint8_t *message, size_t message_len) { | ||
|
||
#ifdef OQS_ENABLE_SIG_dilithium_2 | ||
|
||
OQS_SIG *sig = NULL; | ||
uint8_t *public_key = NULL; | ||
uint8_t *secret_key = NULL; | ||
uint8_t *signature = NULL; | ||
size_t signature_len; | ||
OQS_STATUS rc; | ||
|
||
sig = OQS_SIG_new(OQS_SIG_alg_dilithium_2); | ||
if (sig == NULL) { | ||
printf("[example_heap] OQS_SIG_alg_dilithium_2 was not enabled at compile-time.\n"); | ||
return OQS_ERROR; | ||
} | ||
|
||
public_key = malloc(sig->length_public_key); | ||
secret_key = malloc(sig->length_secret_key); | ||
signature = malloc(sig->length_signature); | ||
if ((public_key == NULL) || (secret_key == NULL) || (message == NULL) || (signature == NULL)) { | ||
fprintf(stderr, "ERROR: malloc failed!\n"); | ||
cleanup_heap(public_key, secret_key, signature, sig); | ||
return OQS_ERROR; | ||
} | ||
|
||
rc = OQS_SIG_keypair(sig, public_key, secret_key); | ||
if (rc != OQS_SUCCESS) { | ||
fprintf(stderr, "ERROR: OQS_SIG_keypair failed!\n"); | ||
cleanup_heap(public_key, secret_key, signature, sig); | ||
return OQS_ERROR; | ||
} | ||
rc = OQS_SIG_sign(sig, signature, &signature_len, message, message_len, secret_key); | ||
if (rc != OQS_SUCCESS) { | ||
fprintf(stderr, "ERROR: OQS_SIG_sign failed!\n"); | ||
cleanup_heap(public_key, secret_key, signature, sig); | ||
return OQS_ERROR; | ||
} | ||
rc = OQS_SIG_verify(sig, message, message_len, signature, signature_len, public_key); | ||
if (rc != OQS_SUCCESS) { | ||
fprintf(stderr, "ERROR: OQS_SIG_verify failed!\n"); | ||
cleanup_heap(public_key, secret_key, signature, sig); | ||
return OQS_ERROR; | ||
} | ||
|
||
cleanup_heap(public_key, secret_key, signature, sig); | ||
return OQS_SUCCESS; // success | ||
#else | ||
|
||
printf("[example_heap] OQS_SIG_dilithium_2 was not enabled at compile-time.\n"); | ||
return OQS_SUCCESS; | ||
|
||
#endif | ||
} | ||
|
||
int LLVMFuzzerTestOneInput(const char* data, size_t size) { | ||
OQS_init(); | ||
if (OQS_ERROR == fuzz_dilithium_2((const uint8_t*)data, size)) { | ||
return -1; | ||
} | ||
OQS_destroy(); | ||
return 0; | ||
} | ||
|
||
|
||
void cleanup_heap(uint8_t *public_key, uint8_t *secret_key, | ||
uint8_t *signature, | ||
OQS_SIG *sig) { | ||
if (sig != NULL) { | ||
OQS_MEM_secure_free(secret_key, sig->length_secret_key); | ||
} | ||
OQS_MEM_insecure_free(public_key); | ||
OQS_MEM_insecure_free(signature); | ||
OQS_SIG_free(sig); | ||
} |