#!/bin/bash -eu # Copyright 2019 Google Inc. # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # ################################################################################ # TODO(metzman): Switch this to LIB_FUZZING_ENGINE when it works. # https://github.com/google/oss-fuzz/issues/2336 # Compile xxd $CC $SRC/xxd.c -o /usr/bin/xxd export LINK_FLAGS="" export INCLUDE_PATH_FLAGS="" # Generate lookup tables. This only needs to be done once. cd $SRC/cryptofuzz python gen_repository.py if [[ $CFLAGS = *-m32* ]] then export GOARCH=386 export CGO_ENABLED=1 fi export GO111MODULE=off cd $SRC/go/src ./make.bash export GOROOT=$(realpath $SRC/go) export GOPATH=$GOROOT/packages mkdir $GOPATH export PATH=$GOROOT/bin:$PATH export PATH=$GOROOT/packages/bin:$PATH apt-get remove golang-1.9-go -y rm /usr/bin/go go get golang.org/x/crypto/blake2b go get golang.org/x/crypto/blake2s go get golang.org/x/crypto/md4 go get golang.org/x/crypto/ripemd160 # This enables runtime checks for C++-specific undefined behaviour. export CXXFLAGS="$CXXFLAGS -D_GLIBCXX_DEBUG" # Prevent Boost compilation error with -std=c++17 export CXXFLAGS="$CXXFLAGS -D_LIBCPP_ENABLE_CXX17_REMOVED_AUTO_PTR" export CXXFLAGS="$CXXFLAGS -I $SRC/cryptofuzz/fuzzing-headers/include" if [[ $CFLAGS = *sanitize=memory* ]] then export CXXFLAGS="$CXXFLAGS -DMSAN" fi if [[ $CFLAGS != *sanitize=memory* && $CFLAGS != *-m32* ]] then # Compile libfuzzer-js (required for all JavaScript libraries) export LIBFUZZER_A_PATH="$LIB_FUZZING_ENGINE" cd $SRC/libfuzzer-js/ make export LIBFUZZER_JS_PATH=$(realpath .) export LINK_FLAGS="$LINK_FLAGS $LIBFUZZER_JS_PATH/js.o $LIBFUZZER_JS_PATH/quickjs/libquickjs.a" # Compile bn.js module export BN_JS_PATH="$SRC/bn.js/lib/bn.js" export CXXFLAGS="$CXXFLAGS -DCRYPTOFUZZ_BN_JS" cd $SRC/cryptofuzz/modules/bn.js/ make # Compile bignumber.js module export BIGNUMBER_JS_PATH="$SRC/bignumber.js/bignumber.js" export CXXFLAGS="$CXXFLAGS -DCRYPTOFUZZ_BIGNUMBER_JS" cd $SRC/cryptofuzz/modules/bignumber.js/ make fi # Compile NSS if [[ $CFLAGS != *-m32* ]] then mkdir $SRC/nss-nspr mv $SRC/nss $SRC/nss-nspr/ mv $SRC/nspr $SRC/nss-nspr/ cd $SRC/nss-nspr/ CXX="$CXX -stdlib=libc++" LDFLAGS="$CFLAGS" nss/build.sh --enable-fips --static --disable-tests --fuzz=oss export NSS_NSPR_PATH=$(realpath $SRC/nss-nspr/) export CXXFLAGS="$CXXFLAGS -DCRYPTOFUZZ_NSS" export LINK_FLAGS="$LINK_FLAGS -lsqlite3" # Compile Cryptofuzz NSS module cd $SRC/cryptofuzz/modules/nss make -B fi # Compile libtomcrypt cd $SRC/libtomcrypt if [[ $CFLAGS != *sanitize=memory* ]] then make -j$(nproc) export CXXFLAGS="$CXXFLAGS -DCRYPTOFUZZ_LIBTOMCRYPT" export LIBTOMCRYPT_INCLUDE_PATH=$(realpath src/headers/) export LIBTOMCRYPT_A_PATH=$(realpath libtomcrypt.a) # Compile Cryptofuzz libtomcrypt module cd $SRC/cryptofuzz/modules/libtomcrypt make -B fi # Compile SymCrypt cd $SRC/SymCrypt/ if [[ $CFLAGS != *sanitize=undefined* ]] then # Unittests don't build with clang and are not needed anyway sed -i "s/^add_subdirectory(unittest)$//g" CMakeLists.txt mkdir b/ cd b/ cmake ../ make -j$(nproc) export CXXFLAGS="$CXXFLAGS -DCRYPTOFUZZ_SYMCRYPT" export SYMCRYPT_INCLUDE_PATH=$(realpath ../inc/) export LIBSYMCRYPT_COMMON_A_PATH=$(realpath lib/x86_64/Generic/libsymcrypt_common.a) export SYMCRYPT_GENERIC_A_PATH=$(realpath lib/x86_64/Generic/symcrypt_generic.a) # Compile Cryptofuzz SymCrypt module cd $SRC/cryptofuzz/modules/symcrypt make -B fi # Compile Nettle mkdir $SRC/nettle-install/ cd $SRC/nettle/ bash .bootstrap if [[ $CFLAGS != *sanitize=memory* ]] then ./configure --disable-documentation --disable-openssl --prefix=`realpath ../nettle-install` else ./configure --disable-documentation --disable-openssl --disable-assembler --prefix=`realpath ../nettle-install` fi make -j$(nproc) make install if [[ $CFLAGS != *-m32* ]] then export LIBNETTLE_A_PATH=`realpath ../nettle-install/lib/libnettle.a` else export LIBNETTLE_A_PATH=`realpath ../nettle-install/lib32/libnettle.a` fi export NETTLE_INCLUDE_PATH=`realpath ../nettle-install/include` export CXXFLAGS="$CXXFLAGS -DCRYPTOFUZZ_NETTLE" # Compile Cryptofuzz Nettle module cd $SRC/cryptofuzz/modules/nettle make -B # Compile libgmp if [[ $CFLAGS != *sanitize=memory* ]] then cd $SRC/libgmp/ autoreconf -ivf if [[ $CFLAGS != *-m32* ]] then ./configure --enable-maintainer-mode else setarch i386 ./configure --enable-maintainer-mode fi make -j$(nproc) export CXXFLAGS="$CXXFLAGS -DCRYPTOFUZZ_LIBGMP" export LIBGMP_INCLUDE_PATH=$(realpath .) export LIBGMP_A_PATH=$(realpath .libs/libgmp.a) # Compile Cryptofuzz libgmp module cd $SRC/cryptofuzz/modules/libgmp make -B fi # Compile mpdecimal cd $SRC/ tar zxf mpdecimal-2.5.0.tar.gz cd mpdecimal-2.5.0/ ./configure cd libmpdec/ make libmpdec.a -j$(nproc) cd ../ export CXXFLAGS="$CXXFLAGS -DCRYPTOFUZZ_MPDECIMAL" export LIBMPDEC_A_PATH=$(realpath libmpdec/libmpdec.a) export LIBMPDEC_INCLUDE_PATH=$(realpath libmpdec/) # Compile Cryptofuzz mpdecimal module cd $SRC/cryptofuzz/modules/mpdecimal make -B # Compile Cityhash cd $SRC/cityhash if [[ $CFLAGS != *-m32* ]] then CXXFLAGS="$CXXFLAGS -msse4.2" ./configure --disable-shared >/dev/null 2>&1 else ./configure --disable-shared >/dev/null 2>&1 fi make -j$(nproc) >/dev/null 2>&1 export CXXFLAGS="$CXXFLAGS -I$SRC/cityhash/src" export CRYPTOFUZZ_REFERENCE_CITY_O_PATH="$SRC/cityhash/src/city.o" ############################################################################## # Compile cryptopp cd $SRC/cryptopp if [[ $CFLAGS != *sanitize=memory* ]] then make -j$(nproc) >/dev/null 2>&1 else CXXFLAGS="$CXXFLAGS -DCRYPTOPP_DISABLE_ASM=1" make -j$(nproc) >/dev/null 2>&1 fi export CXXFLAGS="$CXXFLAGS -DCRYPTOFUZZ_CRYPTOPP" export LIBCRYPTOPP_A_PATH="$SRC/cryptopp/libcryptopp.a" export CRYPTOPP_INCLUDE_PATH="$SRC/cryptopp" # Compile Cryptofuzz cryptopp module cd $SRC/cryptofuzz/modules/cryptopp make -B ############################################################################## # Compile mbed TLS cd $SRC/mbedtls/ scripts/config.pl set MBEDTLS_PLATFORM_MEMORY scripts/config.pl set MBEDTLS_CMAC_C scripts/config.pl set MBEDTLS_NIST_KW_C scripts/config.pl set MBEDTLS_ARIA_C scripts/config.pl set MBEDTLS_MD2_C scripts/config.pl set MBEDTLS_MD4_C if [[ $CFLAGS == *sanitize=memory* ]] then scripts/config.pl unset MBEDTLS_HAVE_ASM scripts/config.pl unset MBEDTLS_PADLOCK_C scripts/config.pl unset MBEDTLS_AESNI_C fi mkdir build/ cd build/ cmake .. -DENABLE_PROGRAMS=0 -DENABLE_TESTING=0 make -j$(nproc) >/dev/null 2>&1 export MBEDTLS_LIBMBEDCRYPTO_A_PATH="$SRC/mbedtls/build/library/libmbedcrypto.a" export MBEDTLS_INCLUDE_PATH="$SRC/mbedtls/include" export CXXFLAGS="$CXXFLAGS -DCRYPTOFUZZ_MBEDTLS" # Compile Cryptofuzz mbed crypto module cd $SRC/cryptofuzz/modules/mbedtls make -B ############################################################################## # Compile Botan cd $SRC/botan if [[ $CFLAGS != *-m32* ]] then ./configure.py --cc-bin=$CXX --cc-abi-flags="$CXXFLAGS" --disable-shared --disable-modules=locking_allocator else ./configure.py --cpu=x86_32 --cc-bin=$CXX --cc-abi-flags="$CXXFLAGS" --disable-shared --disable-modules=locking_allocator fi make -j$(nproc) export CXXFLAGS="$CXXFLAGS -DCRYPTOFUZZ_BOTAN" export LIBBOTAN_A_PATH="$SRC/botan/libbotan-2.a" export BOTAN_INCLUDE_PATH="$SRC/botan/build/include" # Compile Cryptofuzz Botan module cd $SRC/cryptofuzz/modules/botan make -B ############################################################################## if [[ $CFLAGS != *sanitize=memory* ]] then # Compile libgpg-error (dependency of libgcrypt) cd $SRC/ tar jxvf libgpg-error-1.36.tar.bz2 cd libgpg-error-1.36/ if [[ $CFLAGS != *-m32* ]] then ./configure --enable-static else ./configure --enable-static --host=i386 fi make -j$(nproc) >/dev/null 2>&1 make install export LINK_FLAGS="$LINK_FLAGS $SRC/libgpg-error-1.36/src/.libs/libgpg-error.a" # Compile libgcrypt cd $SRC/libgcrypt autoreconf -ivf if [[ $CFLAGS = *-m32* ]] then ./configure --enable-static --disable-doc --host=i386 else ./configure --enable-static --disable-doc fi make -j$(nproc) >/dev/null 2>&1 export CXXFLAGS="$CXXFLAGS -DCRYPTOFUZZ_LIBGCRYPT" export LIBGCRYPT_A_PATH="$SRC/libgcrypt/src/.libs/libgcrypt.a" export LIBGCRYPT_INCLUDE_PATH="$SRC/libgcrypt/src" # Compile Cryptofuzz libgcrypt module cd $SRC/cryptofuzz/modules/libgcrypt make -B fi # Compile libsodium cd $SRC/libsodium autoreconf -ivf if [[ $CFLAGS != *sanitize=memory* ]] then ./configure else ./configure --disable-asm fi make -j$(nproc) >/dev/null 2>&1 export CXXFLAGS="$CXXFLAGS -DCRYPTOFUZZ_LIBSODIUM" export LIBSODIUM_A_PATH="$SRC/libsodium/src/libsodium/.libs/libsodium.a" export LIBSODIUM_INCLUDE_PATH="$SRC/libsodium/src/libsodium/include" # Compile Cryptofuzz libsodium module cd $SRC/cryptofuzz/modules/libsodium make -B if [[ $CFLAGS != *sanitize=memory* && $CFLAGS != *-m32* ]] then # Compile EverCrypt (with assembly) cd $SRC/evercrypt/dist make -C portable -j$(nproc) libevercrypt.a >/dev/null 2>&1 make -C kremlin/kremlib/dist/minimal -j$(nproc) >/dev/null 2>&1 export CXXFLAGS="$CXXFLAGS -DCRYPTOFUZZ_EVERCRYPT" export EVERCRYPT_A_PATH="$SRC/evercrypt/dist/portable/libevercrypt.a" export KREMLIN_A_PATH="$SRC/evercrypt/dist/kremlin/kremlib/dist/minimal/*.o" export EVERCRYPT_INCLUDE_PATH="$SRC/evercrypt/dist" export KREMLIN_INCLUDE_PATH="$SRC/evercrypt/dist/kremlin/include" export INCLUDE_PATH_FLAGS="$INCLUDE_PATH_FLAGS -I $EVERCRYPT_INCLUDE_PATH -I $KREMLIN_INCLUDE_PATH" # Compile Cryptofuzz EverCrypt (with assembly) module cd $SRC/cryptofuzz/modules/evercrypt make -B fi ############################################################################## # Compile Cryptofuzz reference (without assembly) module export CXXFLAGS="$CXXFLAGS -DCRYPTOFUZZ_REFERENCE" cd $SRC/cryptofuzz/modules/reference make -B ############################################################################## # Compile Cryptofuzz Veracrypt (without assembly) module export CXXFLAGS="$CXXFLAGS -DCRYPTOFUZZ_VERACRYPT" cd $SRC/cryptofuzz/modules/veracrypt make -B ############################################################################## # Compile Cryptofuzz Monero (without assembly) module export CXXFLAGS="$CXXFLAGS -DCRYPTOFUZZ_MONERO" cd $SRC/cryptofuzz/modules/monero make -B ############################################################################## # Compile Cryptofuzz Golang module if [[ $CFLAGS != *sanitize=memory* ]] then export CXXFLAGS="$CXXFLAGS -DCRYPTOFUZZ_GOLANG" cd $SRC/cryptofuzz/modules/golang make -B fi if [[ $CFLAGS != *-m32* ]] then # Compile Cryptofuzz (NSS-based) cd $SRC/cryptofuzz LIBFUZZER_LINK="$LIB_FUZZING_ENGINE" CXXFLAGS="$CXXFLAGS -DCRYPTOFUZZ_NO_OPENSSL $INCLUDE_PATH_FLAGS" make -B -j$(nproc) # Generate dictionary ./generate_dict # Copy fuzzer cp $SRC/cryptofuzz/cryptofuzz $OUT/cryptofuzz-nss # Copy dictionary cp $SRC/cryptofuzz/cryptofuzz-dict.txt $OUT/cryptofuzz-nss.dict # Copy seed corpus cp $SRC/cryptofuzz-corpora/libressl_latest.zip $OUT/cryptofuzz-nss_seed_corpus.zip rm $SRC/cryptofuzz/modules/nss/module.a CXXFLAGS=${CXXFLAGS//"-DCRYPTOFUZZ_NSS"/} LINK_FLAGS=${LINK_FLAGS//"-lsqlite3"/} fi if [[ $CFLAGS != *sanitize=memory* ]] then # libtomcrypt can only be compiled with NSS, because OpenSSL, LibreSSL and # BoringSSL have symbol collisions with libtomcrypt. # # So, now that NSS-based Cryptofuzz has been compiled, remove libtomcrypt export CXXFLAGS=${CXXFLAGS/-DCRYPTOFUZZ_LIBTOMCRYPT/} rm -rf "$LIBTOMCRYPT_A_PATH" fi ############################################################################## # Compile wolfCrypt cd $SRC/wolfssl autoreconf -ivf export WOLFCRYPT_CONFIGURE_PARAMS="--enable-static --enable-md2 --enable-md4 --enable-ripemd --enable-blake2 --enable-blake2s --enable-pwdbased --enable-scrypt --enable-hkdf --enable-cmac --enable-arc4 --enable-camellia --enable-rabbit --enable-aesccm --enable-aesctr --enable-hc128 --enable-xts --enable-des3 --enable-idea --enable-x963kdf --enable-harden --enable-aescfb --enable-aesofb --enable-aeskeywrap --enable-shake256 --enable-curve25519 --enable-curve448 --disable-crypttests --disable-examples --enable-keygen --enable-compkey --enable-ed448 --enable-ed25519" if [[ $CFLAGS = *sanitize=memory* ]] then export WOLFCRYPT_CONFIGURE_PARAMS="$WOLFCRYPT_CONFIGURE_PARAMS -disable-asm" fi if [[ $CFLAGS = *-m32* ]] then export WOLFCRYPT_CONFIGURE_PARAMS="$WOLFCRYPT_CONFIGURE_PARAMS -disable-fastmath" fi ./configure $WOLFCRYPT_CONFIGURE_PARAMS make -j$(nproc) >/dev/null 2>&1 export CXXFLAGS="$CXXFLAGS -DCRYPTOFUZZ_WOLFCRYPT" export WOLFCRYPT_LIBWOLFSSL_A_PATH="$SRC/wolfssl/src/.libs/libwolfssl.a" export WOLFCRYPT_INCLUDE_PATH="$SRC/wolfssl" # Compile Cryptofuzz wolfcrypt (without assembly) module cd $SRC/cryptofuzz/modules/wolfcrypt make -B ############################################################################## if [[ $CFLAGS != *sanitize=memory* ]] then # Compile LibreSSL (with assembly) cd $SRC/libressl rm -rf build ; mkdir build cd build if [[ $CFLAGS != *-m32* ]] then cmake -DCMAKE_C_COMPILER=$CC -DCMAKE_CXX_COMPILER=$CXX -DCMAKE_CXX_FLAGS="$CXXFLAGS" -DCMAKE_C_FLAGS="$CFLAGS" .. else setarch i386 cmake -DCMAKE_C_COMPILER=$CC -DCMAKE_CXX_COMPILER=$CXX -DCMAKE_CXX_FLAGS="$CXXFLAGS" -DCMAKE_C_FLAGS="$CFLAGS" .. fi make -j$(nproc) crypto >/dev/null 2>&1 # Compile Cryptofuzz LibreSSL (with assembly) module cd $SRC/cryptofuzz/modules/openssl OPENSSL_INCLUDE_PATH="$SRC/libressl/include" OPENSSL_LIBCRYPTO_A_PATH="$SRC/libressl/build/crypto/libcrypto.a" CXXFLAGS="$CXXFLAGS -DCRYPTOFUZZ_LIBRESSL" make -B # Compile Cryptofuzz cd $SRC/cryptofuzz LIBFUZZER_LINK="$LIB_FUZZING_ENGINE" CXXFLAGS="$CXXFLAGS -I $SRC/libressl/include -DCRYPTOFUZZ_LIBRESSL $INCLUDE_PATH_FLAGS" make -B -j$(nproc) >/dev/null 2>&1 # Generate dictionary ./generate_dict # Copy fuzzer cp $SRC/cryptofuzz/cryptofuzz $OUT/cryptofuzz-libressl # Copy dictionary cp $SRC/cryptofuzz/cryptofuzz-dict.txt $OUT/cryptofuzz-libressl.dict # Copy seed corpus cp $SRC/cryptofuzz-corpora/libressl_latest.zip $OUT/cryptofuzz-libressl_seed_corpus.zip fi if [[ $CFLAGS != *-m32* ]] then # Compile LibreSSL (without assembly) cd $SRC/libressl rm -rf build ; mkdir build cd build cmake -DCMAKE_C_COMPILER=$CC -DCMAKE_CXX_COMPILER=$CXX -DCMAKE_CXX_FLAGS="$CXXFLAGS" -DCMAKE_C_FLAGS="$CFLAGS" -DENABLE_ASM=OFF .. make -j$(nproc) crypto >/dev/null 2>&1 # Compile Cryptofuzz LibreSSL (without assembly) module cd $SRC/cryptofuzz/modules/openssl OPENSSL_INCLUDE_PATH="$SRC/libressl/include" OPENSSL_LIBCRYPTO_A_PATH="$SRC/libressl/build/crypto/libcrypto.a" CXXFLAGS="$CXXFLAGS -DCRYPTOFUZZ_LIBRESSL" make -B # Compile Cryptofuzz cd $SRC/cryptofuzz LIBFUZZER_LINK="$LIB_FUZZING_ENGINE" CXXFLAGS="$CXXFLAGS -I $SRC/libressl/include -DCRYPTOFUZZ_LIBRESSL $INCLUDE_PATH_FLAGS" make -B -j$(nproc) >/dev/null 2>&1 # Generate dictionary ./generate_dict # Copy fuzzer cp $SRC/cryptofuzz/cryptofuzz $OUT/cryptofuzz-libressl-noasm # Copy dictionary cp $SRC/cryptofuzz/cryptofuzz-dict.txt $OUT/cryptofuzz-libressl-noasm.dict # Copy seed corpus cp $SRC/cryptofuzz-corpora/libressl_latest.zip $OUT/cryptofuzz-libressl-noasm_seed_corpus.zip fi # OpenSSL can currently not be used together with wolfCrypt due to symbol collisions export SAVE_CXXFLAGS="$CXXFLAGS" export CXXFLAGS=${CXXFLAGS/-DCRYPTOFUZZ_WOLFCRYPT/} ############################################################################## if [[ $CFLAGS != *sanitize=memory* ]] then # Compile Openssl (with assembly) cd $SRC/openssl if [[ $CFLAGS != *-m32* ]] then ./config --debug enable-md2 enable-rc5 else setarch i386 ./config --debug enable-md2 enable-rc5 fi make -j$(nproc) >/dev/null 2>&1 # Compile Cryptofuzz OpenSSL (with assembly) module cd $SRC/cryptofuzz/modules/openssl OPENSSL_INCLUDE_PATH="$SRC/openssl/include" OPENSSL_LIBCRYPTO_A_PATH="$SRC/openssl/libcrypto.a" make -B # Compile Cryptofuzz cd $SRC/cryptofuzz LIBFUZZER_LINK="$LIB_FUZZING_ENGINE" CXXFLAGS="$CXXFLAGS -I $SRC/openssl/include $INCLUDE_PATH_FLAGS" make -B -j$(nproc) >/dev/null 2>&1 # Generate dictionary ./generate_dict # Copy fuzzer cp $SRC/cryptofuzz/cryptofuzz $OUT/cryptofuzz-openssl # Copy dictionary cp $SRC/cryptofuzz/cryptofuzz-dict.txt $OUT/cryptofuzz-openssl.dict # Copy seed corpus cp $SRC/cryptofuzz-corpora/openssl_latest.zip $OUT/cryptofuzz-openssl_seed_corpus.zip fi ############################################################################## # Compile Openssl (without assembly) cd $SRC/openssl if [[ $CFLAGS != *-m32* ]] then ./config --debug no-asm enable-md2 enable-rc5 else setarch i386 ./config --debug no-asm enable-md2 enable-rc5 fi make clean make -j$(nproc) >/dev/null 2>&1 # Compile Cryptofuzz OpenSSL (without assembly) module cd $SRC/cryptofuzz/modules/openssl OPENSSL_INCLUDE_PATH="$SRC/openssl/include" OPENSSL_LIBCRYPTO_A_PATH="$SRC/openssl/libcrypto.a" make -B # Compile Cryptofuzz cd $SRC/cryptofuzz LIBFUZZER_LINK="$LIB_FUZZING_ENGINE" CXXFLAGS="$CXXFLAGS -I $SRC/openssl/include $INCLUDE_PATH_FLAGS" make -B -j$(nproc) >/dev/null 2>&1 # Generate dictionary ./generate_dict # Copy fuzzer cp $SRC/cryptofuzz/cryptofuzz $OUT/cryptofuzz-openssl-noasm # Copy dictionary cp $SRC/cryptofuzz/cryptofuzz-dict.txt $OUT/cryptofuzz-openssl-noasm.dict # Copy seed corpus cp $SRC/cryptofuzz-corpora/openssl_latest.zip $OUT/cryptofuzz-openssl-noasm_seed_corpus.zip export CXXFLAGS="$SAVE_CXXFLAGS" ############################################################################## if [[ $CFLAGS != *sanitize=memory* ]] then # Compile BoringSSL (with assembly) cd $SRC/boringssl rm -rf build ; mkdir build cd build if [[ $CFLAGS = *-m32* ]] then setarch i386 cmake -DCMAKE_CXX_FLAGS="$CXXFLAGS" -DCMAKE_C_FLAGS="$CFLAGS" -DBORINGSSL_ALLOW_CXX_RUNTIME=1 -DCMAKE_ASM_FLAGS="-m32" .. else cmake -DCMAKE_CXX_FLAGS="$CXXFLAGS" -DCMAKE_C_FLAGS="$CFLAGS" -DBORINGSSL_ALLOW_CXX_RUNTIME=1 .. fi make -j$(nproc) crypto >/dev/null 2>&1 # Compile Cryptofuzz BoringSSL (with assembly) module cd $SRC/cryptofuzz/modules/openssl OPENSSL_INCLUDE_PATH="$SRC/boringssl/include" OPENSSL_LIBCRYPTO_A_PATH="$SRC/boringssl/build/crypto/libcrypto.a" CXXFLAGS="$CXXFLAGS -DCRYPTOFUZZ_BORINGSSL" make -B # Compile Cryptofuzz cd $SRC/cryptofuzz LIBFUZZER_LINK="$LIB_FUZZING_ENGINE" CXXFLAGS="$CXXFLAGS -I $SRC/openssl/include $INCLUDE_PATH_FLAGS" make -B -j$(nproc) >/dev/null 2>&1 # Generate dictionary ./generate_dict # Copy fuzzer cp $SRC/cryptofuzz/cryptofuzz $OUT/cryptofuzz-boringssl # Copy dictionary cp $SRC/cryptofuzz/cryptofuzz-dict.txt $OUT/cryptofuzz-boringssl.dict # Copy seed corpus cp $SRC/cryptofuzz-corpora/boringssl_latest.zip $OUT/cryptofuzz-boringssl_seed_corpus.zip fi ############################################################################## # Compile BoringSSL (with assembly) cd $SRC/boringssl rm -rf build ; mkdir build cd build cmake -DCMAKE_CXX_FLAGS="$CXXFLAGS" -DCMAKE_C_FLAGS="$CFLAGS" -DBORINGSSL_ALLOW_CXX_RUNTIME=1 -DOPENSSL_NO_ASM=1 .. make -j$(nproc) crypto >/dev/null 2>&1 # Compile Cryptofuzz BoringSSL (with assembly) module cd $SRC/cryptofuzz/modules/openssl OPENSSL_INCLUDE_PATH="$SRC/boringssl/include" OPENSSL_LIBCRYPTO_A_PATH="$SRC/boringssl/build/crypto/libcrypto.a" CXXFLAGS="$CXXFLAGS -DCRYPTOFUZZ_BORINGSSL" make -B # Compile Cryptofuzz cd $SRC/cryptofuzz LIBFUZZER_LINK="$LIB_FUZZING_ENGINE" CXXFLAGS="$CXXFLAGS -I $SRC/openssl/include $INCLUDE_PATH_FLAGS" make -B -j$(nproc) >/dev/null 2>&1 # Generate dictionary ./generate_dict # Copy fuzzer cp $SRC/cryptofuzz/cryptofuzz $OUT/cryptofuzz-boringssl-noasm # Copy dictionary cp $SRC/cryptofuzz/cryptofuzz-dict.txt $OUT/cryptofuzz-boringssl-noasm.dict # Copy seed corpus cp $SRC/cryptofuzz-corpora/boringssl_latest.zip $OUT/cryptofuzz-boringssl-noasm_seed_corpus.zip