diff options
author | Bob Beck <bbe@google.com> | 2023-09-08 11:56:02 -0600 |
---|---|---|
committer | Boringssl LUCI CQ <boringssl-scoped@luci-project-accounts.iam.gserviceaccount.com> | 2023-09-08 18:22:05 +0000 |
commit | 3aecf1d00bf62fa40bee0c93525df52204f48d4a (patch) | |
tree | 982d6815a24b9808701a60840f26ed84392d6412 /fuzz | |
parent | 15b1f9c6a4f9656e7c172e03064fe7f8e03c666d (diff) | |
download | boringssl-3aecf1d00bf62fa40bee0c93525df52204f48d4a.zip boringssl-3aecf1d00bf62fa40bee0c93525df52204f48d4a.tar.gz boringssl-3aecf1d00bf62fa40bee0c93525df52204f48d4a.tar.bz2 |
Sync pki to chromium ce4bc9571462aa298d79b591df9d997323cf5157
Bug: chromium:1322914
Change-Id: Ic5a1349013bcfb279e5fee9f9838c63558d663b7
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/63025
Auto-Submit: Bob Beck <bbe@google.com>
Commit-Queue: Bob Beck <bbe@google.com>
Reviewed-by: David Benjamin <davidben@google.com>
Diffstat (limited to 'fuzz')
-rw-r--r-- | fuzz/CMakeLists.txt | 1 | ||||
-rw-r--r-- | fuzz/parse_crldp_fuzzer.cc | 24 | ||||
-rw-r--r-- | fuzz/parse_crldp_fuzzer_corpus/crldp_issuer_as_dirname.der | 3 | ||||
-rw-r--r-- | fuzz/parse_crldp_fuzzer_corpus/relative_name_and_reasons_and_multiple_dps.der | 1 |
4 files changed, 29 insertions, 0 deletions
diff --git a/fuzz/CMakeLists.txt b/fuzz/CMakeLists.txt index 3905f55..adf7aa5 100644 --- a/fuzz/CMakeLists.txt +++ b/fuzz/CMakeLists.txt @@ -36,6 +36,7 @@ fuzzer(ocsp_parse_ocsp_response_fuzzer pki) fuzzer(ocsp_parse_ocsp_single_response_fuzzer pki) fuzzer(parse_authority_key_identifier_fuzzer pki) fuzzer(parse_certificate_fuzzer pki) +fuzzer(parse_crldp_fuzzer pki) fuzzer(pkcs12) fuzzer(pkcs8) fuzzer(privkey) diff --git a/fuzz/parse_crldp_fuzzer.cc b/fuzz/parse_crldp_fuzzer.cc new file mode 100644 index 0000000..ebf3ba2 --- /dev/null +++ b/fuzz/parse_crldp_fuzzer.cc @@ -0,0 +1,24 @@ +// Copyright 2023 The Chromium Authors +// Use of this source code is governed by a BSD-style license that can be +// found in the LICENSE file. + +#include <stddef.h> +#include <stdint.h> + +#include "../pki/parse_certificate.h" +#include "../pki/input.h" +#include <openssl/base.h> + +extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { + std::vector<bssl::ParsedDistributionPoint> distribution_points; + + bool success = ParseCrlDistributionPoints(bssl::der::Input(data, size), + &distribution_points); + + if (success) { + // A valid CRLDistributionPoints must have at least 1 element. + BSSL_CHECK(!distribution_points.empty()); + } + + return 0; +} diff --git a/fuzz/parse_crldp_fuzzer_corpus/crldp_issuer_as_dirname.der b/fuzz/parse_crldp_fuzzer_corpus/crldp_issuer_as_dirname.der new file mode 100644 index 0000000..26241d2 --- /dev/null +++ b/fuzz/parse_crldp_fuzzer_corpus/crldp_issuer_as_dirname.der @@ -0,0 +1,3 @@ +0â0ß Ī0}10 UUS10U +Test Certificates 20111"0 UindirectCRL CA3 cRLIssuer1)0'U indirect CRL for indirectCRL CA3ĒVĪT0R10 UUS10U +Test Certificates 20111"0 UindirectCRL CA3 cRLIssuer
\ No newline at end of file diff --git a/fuzz/parse_crldp_fuzzer_corpus/relative_name_and_reasons_and_multiple_dps.der b/fuzz/parse_crldp_fuzzer_corpus/relative_name_and_reasons_and_multiple_dps.der new file mode 100644 index 0000000..c81bcf3 --- /dev/null +++ b/fuzz/parse_crldp_fuzzer_corpus/relative_name_and_reasons_and_multiple_dps.der @@ -0,0 +1 @@ +070 Ą1
0UCRL1`0 Ī01
0UCRL2
\ No newline at end of file |