aboutsummaryrefslogtreecommitdiff
path: root/fuzz
diff options
context:
space:
mode:
authorBob Beck <bbe@google.com>2023-09-08 11:56:02 -0600
committerBoringssl LUCI CQ <boringssl-scoped@luci-project-accounts.iam.gserviceaccount.com>2023-09-08 18:22:05 +0000
commit3aecf1d00bf62fa40bee0c93525df52204f48d4a (patch)
tree982d6815a24b9808701a60840f26ed84392d6412 /fuzz
parent15b1f9c6a4f9656e7c172e03064fe7f8e03c666d (diff)
downloadboringssl-3aecf1d00bf62fa40bee0c93525df52204f48d4a.zip
boringssl-3aecf1d00bf62fa40bee0c93525df52204f48d4a.tar.gz
boringssl-3aecf1d00bf62fa40bee0c93525df52204f48d4a.tar.bz2
Sync pki to chromium ce4bc9571462aa298d79b591df9d997323cf5157
Bug: chromium:1322914 Change-Id: Ic5a1349013bcfb279e5fee9f9838c63558d663b7 Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/63025 Auto-Submit: Bob Beck <bbe@google.com> Commit-Queue: Bob Beck <bbe@google.com> Reviewed-by: David Benjamin <davidben@google.com>
Diffstat (limited to 'fuzz')
-rw-r--r--fuzz/CMakeLists.txt1
-rw-r--r--fuzz/parse_crldp_fuzzer.cc24
-rw-r--r--fuzz/parse_crldp_fuzzer_corpus/crldp_issuer_as_dirname.der3
-rw-r--r--fuzz/parse_crldp_fuzzer_corpus/relative_name_and_reasons_and_multiple_dps.der1
4 files changed, 29 insertions, 0 deletions
diff --git a/fuzz/CMakeLists.txt b/fuzz/CMakeLists.txt
index 3905f55..adf7aa5 100644
--- a/fuzz/CMakeLists.txt
+++ b/fuzz/CMakeLists.txt
@@ -36,6 +36,7 @@ fuzzer(ocsp_parse_ocsp_response_fuzzer pki)
fuzzer(ocsp_parse_ocsp_single_response_fuzzer pki)
fuzzer(parse_authority_key_identifier_fuzzer pki)
fuzzer(parse_certificate_fuzzer pki)
+fuzzer(parse_crldp_fuzzer pki)
fuzzer(pkcs12)
fuzzer(pkcs8)
fuzzer(privkey)
diff --git a/fuzz/parse_crldp_fuzzer.cc b/fuzz/parse_crldp_fuzzer.cc
new file mode 100644
index 0000000..ebf3ba2
--- /dev/null
+++ b/fuzz/parse_crldp_fuzzer.cc
@@ -0,0 +1,24 @@
+// Copyright 2023 The Chromium Authors
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#include <stddef.h>
+#include <stdint.h>
+
+#include "../pki/parse_certificate.h"
+#include "../pki/input.h"
+#include <openssl/base.h>
+
+extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) {
+ std::vector<bssl::ParsedDistributionPoint> distribution_points;
+
+ bool success = ParseCrlDistributionPoints(bssl::der::Input(data, size),
+ &distribution_points);
+
+ if (success) {
+ // A valid CRLDistributionPoints must have at least 1 element.
+ BSSL_CHECK(!distribution_points.empty());
+ }
+
+ return 0;
+}
diff --git a/fuzz/parse_crldp_fuzzer_corpus/crldp_issuer_as_dirname.der b/fuzz/parse_crldp_fuzzer_corpus/crldp_issuer_as_dirname.der
new file mode 100644
index 0000000..26241d2
--- /dev/null
+++ b/fuzz/parse_crldp_fuzzer_corpus/crldp_issuer_as_dirname.der
@@ -0,0 +1,3 @@
+0â0ß „ Ī0}1 0 UUS10U
+Test Certificates 20111"0 U indirectCRL CA3 cRLIssuer1)0'U indirect CRL for indirectCRL CA3ĒVĪT0R1 0 UUS10U
+Test Certificates 20111"0 U indirectCRL CA3 cRLIssuer \ No newline at end of file
diff --git a/fuzz/parse_crldp_fuzzer_corpus/relative_name_and_reasons_and_multiple_dps.der b/fuzz/parse_crldp_fuzzer_corpus/relative_name_and_reasons_and_multiple_dps.der
new file mode 100644
index 0000000..c81bcf3
--- /dev/null
+++ b/fuzz/parse_crldp_fuzzer_corpus/relative_name_and_reasons_and_multiple_dps.der
@@ -0,0 +1 @@
+070 Ą1 0 UCRL1`0  Ī01 0 UCRL2Ÿ€ \ No newline at end of file