Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
3 changes: 3 additions & 0 deletions .gitignore
Original file line number Diff line number Diff line change
Expand Up @@ -55,3 +55,6 @@ copyright
pkcs11-helper.spec

doc/api/Doxyfile

fuzz/output
fuzz/fuzz_deserialize_cert
25 changes: 25 additions & 0 deletions fuzz/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,25 @@
## Prerequisites
Install AFL++ (and it's pre-requisites such as clang)
https://github.com/AFLplusplus/AFLplusplus/blob/stable/docs/INSTALL.md

## Building the harness
1. Run ``build_fuzzer.sh`` from the fuzz directory

## Running
1. Extract the corpus
```
tar -xvf deserialize_cert_corpus.tar.gz
```
2. Run the fuzzer
``AFL_SKIP_CPUFREQ=1 afl-fuzz -i ./corpus -o ./output ./fuzz_deserialize_cert``
3. Wait for crashes to show up
![crashes from afl](crashes.png "Title")

IMPORTANT NOTE:
For an effective fuzzing campaign:
1. You'd orchestrate the fuzzing campaign with multiple cores
2. You'd run the fuzzer for several hours (if you do not get crashes in the meantime)
3. You'd omit AFL_SKIP_CPUFREQ and run the scripts to increase fuzzing performance
## Debugging crashes
To run all crashes:
```find ./output/*/crashes/* -exec ./fuzz_deserialize_cert {} \;```
8 changes: 8 additions & 0 deletions fuzz/build_fuzzer.sh
Original file line number Diff line number Diff line change
@@ -0,0 +1,8 @@
#!/bin/bash
cd ..
autoreconf -ivf
make clean
CXXFLAGS="-fsanitize=address" CFLAGS="-fsanitize=address" CC=afl-clang-fast CXX=afl-clang-fast++ ./configure
CFLAGS="-fsanitize=address" CC=afl-clang-fast CXX=afl-clang-fast++ make -j16
afl-clang-fast++ ./fuzz/fuzz_deserialize_cert.c -fsanitize=fuzzer -I ./include/ ./lib/.libs/libpkcs11-helper.a -lssl -lcrypto -o ./fuzz/fuzz_deserialize_cert -fsanitize=address
cd fuzz
Binary file added fuzz/crashes.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added fuzz/deserialize_cert_corpus.tar.gz
Binary file not shown.
31 changes: 31 additions & 0 deletions fuzz/fuzz_deserialize_cert.c
Original file line number Diff line number Diff line change
@@ -0,0 +1,31 @@
#include <pkcs11-helper-1.0/pkcs11h-certificate.h>
#include <pkcs11-helper-1.0/pkcs11h-token.h>
#include <cstdint>
#include <cstdlib>
#include <cstring>
#include <vector>

extern "C" int LLVMFuzzerInitialize(int *argc, char ***argv) {
(void)argc;
(void)argv;
CK_RV rv = pkcs11h_initialize();
if (rv != CKR_OK) {
return -1;
}
pkcs11h_setLogLevel(PKCS11H_LOG_ERROR);
return 0;
}

extern "C" int LLVMFuzzerTestOneInput(const uint8_t *d, size_t s) {
if (s == 0 || s > 8092) {
return 0;
}
std::vector<char> serialized_input(d, d + s);
serialized_input.push_back('\0'); // null-terminate

pkcs11h_certificate_id_t certificate_id = NULL;
pkcs11h_certificate_deserializeCertificateId(&certificate_id, serialized_input.data());
return 0;
}