1 /* $OpenBSD: test_fuzz.c,v 1.7 2017/04/30 23:33:48 djm Exp $ */
3 * Fuzz tests for key parsing
5 * Placed in the public domain
10 #include <sys/types.h>
11 #include <sys/param.h>
22 #include <openssl/bn.h>
23 #include <openssl/rsa.h>
24 #include <openssl/dsa.h>
25 #include <openssl/objects.h>
26 #ifdef OPENSSL_HAS_NISTP256
27 # include <openssl/ec.h>
30 #include "../test_helper/test_helper.h"
39 void sshkey_fuzz_tests(void);
44 fprintf(stderr, "Failed during fuzz:\n");
45 fuzz_dump((struct fuzz *)fuzz);
49 public_fuzz(struct sshkey *k)
55 ASSERT_PTR_NE(buf = sshbuf_new(), NULL);
56 ASSERT_INT_EQ(sshkey_putb(k, buf), 0);
57 /* XXX need a way to run the tests in "slow, but complete" mode */
58 fuzz = fuzz_begin(FUZZ_1_BIT_FLIP | /* XXX too slow FUZZ_2_BIT_FLIP | */
59 FUZZ_1_BYTE_FLIP | /* XXX too slow FUZZ_2_BYTE_FLIP | */
60 FUZZ_TRUNCATE_START | FUZZ_TRUNCATE_END,
61 sshbuf_mutable_ptr(buf), sshbuf_len(buf));
62 ASSERT_INT_EQ(sshkey_from_blob(sshbuf_ptr(buf), sshbuf_len(buf),
66 TEST_ONERROR(onerror, fuzz);
67 for(; !fuzz_done(fuzz); fuzz_next(fuzz)) {
68 if (sshkey_from_blob(fuzz_ptr(fuzz), fuzz_len(fuzz), &k1) == 0)
75 sig_fuzz(struct sshkey *k, const char *sig_alg)
78 u_char *sig, c[] = "some junk to be signed";
81 ASSERT_INT_EQ(sshkey_sign(k, &sig, &l, c, sizeof(c), sig_alg, 0), 0);
82 ASSERT_SIZE_T_GT(l, 0);
83 fuzz = fuzz_begin(FUZZ_1_BIT_FLIP | /* too slow FUZZ_2_BIT_FLIP | */
84 FUZZ_1_BYTE_FLIP | FUZZ_2_BYTE_FLIP |
85 FUZZ_TRUNCATE_START | FUZZ_TRUNCATE_END, sig, l);
86 ASSERT_INT_EQ(sshkey_verify(k, sig, l, c, sizeof(c), 0), 0);
88 TEST_ONERROR(onerror, fuzz);
89 for(; !fuzz_done(fuzz); fuzz_next(fuzz)) {
90 /* Ensure 1-bit difference at least */
91 if (fuzz_matches_original(fuzz))
93 ASSERT_INT_NE(sshkey_verify(k, fuzz_ptr(fuzz), fuzz_len(fuzz),
100 sshkey_fuzz_tests(void)
103 struct sshbuf *buf, *fuzzed;
108 TEST_START("fuzz RSA private");
109 buf = load_file("rsa_1");
110 fuzz = fuzz_begin(FUZZ_BASE64, sshbuf_mutable_ptr(buf),
112 ASSERT_INT_EQ(sshkey_parse_private_fileblob(buf, "", &k1, NULL), 0);
115 ASSERT_PTR_NE(fuzzed = sshbuf_new(), NULL);
116 TEST_ONERROR(onerror, fuzz);
117 for(; !fuzz_done(fuzz); fuzz_next(fuzz)) {
118 r = sshbuf_put(fuzzed, fuzz_ptr(fuzz), fuzz_len(fuzz));
120 if (sshkey_parse_private_fileblob(fuzzed, "", &k1, NULL) == 0)
122 sshbuf_reset(fuzzed);
128 TEST_START("fuzz RSA new-format private");
129 buf = load_file("rsa_n");
130 fuzz = fuzz_begin(FUZZ_BASE64, sshbuf_mutable_ptr(buf),
132 ASSERT_INT_EQ(sshkey_parse_private_fileblob(buf, "", &k1, NULL), 0);
135 ASSERT_PTR_NE(fuzzed = sshbuf_new(), NULL);
136 TEST_ONERROR(onerror, fuzz);
137 for(; !fuzz_done(fuzz); fuzz_next(fuzz)) {
138 r = sshbuf_put(fuzzed, fuzz_ptr(fuzz), fuzz_len(fuzz));
140 if (sshkey_parse_private_fileblob(fuzzed, "", &k1, NULL) == 0)
142 sshbuf_reset(fuzzed);
148 TEST_START("fuzz DSA private");
149 buf = load_file("dsa_1");
150 fuzz = fuzz_begin(FUZZ_BASE64, sshbuf_mutable_ptr(buf),
152 ASSERT_INT_EQ(sshkey_parse_private_fileblob(buf, "", &k1, NULL), 0);
155 ASSERT_PTR_NE(fuzzed = sshbuf_new(), NULL);
156 TEST_ONERROR(onerror, fuzz);
157 for(; !fuzz_done(fuzz); fuzz_next(fuzz)) {
158 r = sshbuf_put(fuzzed, fuzz_ptr(fuzz), fuzz_len(fuzz));
160 if (sshkey_parse_private_fileblob(fuzzed, "", &k1, NULL) == 0)
162 sshbuf_reset(fuzzed);
168 TEST_START("fuzz DSA new-format private");
169 buf = load_file("dsa_n");
170 fuzz = fuzz_begin(FUZZ_BASE64, sshbuf_mutable_ptr(buf),
172 ASSERT_INT_EQ(sshkey_parse_private_fileblob(buf, "", &k1, NULL), 0);
175 ASSERT_PTR_NE(fuzzed = sshbuf_new(), NULL);
176 TEST_ONERROR(onerror, fuzz);
177 for(; !fuzz_done(fuzz); fuzz_next(fuzz)) {
178 r = sshbuf_put(fuzzed, fuzz_ptr(fuzz), fuzz_len(fuzz));
180 if (sshkey_parse_private_fileblob(fuzzed, "", &k1, NULL) == 0)
182 sshbuf_reset(fuzzed);
188 #ifdef OPENSSL_HAS_ECC
189 TEST_START("fuzz ECDSA private");
190 buf = load_file("ecdsa_1");
191 fuzz = fuzz_begin(FUZZ_BASE64, sshbuf_mutable_ptr(buf),
193 ASSERT_INT_EQ(sshkey_parse_private_fileblob(buf, "", &k1, NULL), 0);
196 ASSERT_PTR_NE(fuzzed = sshbuf_new(), NULL);
197 TEST_ONERROR(onerror, fuzz);
198 for(; !fuzz_done(fuzz); fuzz_next(fuzz)) {
199 r = sshbuf_put(fuzzed, fuzz_ptr(fuzz), fuzz_len(fuzz));
201 if (sshkey_parse_private_fileblob(fuzzed, "", &k1, NULL) == 0)
203 sshbuf_reset(fuzzed);
209 TEST_START("fuzz ECDSA new-format private");
210 buf = load_file("ecdsa_n");
211 fuzz = fuzz_begin(FUZZ_BASE64, sshbuf_mutable_ptr(buf),
213 ASSERT_INT_EQ(sshkey_parse_private_fileblob(buf, "", &k1, NULL), 0);
216 ASSERT_PTR_NE(fuzzed = sshbuf_new(), NULL);
217 TEST_ONERROR(onerror, fuzz);
218 for(; !fuzz_done(fuzz); fuzz_next(fuzz)) {
219 r = sshbuf_put(fuzzed, fuzz_ptr(fuzz), fuzz_len(fuzz));
221 if (sshkey_parse_private_fileblob(fuzzed, "", &k1, NULL) == 0)
223 sshbuf_reset(fuzzed);
230 TEST_START("fuzz Ed25519 private");
231 buf = load_file("ed25519_1");
232 fuzz = fuzz_begin(FUZZ_BASE64, sshbuf_mutable_ptr(buf),
234 ASSERT_INT_EQ(sshkey_parse_private_fileblob(buf, "", &k1, NULL), 0);
237 ASSERT_PTR_NE(fuzzed = sshbuf_new(), NULL);
238 TEST_ONERROR(onerror, fuzz);
239 for(; !fuzz_done(fuzz); fuzz_next(fuzz)) {
240 r = sshbuf_put(fuzzed, fuzz_ptr(fuzz), fuzz_len(fuzz));
242 if (sshkey_parse_private_fileblob(fuzzed, "", &k1, NULL) == 0)
244 sshbuf_reset(fuzzed);
250 TEST_START("fuzz RSA public");
251 buf = load_file("rsa_1");
252 ASSERT_INT_EQ(sshkey_parse_private_fileblob(buf, "", &k1, NULL), 0);
258 TEST_START("fuzz RSA cert");
259 ASSERT_INT_EQ(sshkey_load_cert(test_data_file("rsa_1"), &k1), 0);
264 TEST_START("fuzz DSA public");
265 buf = load_file("dsa_1");
266 ASSERT_INT_EQ(sshkey_parse_private_fileblob(buf, "", &k1, NULL), 0);
272 TEST_START("fuzz DSA cert");
273 ASSERT_INT_EQ(sshkey_load_cert(test_data_file("dsa_1"), &k1), 0);
278 #ifdef OPENSSL_HAS_ECC
279 TEST_START("fuzz ECDSA public");
280 buf = load_file("ecdsa_1");
281 ASSERT_INT_EQ(sshkey_parse_private_fileblob(buf, "", &k1, NULL), 0);
287 TEST_START("fuzz ECDSA cert");
288 ASSERT_INT_EQ(sshkey_load_cert(test_data_file("ecdsa_1"), &k1), 0);
294 TEST_START("fuzz Ed25519 public");
295 buf = load_file("ed25519_1");
296 ASSERT_INT_EQ(sshkey_parse_private_fileblob(buf, "", &k1, NULL), 0);
302 TEST_START("fuzz Ed25519 cert");
303 ASSERT_INT_EQ(sshkey_load_cert(test_data_file("ed25519_1"), &k1), 0);
308 TEST_START("fuzz RSA sig");
309 buf = load_file("rsa_1");
310 ASSERT_INT_EQ(sshkey_parse_private_fileblob(buf, "", &k1, NULL), 0);
312 sig_fuzz(k1, "ssh-rsa");
316 TEST_START("fuzz RSA SHA256 sig");
317 buf = load_file("rsa_1");
318 ASSERT_INT_EQ(sshkey_parse_private_fileblob(buf, "", &k1, NULL), 0);
320 sig_fuzz(k1, "rsa-sha2-256");
324 TEST_START("fuzz RSA SHA512 sig");
325 buf = load_file("rsa_1");
326 ASSERT_INT_EQ(sshkey_parse_private_fileblob(buf, "", &k1, NULL), 0);
328 sig_fuzz(k1, "rsa-sha2-512");
332 TEST_START("fuzz DSA sig");
333 buf = load_file("dsa_1");
334 ASSERT_INT_EQ(sshkey_parse_private_fileblob(buf, "", &k1, NULL), 0);
340 #ifdef OPENSSL_HAS_ECC
341 TEST_START("fuzz ECDSA sig");
342 buf = load_file("ecdsa_1");
343 ASSERT_INT_EQ(sshkey_parse_private_fileblob(buf, "", &k1, NULL), 0);
350 TEST_START("fuzz Ed25519 sig");
351 buf = load_file("ed25519_1");
352 ASSERT_INT_EQ(sshkey_parse_private_fileblob(buf, "", &k1, NULL), 0);
358 /* XXX fuzz decoded new-format blobs too */