fuzz_pubkey.c (2945B)
1 #include <stdint.h> 2 #include <stdlib.h> 3 #include "mbedtls/pk.h" 4 #include "common.h" 5 6 int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) 7 { 8 #ifdef MBEDTLS_PK_PARSE_C 9 int ret; 10 mbedtls_pk_context pk; 11 12 mbedtls_pk_init(&pk); 13 #if defined(MBEDTLS_USE_PSA_CRYPTO) 14 psa_status_t status = psa_crypto_init(); 15 if (status != PSA_SUCCESS) { 16 goto exit; 17 } 18 #endif /* MBEDTLS_USE_PSA_CRYPTO */ 19 ret = mbedtls_pk_parse_public_key(&pk, Data, Size); 20 if (ret == 0) { 21 #if defined(MBEDTLS_RSA_C) 22 if (mbedtls_pk_get_type(&pk) == MBEDTLS_PK_RSA) { 23 mbedtls_mpi N, P, Q, D, E, DP, DQ, QP; 24 mbedtls_rsa_context *rsa; 25 26 mbedtls_mpi_init(&N); mbedtls_mpi_init(&P); mbedtls_mpi_init(&Q); 27 mbedtls_mpi_init(&D); mbedtls_mpi_init(&E); mbedtls_mpi_init(&DP); 28 mbedtls_mpi_init(&DQ); mbedtls_mpi_init(&QP); 29 30 rsa = mbedtls_pk_rsa(pk); 31 if (mbedtls_rsa_export(rsa, &N, NULL, NULL, NULL, &E) != 0) { 32 abort(); 33 } 34 if (mbedtls_rsa_export(rsa, &N, &P, &Q, &D, &E) != MBEDTLS_ERR_RSA_BAD_INPUT_DATA) { 35 abort(); 36 } 37 if (mbedtls_rsa_export_crt(rsa, &DP, &DQ, &QP) != MBEDTLS_ERR_RSA_BAD_INPUT_DATA) { 38 abort(); 39 } 40 41 mbedtls_mpi_free(&N); mbedtls_mpi_free(&P); mbedtls_mpi_free(&Q); 42 mbedtls_mpi_free(&D); mbedtls_mpi_free(&E); mbedtls_mpi_free(&DP); 43 mbedtls_mpi_free(&DQ); mbedtls_mpi_free(&QP); 44 45 } else 46 #endif 47 #if defined(MBEDTLS_ECP_C) 48 if (mbedtls_pk_get_type(&pk) == MBEDTLS_PK_ECKEY || 49 mbedtls_pk_get_type(&pk) == MBEDTLS_PK_ECKEY_DH) { 50 mbedtls_ecp_keypair *ecp = mbedtls_pk_ec(pk); 51 mbedtls_ecp_group_id grp_id = mbedtls_ecp_keypair_get_group_id(ecp); 52 const mbedtls_ecp_curve_info *curve_info = 53 mbedtls_ecp_curve_info_from_grp_id(grp_id); 54 55 /* If the curve is not supported, the key should not have been 56 * accepted. */ 57 if (curve_info == NULL) { 58 abort(); 59 } 60 61 /* It's a public key, so the private value should not have 62 * been changed from its initialization to 0. */ 63 mbedtls_mpi d; 64 mbedtls_mpi_init(&d); 65 if (mbedtls_ecp_export(ecp, NULL, &d, NULL) != 0) { 66 abort(); 67 } 68 if (mbedtls_mpi_cmp_int(&d, 0) != 0) { 69 abort(); 70 } 71 mbedtls_mpi_free(&d); 72 } else 73 #endif 74 { 75 /* The key is valid but is not of a supported type. 76 * This should not happen. */ 77 abort(); 78 } 79 } 80 #if defined(MBEDTLS_USE_PSA_CRYPTO) 81 exit: 82 mbedtls_psa_crypto_free(); 83 #endif /* MBEDTLS_USE_PSA_CRYPTO */ 84 mbedtls_pk_free(&pk); 85 #else 86 (void) Data; 87 (void) Size; 88 #endif //MBEDTLS_PK_PARSE_C 89 90 return 0; 91 }