Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fuzzing methods #901

Merged
merged 4 commits into from
Jan 31, 2025
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion build/init.mk
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ ZEN_SOURCES := \
src/zen_fp12.o src/zen_random.o src/zen_hash.o \
src/zen_ecdh_factory.o src/zen_ecdh.o src/zen_x509.o \
src/zen_aes.o src/zen_qp.o src/zen_ed.o src/zen_float.o src/zen_time.o \
src/api_hash.o src/api_sign.o src/randombytes.o \
src/api_hash.o src/api_sign.o src/randombytes.o src/zen_fuzzer.o \
src/cortex_m.o src/p256-m.o src/zen_p256.o src/zen_rsa.o src/zen_bbs.o

ZEN_INCLUDES += -Isrc -Ilib/lua54/src \
Expand Down
280 changes: 280 additions & 0 deletions src/zen_fuzzer.c
Original file line number Diff line number Diff line change
@@ -0,0 +1,280 @@
/* This file is part of Zenroom (https://zenroom.org)
*
* Copyright (C) 2024 Dyne.org foundation
* designed, written and maintained by Denis Roio <[email protected]>
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU Affero General Public License as
* published by the Free Software Foundation, either version 3 of the
* License, or (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU Affero General Public License for more details.
*
* You should have received a copy of the GNU Affero General Public License
* along with this program. If not, see <https://www.gnu.org/licenses/>.
*
*/

#include <lua.h>
#include <lualib.h>
#include <lauxlib.h>

#include <zen_error.h>

Check warning on line 25 in src/zen_fuzzer.c

View workflow job for this annotation

GitHub Actions / cpplint

[cpplint] src/zen_fuzzer.c#L25

src/zen_fuzzer.c should include its header file src/zen_fuzzer.h [build/include] [5]
Raw output
src/zen_fuzzer.c:25:  src/zen_fuzzer.c should include its header file src/zen_fuzzer.h  [build/include] [5]

#include <amcl.h>

#include <zenroom.h>
#include <zen_error.h>

Check warning on line 30 in src/zen_fuzzer.c

View workflow job for this annotation

GitHub Actions / cpplint

[cpplint] src/zen_fuzzer.c#L30

"zen_error.h" already included at src/zen_fuzzer.c:25 [build/include] [4]
Raw output
src/zen_fuzzer.c:30:  "zen_error.h" already included at src/zen_fuzzer.c:25  [build/include] [4]
#include <zen_octet.h>

int fuzz_byte_random(lua_State *L) {
BEGIN();
const octet *o = o_arg(L, 1);
if(o->len >= INT_MAX) {
o_free(L,o);
THROW("fuzz_byte: octet too big");
END(0);
}
octet *res = o_dup(L,o);
Z(L);
uint8_t rnd = RAND_byte(Z->random_generator);
if(res->len < 256) {
uint8_t point8 = RAND_byte(Z->random_generator);
while((uint8_t)res->val[point8%res->len] == rnd) {
rnd = RAND_byte(Z->random_generator);
}
res->val[point8 % res->len] = rnd;

Check warning on line 49 in src/zen_fuzzer.c

View workflow job for this annotation

GitHub Actions / cpplint

[cpplint] src/zen_fuzzer.c#L49

Line ends in whitespace. Consider deleting these extra spaces. [whitespace/end_of_line] [4]
Raw output
src/zen_fuzzer.c:49:  Line ends in whitespace.  Consider deleting these extra spaces.  [whitespace/end_of_line] [4]
} else if(res->len < 65535) {
uint16_t point16 =
RAND_byte(Z->random_generator)
| (uint32_t) RAND_byte(Z->random_generator) << 8;
while ((uint8_t)res->val[point16 % res->len] == rnd) {
rnd = RAND_byte(Z->random_generator);
}
res->val[point16%res->len] = rnd;
} else if(res->len < INT_MAX) {
uint32_t point32 =
RAND_byte(Z->random_generator)
| (uint32_t) RAND_byte(Z->random_generator) << 8
| (uint32_t) RAND_byte(Z->random_generator) << 16
| (uint32_t) RAND_byte(Z->random_generator) << 24;
while ((uint8_t)res->val[point32 % res->len] == rnd) {
rnd = RAND_byte(Z->random_generator);
}
res->val[point32%res->len] = rnd;
}
o_free(L,o);
END(1);
}


int fuzz_byte_xor(lua_State *L) {
BEGIN();
const octet *o = o_arg(L,1);
if(o->len >= INT_MAX) {
o_free(L,o);
THROW("fuzz_byte: octet too big");
END(0);
}
octet *res = o_dup(L,o);
Z(L);
if(res->len < 256) {
uint8_t point8 = RAND_byte(Z->random_generator) % res->len;
res->val[point8] ^= 0xff;
} else if(res->len < 65535) {
uint16_t point16 =
RAND_byte(Z->random_generator)
| (uint32_t) RAND_byte(Z->random_generator) << 8;
point16 %= res->len;
res->val[point16] ^= 0xff;
} else if(res->len < INT_MAX) {
uint32_t point32 =
RAND_byte(Z->random_generator)
| (uint32_t) RAND_byte(Z->random_generator) << 8
| (uint32_t) RAND_byte(Z->random_generator) << 16
| (uint32_t) RAND_byte(Z->random_generator) << 24;
point32 %= res->len;
res->val[point32] ^= 0xff;
}
o_free(L,o);
END(1);
}


int fuzz_bit_random(lua_State *L) {
BEGIN();
const octet *o = o_arg(L,1);
if(o->len >= INT_MAX) {
o_free(L,o);
THROW("fuzz_byte: octet too big");
END(0);
}
octet *res = o_dup(L,o);
Z(L);
if(res->len < 256) {
uint8_t point8 = RAND_byte(Z->random_generator);
uint8_t bit_position = RAND_byte(Z->random_generator) % 8;
res->val[point8%res->len] ^= (1 << bit_position);
}
else if(res->len < 65535) {
uint16_t point16 =
RAND_byte(Z->random_generator)
| (uint32_t) RAND_byte(Z->random_generator) << 8;
uint8_t bit_position = RAND_byte(Z->random_generator) % 8;
res->val[point16%res->len] ^= (1 << bit_position);
} else if(res->len < INT_MAX) {
uint32_t point32 =
RAND_byte(Z->random_generator)
| (uint32_t) RAND_byte(Z->random_generator) << 8
| (uint32_t) RAND_byte(Z->random_generator) << 16
| (uint32_t) RAND_byte(Z->random_generator) << 24;
uint8_t bit_position = RAND_byte(Z->random_generator) % 8;
res->val[point32%res->len] ^= (1 << bit_position);
}
o_free(L,o);
END(1);
}

void OCT_circular_shl_bytes(octet *x, int n) {
if (n >= x->len) {
n = n % (x->len);
}

if (n > 0) {
unsigned char temp[x->len];
for (int i = 0; i < x->len; i++) {
temp[i] = x->val[i];
}
for (int i = 0; i < x->len; i++) {
x->val[i] = temp[(i + n) % x->len];
}
}
}

void OCT_circular_shl_bits(octet *x, int n) {
if (n >= 8 * x->len) {
n = n % (8 * x->len);
}
int byte_shift = n / 8;
int bit_shift = n % 8;
int carry_bits = 8 - bit_shift;

if (byte_shift > 0) {
unsigned char temp[x->len];
for (int i = 0; i < x->len; i++) {
temp[i] = x->val[i];
}

for (int i = 0; i < x->len; i++) {
x->val[i] = temp[(i + byte_shift) % x->len];
}
}
if (bit_shift > 0) {
unsigned char carry = 0;
unsigned char first_byte_carry = (x->val[0] >> carry_bits) & ((1 << bit_shift) - 1);

for (int i = x->len - 1; i >= 0; i--) {
unsigned char current = x->val[i];
x->val[i] = (current << bit_shift) | carry;
carry = (current >> carry_bits) & ((1 << bit_shift) - 1);
}
x->val[x->len - 1] |= first_byte_carry;
}
}

int fuzz_byte_circular_shift_random(lua_State *L) {
BEGIN();
const octet *o = o_arg(L,1);
if(o->len >= INT_MAX) {
o_free(L,o);
THROW("fuzz_byte: octet too big");
END(0);
}
octet *res = o_dup(L,o);
Z(L);
if(res->len < 256) {
uint8_t point8 = RAND_byte(Z->random_generator);
while (point8 % res->len == (uint8_t)0) {
point8 = RAND_byte(Z->random_generator);
}
OCT_circular_shl_bytes(res, (point8 % res->len));
} else if(res->len < 65535) {
uint16_t point16 =
RAND_byte(Z->random_generator)
| (uint32_t) RAND_byte(Z->random_generator) << 8;
while (point16 % res->len == (uint16_t) 0) {
point16 =

Check warning on line 209 in src/zen_fuzzer.c

View workflow job for this annotation

GitHub Actions / cpplint

[cpplint] src/zen_fuzzer.c#L209

Line ends in whitespace. Consider deleting these extra spaces. [whitespace/end_of_line] [4]
Raw output
src/zen_fuzzer.c:209:  Line ends in whitespace.  Consider deleting these extra spaces.  [whitespace/end_of_line] [4]
RAND_byte(Z->random_generator)

Check warning on line 210 in src/zen_fuzzer.c

View workflow job for this annotation

GitHub Actions / cpplint

[cpplint] src/zen_fuzzer.c#L210

Line ends in whitespace. Consider deleting these extra spaces. [whitespace/end_of_line] [4]
Raw output
src/zen_fuzzer.c:210:  Line ends in whitespace.  Consider deleting these extra spaces.  [whitespace/end_of_line] [4]
| (uint32_t)RAND_byte(Z->random_generator) << 8;
}
OCT_circular_shl_bytes(res, (point16%res->len));
} else if(res->len < INT_MAX) {
uint32_t point32 =
RAND_byte(Z->random_generator)
| (uint32_t) RAND_byte(Z->random_generator) << 8
| (uint32_t) RAND_byte(Z->random_generator) << 16
| (uint32_t) RAND_byte(Z->random_generator) << 24;
while (point32 % res->len == (uint32_t) 0) {
point32 =
RAND_byte(Z->random_generator)
| (uint32_t) RAND_byte(Z->random_generator) << 8
| (uint32_t) RAND_byte(Z->random_generator) << 16
| (uint32_t) RAND_byte(Z->random_generator) << 24;
}
OCT_circular_shl_bytes(res, (point32%res->len));
}
o_free(L,o);
END(1);
}

int fuzz_bit_circular_shift_random(lua_State *L) {
BEGIN();
const octet *o = o_arg(L, 1);
if (o->len >= INT_MAX) {
o_free(L, o);
THROW("fuzz_byte: octet too big");
END(0);
}

octet *res = o_dup(L, o);
Z(L);

uint32_t total_bits = res->len * 8;
uint32_t shift_bits = 0;

if (res->len < 256) {
shift_bits = (RAND_byte(Z->random_generator) % res->len) * 8 + (RAND_byte(Z->random_generator) % 8);
while (shift_bits % total_bits == (uint32_t) 0) {
shift_bits = (RAND_byte(Z->random_generator) % res->len) * 8 + (RAND_byte(Z->random_generator) % 8);
}
}
else if (res->len < 65535) {
uint16_t point16 =

Check warning on line 255 in src/zen_fuzzer.c

View workflow job for this annotation

GitHub Actions / cpplint

[cpplint] src/zen_fuzzer.c#L255

Line ends in whitespace. Consider deleting these extra spaces. [whitespace/end_of_line] [4]
Raw output
src/zen_fuzzer.c:255:  Line ends in whitespace.  Consider deleting these extra spaces.  [whitespace/end_of_line] [4]
RAND_byte(Z->random_generator)
| (uint32_t)RAND_byte(Z->random_generator) << 8;
shift_bits = (point16 % res->len) * 8 + (RAND_byte(Z->random_generator) % 8);
while (shift_bits % total_bits == (uint32_t) 0) {
shift_bits = (point16 % res->len) * 8 + (RAND_byte(Z->random_generator) % 8);
}
}
else if (res->len < INT_MAX) {
uint32_t point32 =
RAND_byte(Z->random_generator)
| (uint32_t) RAND_byte(Z->random_generator) << 8
| (uint32_t) RAND_byte(Z->random_generator) << 16
| (uint32_t) RAND_byte(Z->random_generator) << 24;
shift_bits = (point32 % res->len) * 8 + (RAND_byte(Z->random_generator) % 8);
while (shift_bits % total_bits == (uint32_t) 0) {
shift_bits = (point32 % res->len) * 8 + (RAND_byte(Z->random_generator) % 8);
}
}

OCT_circular_shl_bits(res, shift_bits);

o_free(L, o);
END(1);
}

26 changes: 26 additions & 0 deletions src/zen_fuzzer.h
Original file line number Diff line number Diff line change
@@ -0,0 +1,26 @@
/* This file is part of Zenroom (https://zenroom.org)
*
* Copyright (C) 2024 Dyne.org foundation
* designed, written and maintained by Denis Roio <[email protected]>
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU Affero General Public License as
* published by the Free Software Foundation, either version 3 of the
* License, or (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU Affero General Public License for more details.
*
* You should have received a copy of the GNU Affero General Public License
* along with this program. If not, see <https://www.gnu.org/licenses/>.
*
*/

int fuzz_byte_random(lua_State *L);
int fuzz_byte_xor(lua_State *L);
int fuzz_bit_random(lua_State *L);
int fuzz_byte_circular_shift_random(lua_State *L);
int fuzz_bit_circular_shift_random(lua_State *L);
void OCT_circular_shl_bits(octet *x, int n);
Loading
Loading