mirror of https://github.com/google/oss-fuzz.git
pyca-cryptography: Add more fuzzer (#7890)
* Add more fuzzer Fix build script * Fix formatting for fuzzers Fix length checking for nonce in fuzz_aead * Fix fuzzer - Add more randomization to data input
This commit is contained in:
parent
713eb55c66
commit
0a577f2624
|
@ -17,6 +17,7 @@
|
|||
FROM gcr.io/oss-fuzz-base/base-builder-python
|
||||
|
||||
RUN git clone https://github.com/pyca/cryptography
|
||||
RUN apt-get update
|
||||
RUN apt-get install build-essential libssl-dev libffi-dev python3-dev cargo -y
|
||||
RUN pip3 install --upgrade pip
|
||||
RUN curl https://sh.rustup.rs -sSf | sh -s -- -y
|
||||
|
@ -26,4 +27,4 @@ RUN rustup install nightly
|
|||
RUN rustup default nightly
|
||||
WORKDIR cryptography
|
||||
|
||||
COPY build.sh symenc_fuzz.py $SRC/
|
||||
COPY build.sh fuzz_*.py $SRC/
|
||||
|
|
|
@ -21,4 +21,6 @@ unset RUSTFLAGS
|
|||
pip3 install .
|
||||
|
||||
cd $SRC
|
||||
compile_python_fuzzer symenc_fuzz.py
|
||||
for fuzzer in $(find $SRC -name 'fuzz_*.py'); do
|
||||
compile_python_fuzzer $fuzzer
|
||||
done
|
||||
|
|
|
@ -0,0 +1,56 @@
|
|||
#!/usr/bin/python3
|
||||
|
||||
# Copyright 2022 Google LLC
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||
# you may not use this file except in compliance with the License.
|
||||
# You may obtain a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
import sys
|
||||
import atheris
|
||||
with atheris.instrument_imports():
|
||||
import cryptography.hazmat.primitives.ciphers.aead as aead
|
||||
|
||||
def TestInput(input_bytes):
|
||||
if len(input_bytes) < 12:
|
||||
return
|
||||
|
||||
fdp = atheris.FuzzedDataProvider(input_bytes)
|
||||
|
||||
choice = fdp.ConsumeIntInRange(1,4)
|
||||
|
||||
if choice == 1:
|
||||
cipher = aead.ChaCha20Poly1305(aead.ChaCha20Poly1305.generate_key())
|
||||
if choice == 2:
|
||||
cipher = aead.AESGCM(aead.AESGCM.generate_key(bit_length=128))
|
||||
if choice == 3:
|
||||
cipher = aead.AESOCB3(aead.AESOCB3.generate_key(bit_length=128))
|
||||
if choice == 4:
|
||||
cipher = aead.AESCCM(aead.AESCCM.generate_key(bit_length=128))
|
||||
|
||||
msg = fdp.ConsumeBytes(32)
|
||||
authentext = fdp.ConsumeBytes(32)
|
||||
nonce = fdp.ConsumeBytes(12)
|
||||
|
||||
if len(nonce) < 12:
|
||||
return
|
||||
|
||||
ciphertext = cipher.encrypt(nonce, msg, authentext)
|
||||
plaintext = cipher.decrypt(nonce, ciphertext, authentext)
|
||||
|
||||
assert (plaintext == msg), "Encryption/Decrption error!"
|
||||
|
||||
def main():
|
||||
atheris.Setup(sys.argv, TestInput, enable_python_coverage=False)
|
||||
atheris.instrument_all()
|
||||
atheris.Fuzz()
|
||||
|
||||
if __name__ == "__main__":
|
||||
main()
|
|
@ -0,0 +1,66 @@
|
|||
#!/usr/bin/python3
|
||||
|
||||
# Copyright 2022 Google LLC
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||
# you may not use this file except in compliance with the License.
|
||||
# You may obtain a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
import sys
|
||||
import atheris
|
||||
with atheris.instrument_imports():
|
||||
from cryptography.hazmat.primitives import hashes
|
||||
from cryptography.hazmat.primitives.asymmetric import dh
|
||||
from cryptography.hazmat.primitives.kdf.hkdf import HKDF
|
||||
|
||||
def TestInput(input_bytes):
|
||||
fdp = atheris.FuzzedDataProvider(input_bytes)
|
||||
|
||||
try:
|
||||
parameters = dh.generate_parameters(
|
||||
generator=(2 if fdp.ConsumeBool() else 5),
|
||||
key_size=fdp.ConsumeInt(15)
|
||||
)
|
||||
except ValueError as e:
|
||||
if "DH key_size must be at least 512 bits" not in str(e):
|
||||
raise e
|
||||
else:
|
||||
return
|
||||
|
||||
server_private_key = parameters.generate_private_key()
|
||||
peer_private_key = parameters.generate_private_key()
|
||||
server_derived_shared_key = server_private_key.exchange(peer_private_key.public_key())
|
||||
peer_derived_shared_key = peer_private_key.exchange(server_private_key.public_key())
|
||||
|
||||
infobytes = fdp.ConsumeBytes(10)
|
||||
|
||||
server_derived_key = HKDF(
|
||||
algorithm=hashes.SHA256(),
|
||||
length=32,
|
||||
salt=None,
|
||||
info=infobytes,
|
||||
).derive(server_derived_shared_key)
|
||||
|
||||
peer_derived_key = HKDF(
|
||||
algorithm=hashes.SHA256(),
|
||||
length=32,
|
||||
salt=None,
|
||||
info=infobytes,
|
||||
).derive(peer_derived_shared_key)
|
||||
|
||||
assert (server_derived_key == peer_derived_key), "Key Derivation Error!!"
|
||||
|
||||
def main():
|
||||
atheris.Setup(sys.argv, TestInput, enable_python_coverage=False)
|
||||
atheris.instrument_all()
|
||||
atheris.Fuzz()
|
||||
|
||||
if __name__ == "__main__":
|
||||
main()
|
|
@ -0,0 +1,48 @@
|
|||
#!/usr/bin/python3
|
||||
|
||||
# Copyright 2022 Google LLC
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||
# you may not use this file except in compliance with the License.
|
||||
# You may obtain a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
import sys
|
||||
import atheris
|
||||
with atheris.instrument_imports():
|
||||
from cryptography.hazmat.primitives import hashes
|
||||
from cryptography.hazmat.primitives.asymmetric import dsa, utils
|
||||
|
||||
def TestInput(input_bytes):
|
||||
fdp = atheris.FuzzedDataProvider(input_bytes)
|
||||
|
||||
private_key = dsa.generate_private_key(key_size=1024)
|
||||
public_key = private_key.public_key()
|
||||
|
||||
data = fdp.ConsumeBytes(20)
|
||||
more_data = fdp.ConsumeBytes(20)
|
||||
|
||||
hasher = hashes.Hash(hashes.SHA256())
|
||||
hasher.update(data)
|
||||
hasher.update(more_data)
|
||||
digest = hasher.finalize()
|
||||
|
||||
sig1 = private_key.sign(data,hashes.SHA256())
|
||||
sig2 = private_key.sign(digest,utils.Prehashed(hashes.SHA256()))
|
||||
|
||||
public_key.verify(sig1,data,hashes.SHA256())
|
||||
public_key.verify(sig2,digest,utils.Prehashed(hashes.SHA256()))
|
||||
|
||||
def main():
|
||||
atheris.Setup(sys.argv, TestInput, enable_python_coverage=False)
|
||||
atheris.instrument_all()
|
||||
atheris.Fuzz()
|
||||
|
||||
if __name__ == "__main__":
|
||||
main()
|
|
@ -0,0 +1,51 @@
|
|||
#!/usr/bin/python3
|
||||
|
||||
# Copyright 2022 Google LLC
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||
# you may not use this file except in compliance with the License.
|
||||
# You may obtain a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
import sys
|
||||
import base64
|
||||
import atheris
|
||||
with atheris.instrument_imports():
|
||||
from cryptography.fernet import Fernet
|
||||
from cryptography.hazmat.primitives import hashes
|
||||
from cryptography.hazmat.primitives.kdf.pbkdf2 import PBKDF2HMAC
|
||||
|
||||
def TestInput(input_bytes):
|
||||
fdp = atheris.FuzzedDataProvider(input_bytes)
|
||||
plaintext = fdp.ConsumeBytes(32)
|
||||
|
||||
key = Fernet(Fernet.generate_key())
|
||||
token = key.encrypt(plaintext)
|
||||
text = key.decrypt(token)
|
||||
assert (plaintext == text), "Encryption/Decrption error!"
|
||||
|
||||
password = fdp.ConsumeBytes(8)
|
||||
salt = fdp.ConsumeBytes(16)
|
||||
kdf = PBKDF2HMAC(
|
||||
algorithm=hashes.SHA256(),
|
||||
length=32,
|
||||
salt=salt,
|
||||
iterations=1,
|
||||
)
|
||||
key = Fernet(base64.urlsafe_b64encode(kdf.derive(password)))
|
||||
token = key.encrypt(plaintext)
|
||||
text = key.decrypt(token)
|
||||
assert (plaintext == text), "Encryption/Decrption error!"
|
||||
|
||||
def main():
|
||||
atheris.Setup(sys.argv, TestInput, enable_python_coverage=False)
|
||||
atheris.Fuzz()
|
||||
|
||||
if __name__ == "__main__":
|
||||
main()
|
|
@ -1,51 +0,0 @@
|
|||
#!/usr/bin/python3
|
||||
|
||||
# Copyright 2022 Google LLC
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||
# you may not use this file except in compliance with the License.
|
||||
# You may obtain a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
import sys
|
||||
import base64
|
||||
import atheris
|
||||
with atheris.instrument_imports():
|
||||
from cryptography.fernet import Fernet
|
||||
from cryptography.hazmat.primitives import hashes
|
||||
from cryptography.hazmat.primitives.kdf.pbkdf2 import PBKDF2HMAC
|
||||
|
||||
def TestInput(input_bytes):
|
||||
fdp = atheris.FuzzedDataProvider(input_bytes)
|
||||
plaintext = fdp.ConsumeBytes(32)
|
||||
|
||||
key = Fernet(Fernet.generate_key())
|
||||
token = key.encrypt(plaintext)
|
||||
text = key.decrypt(token)
|
||||
assert (plaintext == text), "Encryption/Decrption error!"
|
||||
|
||||
password = fdp.ConsumeBytes(8)
|
||||
salt = fdp.ConsumeBytes(16)
|
||||
kdf = PBKDF2HMAC(
|
||||
algorithm=hashes.SHA256(),
|
||||
length=32,
|
||||
salt=salt,
|
||||
iterations=1,
|
||||
)
|
||||
key = Fernet(base64.urlsafe_b64encode(kdf.derive(password)))
|
||||
token = key.encrypt(plaintext)
|
||||
text = key.decrypt(token)
|
||||
assert (plaintext == text), "Encryption/Decrption error!"
|
||||
|
||||
def main():
|
||||
atheris.Setup(sys.argv, TestInput, enable_python_coverage=False)
|
||||
atheris.Fuzz()
|
||||
|
||||
if __name__ == "__main__":
|
||||
main()
|
Loading…
Reference in New Issue