diff options
author | Mark Haines <mjark@negativecurvature.net> | 2016-05-23 17:32:24 +0100 |
---|---|---|
committer | Mark Haines <mjark@negativecurvature.net> | 2016-05-23 17:32:24 +0100 |
commit | f47aabd094a4eafeed5a510c650d7a063a148076 (patch) | |
tree | 53fbdcc5d028246bb0a41760810aa722ac2a86d7 /fuzzers/fuzz_decrypt.cpp | |
parent | aacf1154684885d244182eb9cd68e429d72ee57a (diff) |
Add support for building fuzzers using american fuzzy lop
Builds fuzzers using http://lcamtuf.coredump.cx/afl/
Diffstat (limited to 'fuzzers/fuzz_decrypt.cpp')
-rw-r--r-- | fuzzers/fuzz_decrypt.cpp | 64 |
1 files changed, 64 insertions, 0 deletions
diff --git a/fuzzers/fuzz_decrypt.cpp b/fuzzers/fuzz_decrypt.cpp new file mode 100644 index 0000000..6116934 --- /dev/null +++ b/fuzzers/fuzz_decrypt.cpp @@ -0,0 +1,64 @@ +#include "olm/olm.hh" + +#include "fuzzing.hh" + +int main(int argc, const char *argv[]) { + size_t ignored; + if (argc <= 3) { + const char * message = "Usage: decrypt: <session_key> <session_file>" + " <message_type>\n"; + ignored = write(STDERR_FILENO, message, strlen(message)); + exit(3); + } + + const char * key = argv[1]; + size_t key_length = strlen(key); + + + int session_fd = check_errno( + "Error opening session file", open(argv[2], O_RDONLY) + ); + + int message_type = atoi(argv[3]); + + uint8_t *session_buffer; + ssize_t session_length = check_errno( + "Error reading session file", read_file(session_fd, &session_buffer) + ); + + int message_fd = STDIN_FILENO; + uint8_t * message_buffer; + ssize_t message_length = check_errno( + "Error reading message file", read_file(message_fd, &message_buffer) + ); + + uint8_t * tmp_buffer = (uint8_t *) malloc(message_length); + memcpy(tmp_buffer, message_buffer, message_length); + + uint8_t session_memory[olm_session_size()]; + OlmSession * session = olm_session(session_memory); + check_session(session, "Error unpickling session", olm_unpickle_session( + session, key, key_length, session_buffer, session_length + )); + + size_t max_length = check_session( + session, + "Error getting plaintext length", + olm_decrypt_max_plaintext_length( + session, message_type, tmp_buffer, message_length + ) + ); + + uint8_t plaintext[max_length]; + + size_t length = check_session( + session, "Error decrypting message", olm_decrypt( + session, message_type, + message_buffer, message_length, + plaintext, max_length + ) + ); + + ignored = write(STDOUT_FILENO, plaintext, length); + ignored = write(STDOUT_FILENO, "\n", 1); +} |