#define MBEDTLS_ALLOW_PRIVATE_ACCESS #include #include #include "mbedtls/pk.h" #include "common.h" //4 Kb should be enough for every bug ;-) #define MAX_LEN 0x1000 int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) { #ifdef MBEDTLS_PK_PARSE_C int ret; mbedtls_pk_context pk; if (Size > MAX_LEN) { //only work on small inputs Size = MAX_LEN; } mbedtls_pk_init( &pk ); ret = mbedtls_pk_parse_key( &pk, Data, Size, NULL, 0, dummy_random, NULL ); if (ret == 0) { #if defined(MBEDTLS_RSA_C) if( mbedtls_pk_get_type( &pk ) == MBEDTLS_PK_RSA ) { mbedtls_mpi N, P, Q, D, E, DP, DQ, QP; mbedtls_rsa_context *rsa; mbedtls_mpi_init( &N ); mbedtls_mpi_init( &P ); mbedtls_mpi_init( &Q ); mbedtls_mpi_init( &D ); mbedtls_mpi_init( &E ); mbedtls_mpi_init( &DP ); mbedtls_mpi_init( &DQ ); mbedtls_mpi_init( &QP ); rsa = mbedtls_pk_rsa( pk ); if ( mbedtls_rsa_export( rsa, &N, &P, &Q, &D, &E ) != 0 ) { abort(); } if ( mbedtls_rsa_export_crt( rsa, &DP, &DQ, &QP ) != 0 ) { abort(); } mbedtls_mpi_free( &N ); mbedtls_mpi_free( &P ); mbedtls_mpi_free( &Q ); mbedtls_mpi_free( &D ); mbedtls_mpi_free( &E ); mbedtls_mpi_free( &DP ); mbedtls_mpi_free( &DQ ); mbedtls_mpi_free( &QP ); } else #endif #if defined(MBEDTLS_ECP_C) if( mbedtls_pk_get_type( &pk ) == MBEDTLS_PK_ECKEY || mbedtls_pk_get_type( &pk ) == MBEDTLS_PK_ECKEY_DH ) { mbedtls_ecp_keypair *ecp = mbedtls_pk_ec( pk ); mbedtls_ecp_group_id grp_id = ecp->grp.id; const mbedtls_ecp_curve_info *curve_info = mbedtls_ecp_curve_info_from_grp_id( grp_id ); /* If the curve is not supported, the key should not have been * accepted. */ if( curve_info == NULL ) abort( ); } else #endif { /* The key is valid but is not of a supported type. * This should not happen. */ abort( ); } } mbedtls_pk_free( &pk ); #else (void) Data; (void) Size; #endif //MBEDTLS_PK_PARSE_C return 0; }