quickjs-tart

quickjs-based runtime for wallet-core logic
Log | Files | Refs | README | LICENSE

fuzz_pubkey.c (2945B)


      1 #include <stdint.h>
      2 #include <stdlib.h>
      3 #include "mbedtls/pk.h"
      4 #include "common.h"
      5 
      6 int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size)
      7 {
      8 #ifdef MBEDTLS_PK_PARSE_C
      9     int ret;
     10     mbedtls_pk_context pk;
     11 
     12     mbedtls_pk_init(&pk);
     13 #if defined(MBEDTLS_USE_PSA_CRYPTO)
     14     psa_status_t status = psa_crypto_init();
     15     if (status != PSA_SUCCESS) {
     16         goto exit;
     17     }
     18 #endif /* MBEDTLS_USE_PSA_CRYPTO */
     19     ret = mbedtls_pk_parse_public_key(&pk, Data, Size);
     20     if (ret == 0) {
     21 #if defined(MBEDTLS_RSA_C)
     22         if (mbedtls_pk_get_type(&pk) == MBEDTLS_PK_RSA) {
     23             mbedtls_mpi N, P, Q, D, E, DP, DQ, QP;
     24             mbedtls_rsa_context *rsa;
     25 
     26             mbedtls_mpi_init(&N); mbedtls_mpi_init(&P); mbedtls_mpi_init(&Q);
     27             mbedtls_mpi_init(&D); mbedtls_mpi_init(&E); mbedtls_mpi_init(&DP);
     28             mbedtls_mpi_init(&DQ); mbedtls_mpi_init(&QP);
     29 
     30             rsa = mbedtls_pk_rsa(pk);
     31             if (mbedtls_rsa_export(rsa, &N, NULL, NULL, NULL, &E) != 0) {
     32                 abort();
     33             }
     34             if (mbedtls_rsa_export(rsa, &N, &P, &Q, &D, &E) != MBEDTLS_ERR_RSA_BAD_INPUT_DATA) {
     35                 abort();
     36             }
     37             if (mbedtls_rsa_export_crt(rsa, &DP, &DQ, &QP) != MBEDTLS_ERR_RSA_BAD_INPUT_DATA) {
     38                 abort();
     39             }
     40 
     41             mbedtls_mpi_free(&N); mbedtls_mpi_free(&P); mbedtls_mpi_free(&Q);
     42             mbedtls_mpi_free(&D); mbedtls_mpi_free(&E); mbedtls_mpi_free(&DP);
     43             mbedtls_mpi_free(&DQ); mbedtls_mpi_free(&QP);
     44 
     45         } else
     46 #endif
     47 #if defined(MBEDTLS_ECP_C)
     48         if (mbedtls_pk_get_type(&pk) == MBEDTLS_PK_ECKEY ||
     49             mbedtls_pk_get_type(&pk) == MBEDTLS_PK_ECKEY_DH) {
     50             mbedtls_ecp_keypair *ecp = mbedtls_pk_ec(pk);
     51             mbedtls_ecp_group_id grp_id = mbedtls_ecp_keypair_get_group_id(ecp);
     52             const mbedtls_ecp_curve_info *curve_info =
     53                 mbedtls_ecp_curve_info_from_grp_id(grp_id);
     54 
     55             /* If the curve is not supported, the key should not have been
     56              * accepted. */
     57             if (curve_info == NULL) {
     58                 abort();
     59             }
     60 
     61             /* It's a public key, so the private value should not have
     62              * been changed from its initialization to 0. */
     63             mbedtls_mpi d;
     64             mbedtls_mpi_init(&d);
     65             if (mbedtls_ecp_export(ecp, NULL, &d, NULL) != 0) {
     66                 abort();
     67             }
     68             if (mbedtls_mpi_cmp_int(&d, 0) != 0) {
     69                 abort();
     70             }
     71             mbedtls_mpi_free(&d);
     72         } else
     73 #endif
     74         {
     75             /* The key is valid but is not of a supported type.
     76              * This should not happen. */
     77             abort();
     78         }
     79     }
     80 #if defined(MBEDTLS_USE_PSA_CRYPTO)
     81 exit:
     82     mbedtls_psa_crypto_free();
     83 #endif /* MBEDTLS_USE_PSA_CRYPTO */
     84     mbedtls_pk_free(&pk);
     85 #else
     86     (void) Data;
     87     (void) Size;
     88 #endif //MBEDTLS_PK_PARSE_C
     89 
     90     return 0;
     91 }