fuzz_hsdescv3.c 2.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104
  1. /* Copyright (c) 2017-2019, The Tor Project, Inc. */
  2. /* See LICENSE for licensing information */
  3. #define HS_DESCRIPTOR_PRIVATE
  4. #include "core/or/or.h"
  5. #include "trunnel/ed25519_cert.h" /* Trunnel interface. */
  6. #include "lib/crypt_ops/crypto_ed25519.h"
  7. #include "feature/hs/hs_descriptor.h"
  8. #include "feature/dirparse/unparseable.h"
  9. #include "test/fuzz/fuzzing.h"
  10. static void
  11. mock_dump_desc__nodump(const char *desc, const char *type)
  12. {
  13. (void)desc;
  14. (void)type;
  15. }
  16. static int
  17. mock_rsa_ed25519_crosscert_check(const uint8_t *crosscert,
  18. const size_t crosscert_len,
  19. const crypto_pk_t *rsa_id_key,
  20. const ed25519_public_key_t *master_key,
  21. const time_t reject_if_expired_before)
  22. {
  23. (void) crosscert;
  24. (void) crosscert_len;
  25. (void) rsa_id_key;
  26. (void) master_key;
  27. (void) reject_if_expired_before;
  28. return 0;
  29. }
  30. static size_t
  31. mock_decrypt_desc_layer(const hs_descriptor_t *desc,
  32. const uint8_t *descriptor_cookie,
  33. bool is_superencrypted_layer,
  34. char **decrypted_out)
  35. {
  36. (void)is_superencrypted_layer;
  37. (void)desc;
  38. (void)descriptor_cookie;
  39. const size_t overhead = HS_DESC_ENCRYPTED_SALT_LEN + DIGEST256_LEN;
  40. const uint8_t *encrypted_blob = (is_superencrypted_layer)
  41. ? desc->plaintext_data.superencrypted_blob
  42. : desc->superencrypted_data.encrypted_blob;
  43. size_t encrypted_blob_size = (is_superencrypted_layer)
  44. ? desc->plaintext_data.superencrypted_blob_size
  45. : desc->superencrypted_data.encrypted_blob_size;
  46. if (encrypted_blob_size < overhead)
  47. return 0;
  48. *decrypted_out = tor_memdup_nulterm(
  49. encrypted_blob + HS_DESC_ENCRYPTED_SALT_LEN,
  50. encrypted_blob_size - overhead);
  51. size_t result = strlen(*decrypted_out);
  52. if (result) {
  53. return result;
  54. } else {
  55. tor_free(*decrypted_out);
  56. return 0;
  57. }
  58. }
  59. int
  60. fuzz_init(void)
  61. {
  62. disable_signature_checking();
  63. MOCK(dump_desc, mock_dump_desc__nodump);
  64. MOCK(rsa_ed25519_crosscert_check, mock_rsa_ed25519_crosscert_check);
  65. MOCK(decrypt_desc_layer, mock_decrypt_desc_layer);
  66. ed25519_init();
  67. return 0;
  68. }
  69. int
  70. fuzz_cleanup(void)
  71. {
  72. return 0;
  73. }
  74. int
  75. fuzz_main(const uint8_t *data, size_t sz)
  76. {
  77. hs_descriptor_t *desc = NULL;
  78. uint8_t subcredential[DIGEST256_LEN];
  79. char *fuzzing_data = tor_memdup_nulterm(data, sz);
  80. memset(subcredential, 'A', sizeof(subcredential));
  81. hs_desc_decode_descriptor(fuzzing_data, subcredential, NULL, &desc);
  82. if (desc) {
  83. log_debug(LD_GENERAL, "Decoding okay");
  84. hs_descriptor_free(desc);
  85. } else {
  86. log_debug(LD_GENERAL, "Decoding failed");
  87. }
  88. tor_free(fuzzing_data);
  89. return 0;
  90. }