| /* $OpenBSD: test_fuzz.c,v 1.1 2014/06/24 01:14:18 djm Exp $ */ |
| /* |
| * Fuzz tests for key parsing |
| * |
| * Placed in the public domain |
| */ |
| |
| #include "includes.h" |
| |
| #include <sys/types.h> |
| #include <sys/param.h> |
| #include <sys/stat.h> |
| #include <fcntl.h> |
| #include <stdio.h> |
| #ifdef HAVE_STDINT_H |
| #include <stdint.h> |
| #endif |
| #include <stdlib.h> |
| #include <string.h> |
| #include <unistd.h> |
| |
| #include <openssl/bn.h> |
| #include <openssl/ec.h> |
| #include <openssl/rsa.h> |
| #include <openssl/dsa.h> |
| #include <openssl/objects.h> |
| |
| #include "../test_helper/test_helper.h" |
| |
| #include "ssherr.h" |
| #include "authfile.h" |
| #include "sshkey.h" |
| #include "sshbuf.h" |
| |
| #include "common.h" |
| |
| void sshkey_fuzz_tests(void); |
| |
| static void |
| onerror(void *fuzz) |
| { |
| fprintf(stderr, "Failed during fuzz:\n"); |
| fuzz_dump((struct fuzz *)fuzz); |
| } |
| |
| static void |
| public_fuzz(struct sshkey *k) |
| { |
| struct sshkey *k1; |
| struct sshbuf *buf; |
| struct fuzz *fuzz; |
| |
| ASSERT_PTR_NE(buf = sshbuf_new(), NULL); |
| ASSERT_INT_EQ(sshkey_to_blob_buf(k, buf), 0); |
| /* XXX need a way to run the tests in "slow, but complete" mode */ |
| fuzz = fuzz_begin(FUZZ_1_BIT_FLIP | /* XXX too slow FUZZ_2_BIT_FLIP | */ |
| FUZZ_1_BYTE_FLIP | /* XXX too slow FUZZ_2_BYTE_FLIP | */ |
| FUZZ_TRUNCATE_START | FUZZ_TRUNCATE_END, |
| sshbuf_mutable_ptr(buf), sshbuf_len(buf)); |
| ASSERT_INT_EQ(sshkey_from_blob(sshbuf_ptr(buf), sshbuf_len(buf), |
| &k1), 0); |
| sshkey_free(k1); |
| sshbuf_free(buf); |
| TEST_ONERROR(onerror, fuzz); |
| for(; !fuzz_done(fuzz); fuzz_next(fuzz)) { |
| if (sshkey_from_blob(fuzz_ptr(fuzz), fuzz_len(fuzz), &k1) == 0) |
| sshkey_free(k1); |
| } |
| fuzz_cleanup(fuzz); |
| } |
| |
| static void |
| sig_fuzz(struct sshkey *k) |
| { |
| struct fuzz *fuzz; |
| u_char *sig, c[] = "some junk to be signed"; |
| size_t l; |
| |
| ASSERT_INT_EQ(sshkey_sign(k, &sig, &l, c, sizeof(c), 0), 0); |
| ASSERT_SIZE_T_GT(l, 0); |
| fuzz = fuzz_begin(FUZZ_1_BIT_FLIP | /* too slow FUZZ_2_BIT_FLIP | */ |
| FUZZ_1_BYTE_FLIP | FUZZ_2_BYTE_FLIP | |
| FUZZ_TRUNCATE_START | FUZZ_TRUNCATE_END, sig, l); |
| ASSERT_INT_EQ(sshkey_verify(k, sig, l, c, sizeof(c), 0), 0); |
| free(sig); |
| TEST_ONERROR(onerror, fuzz); |
| for(; !fuzz_done(fuzz); fuzz_next(fuzz)) { |
| sshkey_verify(k, fuzz_ptr(fuzz), fuzz_len(fuzz), |
| c, sizeof(c), 0); |
| } |
| fuzz_cleanup(fuzz); |
| } |
| |
| void |
| sshkey_fuzz_tests(void) |
| { |
| struct sshkey *k1; |
| struct sshbuf *buf, *fuzzed; |
| struct fuzz *fuzz; |
| int r; |
| |
| TEST_START("fuzz RSA1 private"); |
| buf = load_file("rsa1_1"); |
| fuzz = fuzz_begin(FUZZ_1_BIT_FLIP | FUZZ_1_BYTE_FLIP | |
| FUZZ_TRUNCATE_START | FUZZ_TRUNCATE_END, |
| sshbuf_mutable_ptr(buf), sshbuf_len(buf)); |
| ASSERT_INT_EQ(sshkey_parse_private_fileblob(buf, "", "key", |
| &k1, NULL), 0); |
| sshkey_free(k1); |
| sshbuf_free(buf); |
| ASSERT_PTR_NE(fuzzed = sshbuf_new(), NULL); |
| TEST_ONERROR(onerror, fuzz); |
| for(; !fuzz_done(fuzz); fuzz_next(fuzz)) { |
| r = sshbuf_put(fuzzed, fuzz_ptr(fuzz), fuzz_len(fuzz)); |
| ASSERT_INT_EQ(r, 0); |
| if (sshkey_parse_private_fileblob(fuzzed, "", "key", |
| &k1, NULL) == 0) |
| sshkey_free(k1); |
| sshbuf_reset(fuzzed); |
| } |
| sshbuf_free(fuzzed); |
| fuzz_cleanup(fuzz); |
| TEST_DONE(); |
| |
| TEST_START("fuzz RSA1 public"); |
| buf = load_file("rsa1_1_pw"); |
| fuzz = fuzz_begin(FUZZ_1_BIT_FLIP | FUZZ_1_BYTE_FLIP | |
| FUZZ_TRUNCATE_START | FUZZ_TRUNCATE_END, |
| sshbuf_mutable_ptr(buf), sshbuf_len(buf)); |
| ASSERT_INT_EQ(sshkey_parse_public_rsa1_fileblob(buf, &k1, NULL), 0); |
| sshkey_free(k1); |
| sshbuf_free(buf); |
| ASSERT_PTR_NE(fuzzed = sshbuf_new(), NULL); |
| TEST_ONERROR(onerror, fuzz); |
| for(; !fuzz_done(fuzz); fuzz_next(fuzz)) { |
| r = sshbuf_put(fuzzed, fuzz_ptr(fuzz), fuzz_len(fuzz)); |
| ASSERT_INT_EQ(r, 0); |
| if (sshkey_parse_public_rsa1_fileblob(fuzzed, &k1, NULL) == 0) |
| sshkey_free(k1); |
| sshbuf_reset(fuzzed); |
| } |
| sshbuf_free(fuzzed); |
| fuzz_cleanup(fuzz); |
| TEST_DONE(); |
| |
| TEST_START("fuzz RSA private"); |
| buf = load_file("rsa_1"); |
| fuzz = fuzz_begin(FUZZ_BASE64, sshbuf_mutable_ptr(buf), |
| sshbuf_len(buf)); |
| ASSERT_INT_EQ(sshkey_parse_private_fileblob(buf, "", "key", |
| &k1, NULL), 0); |
| sshkey_free(k1); |
| sshbuf_free(buf); |
| ASSERT_PTR_NE(fuzzed = sshbuf_new(), NULL); |
| TEST_ONERROR(onerror, fuzz); |
| for(; !fuzz_done(fuzz); fuzz_next(fuzz)) { |
| r = sshbuf_put(fuzzed, fuzz_ptr(fuzz), fuzz_len(fuzz)); |
| ASSERT_INT_EQ(r, 0); |
| if (sshkey_parse_private_fileblob(fuzzed, "", "key", |
| &k1, NULL) == 0) |
| sshkey_free(k1); |
| sshbuf_reset(fuzzed); |
| } |
| sshbuf_free(fuzzed); |
| fuzz_cleanup(fuzz); |
| TEST_DONE(); |
| |
| TEST_START("fuzz RSA new-format private"); |
| buf = load_file("rsa_n"); |
| fuzz = fuzz_begin(FUZZ_BASE64, sshbuf_mutable_ptr(buf), |
| sshbuf_len(buf)); |
| ASSERT_INT_EQ(sshkey_parse_private_fileblob(buf, "", "key", |
| &k1, NULL), 0); |
| sshkey_free(k1); |
| sshbuf_free(buf); |
| ASSERT_PTR_NE(fuzzed = sshbuf_new(), NULL); |
| TEST_ONERROR(onerror, fuzz); |
| for(; !fuzz_done(fuzz); fuzz_next(fuzz)) { |
| r = sshbuf_put(fuzzed, fuzz_ptr(fuzz), fuzz_len(fuzz)); |
| ASSERT_INT_EQ(r, 0); |
| if (sshkey_parse_private_fileblob(fuzzed, "", "key", |
| &k1, NULL) == 0) |
| sshkey_free(k1); |
| sshbuf_reset(fuzzed); |
| } |
| sshbuf_free(fuzzed); |
| fuzz_cleanup(fuzz); |
| TEST_DONE(); |
| |
| TEST_START("fuzz DSA private"); |
| buf = load_file("dsa_1"); |
| fuzz = fuzz_begin(FUZZ_BASE64, sshbuf_mutable_ptr(buf), |
| sshbuf_len(buf)); |
| ASSERT_INT_EQ(sshkey_parse_private_fileblob(buf, "", "key", |
| &k1, NULL), 0); |
| sshkey_free(k1); |
| sshbuf_free(buf); |
| ASSERT_PTR_NE(fuzzed = sshbuf_new(), NULL); |
| TEST_ONERROR(onerror, fuzz); |
| for(; !fuzz_done(fuzz); fuzz_next(fuzz)) { |
| r = sshbuf_put(fuzzed, fuzz_ptr(fuzz), fuzz_len(fuzz)); |
| ASSERT_INT_EQ(r, 0); |
| if (sshkey_parse_private_fileblob(fuzzed, "", "key", |
| &k1, NULL) == 0) |
| sshkey_free(k1); |
| sshbuf_reset(fuzzed); |
| } |
| sshbuf_free(fuzzed); |
| fuzz_cleanup(fuzz); |
| TEST_DONE(); |
| |
| TEST_START("fuzz DSA new-format private"); |
| buf = load_file("dsa_n"); |
| fuzz = fuzz_begin(FUZZ_BASE64, sshbuf_mutable_ptr(buf), |
| sshbuf_len(buf)); |
| ASSERT_INT_EQ(sshkey_parse_private_fileblob(buf, "", "key", |
| &k1, NULL), 0); |
| sshkey_free(k1); |
| sshbuf_free(buf); |
| ASSERT_PTR_NE(fuzzed = sshbuf_new(), NULL); |
| TEST_ONERROR(onerror, fuzz); |
| for(; !fuzz_done(fuzz); fuzz_next(fuzz)) { |
| r = sshbuf_put(fuzzed, fuzz_ptr(fuzz), fuzz_len(fuzz)); |
| ASSERT_INT_EQ(r, 0); |
| if (sshkey_parse_private_fileblob(fuzzed, "", "key", |
| &k1, NULL) == 0) |
| sshkey_free(k1); |
| sshbuf_reset(fuzzed); |
| } |
| sshbuf_free(fuzzed); |
| fuzz_cleanup(fuzz); |
| TEST_DONE(); |
| |
| TEST_START("fuzz ECDSA private"); |
| buf = load_file("ecdsa_1"); |
| fuzz = fuzz_begin(FUZZ_BASE64, sshbuf_mutable_ptr(buf), |
| sshbuf_len(buf)); |
| ASSERT_INT_EQ(sshkey_parse_private_fileblob(buf, "", "key", |
| &k1, NULL), 0); |
| sshkey_free(k1); |
| sshbuf_free(buf); |
| ASSERT_PTR_NE(fuzzed = sshbuf_new(), NULL); |
| TEST_ONERROR(onerror, fuzz); |
| for(; !fuzz_done(fuzz); fuzz_next(fuzz)) { |
| r = sshbuf_put(fuzzed, fuzz_ptr(fuzz), fuzz_len(fuzz)); |
| ASSERT_INT_EQ(r, 0); |
| if (sshkey_parse_private_fileblob(fuzzed, "", "key", |
| &k1, NULL) == 0) |
| sshkey_free(k1); |
| sshbuf_reset(fuzzed); |
| } |
| sshbuf_free(fuzzed); |
| fuzz_cleanup(fuzz); |
| TEST_DONE(); |
| |
| TEST_START("fuzz ECDSA new-format private"); |
| buf = load_file("ecdsa_n"); |
| fuzz = fuzz_begin(FUZZ_BASE64, sshbuf_mutable_ptr(buf), |
| sshbuf_len(buf)); |
| ASSERT_INT_EQ(sshkey_parse_private_fileblob(buf, "", "key", |
| &k1, NULL), 0); |
| sshkey_free(k1); |
| sshbuf_free(buf); |
| ASSERT_PTR_NE(fuzzed = sshbuf_new(), NULL); |
| TEST_ONERROR(onerror, fuzz); |
| for(; !fuzz_done(fuzz); fuzz_next(fuzz)) { |
| r = sshbuf_put(fuzzed, fuzz_ptr(fuzz), fuzz_len(fuzz)); |
| ASSERT_INT_EQ(r, 0); |
| if (sshkey_parse_private_fileblob(fuzzed, "", "key", |
| &k1, NULL) == 0) |
| sshkey_free(k1); |
| sshbuf_reset(fuzzed); |
| } |
| sshbuf_free(fuzzed); |
| fuzz_cleanup(fuzz); |
| TEST_DONE(); |
| |
| TEST_START("fuzz Ed25519 private"); |
| buf = load_file("ed25519_1"); |
| fuzz = fuzz_begin(FUZZ_BASE64, sshbuf_mutable_ptr(buf), |
| sshbuf_len(buf)); |
| ASSERT_INT_EQ(sshkey_parse_private_fileblob(buf, "", "key", |
| &k1, NULL), 0); |
| sshkey_free(k1); |
| sshbuf_free(buf); |
| ASSERT_PTR_NE(fuzzed = sshbuf_new(), NULL); |
| TEST_ONERROR(onerror, fuzz); |
| for(; !fuzz_done(fuzz); fuzz_next(fuzz)) { |
| r = sshbuf_put(fuzzed, fuzz_ptr(fuzz), fuzz_len(fuzz)); |
| ASSERT_INT_EQ(r, 0); |
| if (sshkey_parse_private_fileblob(fuzzed, "", "key", |
| &k1, NULL) == 0) |
| sshkey_free(k1); |
| sshbuf_reset(fuzzed); |
| } |
| sshbuf_free(fuzzed); |
| fuzz_cleanup(fuzz); |
| TEST_DONE(); |
| |
| TEST_START("fuzz RSA public"); |
| buf = load_file("rsa_1"); |
| ASSERT_INT_EQ(sshkey_parse_private_fileblob(buf, "", "key", |
| &k1, NULL), 0); |
| sshbuf_free(buf); |
| public_fuzz(k1); |
| sshkey_free(k1); |
| TEST_DONE(); |
| |
| TEST_START("fuzz RSA cert"); |
| ASSERT_INT_EQ(sshkey_load_cert(test_data_file("rsa_1"), &k1), 0); |
| public_fuzz(k1); |
| sshkey_free(k1); |
| TEST_DONE(); |
| |
| TEST_START("fuzz DSA public"); |
| buf = load_file("dsa_1"); |
| ASSERT_INT_EQ(sshkey_parse_private_fileblob(buf, "", "key", |
| &k1, NULL), 0); |
| sshbuf_free(buf); |
| public_fuzz(k1); |
| sshkey_free(k1); |
| TEST_DONE(); |
| |
| TEST_START("fuzz DSA cert"); |
| ASSERT_INT_EQ(sshkey_load_cert(test_data_file("dsa_1"), &k1), 0); |
| public_fuzz(k1); |
| sshkey_free(k1); |
| TEST_DONE(); |
| |
| TEST_START("fuzz ECDSA public"); |
| buf = load_file("ecdsa_1"); |
| ASSERT_INT_EQ(sshkey_parse_private_fileblob(buf, "", "key", |
| &k1, NULL), 0); |
| sshbuf_free(buf); |
| public_fuzz(k1); |
| sshkey_free(k1); |
| TEST_DONE(); |
| |
| TEST_START("fuzz ECDSA cert"); |
| ASSERT_INT_EQ(sshkey_load_cert(test_data_file("ecdsa_1"), &k1), 0); |
| public_fuzz(k1); |
| sshkey_free(k1); |
| TEST_DONE(); |
| |
| TEST_START("fuzz Ed25519 public"); |
| buf = load_file("ed25519_1"); |
| ASSERT_INT_EQ(sshkey_parse_private_fileblob(buf, "", "key", |
| &k1, NULL), 0); |
| sshbuf_free(buf); |
| public_fuzz(k1); |
| sshkey_free(k1); |
| TEST_DONE(); |
| |
| TEST_START("fuzz Ed25519 cert"); |
| ASSERT_INT_EQ(sshkey_load_cert(test_data_file("ed25519_1"), &k1), 0); |
| public_fuzz(k1); |
| sshkey_free(k1); |
| TEST_DONE(); |
| |
| TEST_START("fuzz RSA sig"); |
| buf = load_file("rsa_1"); |
| ASSERT_INT_EQ(sshkey_parse_private_fileblob(buf, "", "key", |
| &k1, NULL), 0); |
| sshbuf_free(buf); |
| sig_fuzz(k1); |
| sshkey_free(k1); |
| TEST_DONE(); |
| |
| TEST_START("fuzz DSA sig"); |
| buf = load_file("dsa_1"); |
| ASSERT_INT_EQ(sshkey_parse_private_fileblob(buf, "", "key", |
| &k1, NULL), 0); |
| sshbuf_free(buf); |
| sig_fuzz(k1); |
| sshkey_free(k1); |
| TEST_DONE(); |
| |
| TEST_START("fuzz ECDSA sig"); |
| buf = load_file("ecdsa_1"); |
| ASSERT_INT_EQ(sshkey_parse_private_fileblob(buf, "", "key", |
| &k1, NULL), 0); |
| sshbuf_free(buf); |
| sig_fuzz(k1); |
| sshkey_free(k1); |
| TEST_DONE(); |
| |
| TEST_START("fuzz Ed25519 sig"); |
| buf = load_file("ed25519_1"); |
| ASSERT_INT_EQ(sshkey_parse_private_fileblob(buf, "", "key", |
| &k1, NULL), 0); |
| sshbuf_free(buf); |
| sig_fuzz(k1); |
| sshkey_free(k1); |
| TEST_DONE(); |
| |
| /* XXX fuzz decoded new-format blobs too */ |
| |
| } |