- Update ConvertDataToValidEnum to not use FuzzedDataProvider since it causes unexpected parsing results. - Add OEMCryptoLicenseAPIFuzz::LoadLicenseWithGenericCryptoKeys so that generic crypto fuzz tests can load appropriate keys. - Remove custom mutator from oemcrypto_generic_verify_fuzz because it provides minimal additional coverage. - Refresh affected corpus files. Merged from https://widevine-internal-review.googlesource.com/168557 Merged from https://widevine-internal-review.googlesource.com/171191 Merged from https://widevine-internal-review.googlesource.com/172170 Merged from https://widevine-internal-review.googlesource.com/172250 Change-Id: Ie676a36cbf4c12bdda9566fad3590a7b69168d9c
30 lines
1.1 KiB
C++
30 lines
1.1 KiB
C++
// Copyright 2020 Google LLC. All Rights Reserved. This file and proprietary
|
|
// source code may only be used and distributed under the Widevine
|
|
// License Agreement.
|
|
|
|
#include "oemcrypto_fuzz_helper.h"
|
|
|
|
extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) {
|
|
wvoec::RedirectStdoutToFile();
|
|
|
|
if (size < sizeof(ODK_ParsedLicense) + sizeof(wvoec::MessageData)) {
|
|
return 0;
|
|
}
|
|
wvoec::OEMCryptoLicenseAPIFuzz license_api_fuzz;
|
|
license_api_fuzz.Initialize();
|
|
license_api_fuzz.license_messages().SignAndVerifyRequest();
|
|
// Interpreting input fuzz data as unencrypted (core_response + license
|
|
// message data) from license server.
|
|
license_api_fuzz.license_messages().InjectFuzzedResponseData(data, size);
|
|
|
|
// Convert OEMCrypto_LicenseType in core_response to a valid enum value.
|
|
wvoec::ConvertDataToValidEnum(
|
|
OEMCrypto_LicenseType_MaxValue,
|
|
license_api_fuzz.license_messages().core_response().license_type);
|
|
|
|
license_api_fuzz.license_messages().EncryptAndSignResponse();
|
|
license_api_fuzz.license_messages().LoadResponse();
|
|
license_api_fuzz.Terminate();
|
|
return 0;
|
|
}
|