xref: /aosp_15_r20/external/mbedtls/programs/fuzz/common.c (revision 62c56f9862f102b96d72393aff6076c951fb8148)
1*62c56f98SSadaf Ebrahimi #include "common.h"
2*62c56f98SSadaf Ebrahimi #include <limits.h>
3*62c56f98SSadaf Ebrahimi #include <stdio.h>
4*62c56f98SSadaf Ebrahimi #include <string.h>
5*62c56f98SSadaf Ebrahimi #include <stdlib.h>
6*62c56f98SSadaf Ebrahimi #include "mbedtls/ctr_drbg.h"
7*62c56f98SSadaf Ebrahimi 
8*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PLATFORM_TIME_ALT)
dummy_constant_time(mbedtls_time_t * time)9*62c56f98SSadaf Ebrahimi mbedtls_time_t dummy_constant_time(mbedtls_time_t *time)
10*62c56f98SSadaf Ebrahimi {
11*62c56f98SSadaf Ebrahimi     (void) time;
12*62c56f98SSadaf Ebrahimi     return 0x5af2a056;
13*62c56f98SSadaf Ebrahimi }
14*62c56f98SSadaf Ebrahimi #endif
15*62c56f98SSadaf Ebrahimi 
dummy_init(void)16*62c56f98SSadaf Ebrahimi void dummy_init(void)
17*62c56f98SSadaf Ebrahimi {
18*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PLATFORM_TIME_ALT)
19*62c56f98SSadaf Ebrahimi     mbedtls_platform_set_time(dummy_constant_time);
20*62c56f98SSadaf Ebrahimi #else
21*62c56f98SSadaf Ebrahimi     fprintf(stderr, "Warning: fuzzing without constant time\n");
22*62c56f98SSadaf Ebrahimi #endif
23*62c56f98SSadaf Ebrahimi }
24*62c56f98SSadaf Ebrahimi 
dummy_send(void * ctx,const unsigned char * buf,size_t len)25*62c56f98SSadaf Ebrahimi int dummy_send(void *ctx, const unsigned char *buf, size_t len)
26*62c56f98SSadaf Ebrahimi {
27*62c56f98SSadaf Ebrahimi     //silence warning about unused parameter
28*62c56f98SSadaf Ebrahimi     (void) ctx;
29*62c56f98SSadaf Ebrahimi     (void) buf;
30*62c56f98SSadaf Ebrahimi 
31*62c56f98SSadaf Ebrahimi     //pretends we wrote everything ok
32*62c56f98SSadaf Ebrahimi     if (len > INT_MAX) {
33*62c56f98SSadaf Ebrahimi         return -1;
34*62c56f98SSadaf Ebrahimi     }
35*62c56f98SSadaf Ebrahimi     return (int) len;
36*62c56f98SSadaf Ebrahimi }
37*62c56f98SSadaf Ebrahimi 
fuzz_recv(void * ctx,unsigned char * buf,size_t len)38*62c56f98SSadaf Ebrahimi int fuzz_recv(void *ctx, unsigned char *buf, size_t len)
39*62c56f98SSadaf Ebrahimi {
40*62c56f98SSadaf Ebrahimi     //reads from the buffer from fuzzer
41*62c56f98SSadaf Ebrahimi     fuzzBufferOffset_t *biomemfuzz = (fuzzBufferOffset_t *) ctx;
42*62c56f98SSadaf Ebrahimi 
43*62c56f98SSadaf Ebrahimi     if (biomemfuzz->Offset == biomemfuzz->Size) {
44*62c56f98SSadaf Ebrahimi         //EOF
45*62c56f98SSadaf Ebrahimi         return 0;
46*62c56f98SSadaf Ebrahimi     }
47*62c56f98SSadaf Ebrahimi     if (len > INT_MAX) {
48*62c56f98SSadaf Ebrahimi         return -1;
49*62c56f98SSadaf Ebrahimi     }
50*62c56f98SSadaf Ebrahimi     if (len + biomemfuzz->Offset > biomemfuzz->Size) {
51*62c56f98SSadaf Ebrahimi         //do not overflow
52*62c56f98SSadaf Ebrahimi         len = biomemfuzz->Size - biomemfuzz->Offset;
53*62c56f98SSadaf Ebrahimi     }
54*62c56f98SSadaf Ebrahimi     memcpy(buf, biomemfuzz->Data + biomemfuzz->Offset, len);
55*62c56f98SSadaf Ebrahimi     biomemfuzz->Offset += len;
56*62c56f98SSadaf Ebrahimi     return (int) len;
57*62c56f98SSadaf Ebrahimi }
58*62c56f98SSadaf Ebrahimi 
dummy_random(void * p_rng,unsigned char * output,size_t output_len)59*62c56f98SSadaf Ebrahimi int dummy_random(void *p_rng, unsigned char *output, size_t output_len)
60*62c56f98SSadaf Ebrahimi {
61*62c56f98SSadaf Ebrahimi     int ret;
62*62c56f98SSadaf Ebrahimi     size_t i;
63*62c56f98SSadaf Ebrahimi 
64*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_CTR_DRBG_C)
65*62c56f98SSadaf Ebrahimi     //mbedtls_ctr_drbg_random requires a valid mbedtls_ctr_drbg_context in p_rng
66*62c56f98SSadaf Ebrahimi     if (p_rng != NULL) {
67*62c56f98SSadaf Ebrahimi         //use mbedtls_ctr_drbg_random to find bugs in it
68*62c56f98SSadaf Ebrahimi         ret = mbedtls_ctr_drbg_random(p_rng, output, output_len);
69*62c56f98SSadaf Ebrahimi     } else {
70*62c56f98SSadaf Ebrahimi         //fall through to pseudo-random
71*62c56f98SSadaf Ebrahimi         ret = 0;
72*62c56f98SSadaf Ebrahimi     }
73*62c56f98SSadaf Ebrahimi #else
74*62c56f98SSadaf Ebrahimi     (void) p_rng;
75*62c56f98SSadaf Ebrahimi     ret = 0;
76*62c56f98SSadaf Ebrahimi #endif
77*62c56f98SSadaf Ebrahimi     for (i = 0; i < output_len; i++) {
78*62c56f98SSadaf Ebrahimi         //replace result with pseudo random
79*62c56f98SSadaf Ebrahimi         output[i] = (unsigned char) rand();
80*62c56f98SSadaf Ebrahimi     }
81*62c56f98SSadaf Ebrahimi     return ret;
82*62c56f98SSadaf Ebrahimi }
83*62c56f98SSadaf Ebrahimi 
dummy_entropy(void * data,unsigned char * output,size_t len)84*62c56f98SSadaf Ebrahimi int dummy_entropy(void *data, unsigned char *output, size_t len)
85*62c56f98SSadaf Ebrahimi {
86*62c56f98SSadaf Ebrahimi     size_t i;
87*62c56f98SSadaf Ebrahimi     (void) data;
88*62c56f98SSadaf Ebrahimi 
89*62c56f98SSadaf Ebrahimi     //use mbedtls_entropy_func to find bugs in it
90*62c56f98SSadaf Ebrahimi     //test performance impact of entropy
91*62c56f98SSadaf Ebrahimi     //ret = mbedtls_entropy_func(data, output, len);
92*62c56f98SSadaf Ebrahimi     for (i = 0; i < len; i++) {
93*62c56f98SSadaf Ebrahimi         //replace result with pseudo random
94*62c56f98SSadaf Ebrahimi         output[i] = (unsigned char) rand();
95*62c56f98SSadaf Ebrahimi     }
96*62c56f98SSadaf Ebrahimi     return 0;
97*62c56f98SSadaf Ebrahimi }
98*62c56f98SSadaf Ebrahimi 
fuzz_recv_timeout(void * ctx,unsigned char * buf,size_t len,uint32_t timeout)99*62c56f98SSadaf Ebrahimi int fuzz_recv_timeout(void *ctx, unsigned char *buf, size_t len,
100*62c56f98SSadaf Ebrahimi                       uint32_t timeout)
101*62c56f98SSadaf Ebrahimi {
102*62c56f98SSadaf Ebrahimi     (void) timeout;
103*62c56f98SSadaf Ebrahimi 
104*62c56f98SSadaf Ebrahimi     return fuzz_recv(ctx, buf, len);
105*62c56f98SSadaf Ebrahimi }
106