You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
53 lines
2.1 KiB
53 lines
2.1 KiB
// Copyright 2021 Google LLC
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
//
|
|
////////////////////////////////////////////////////////////////////////////////
|
|
|
|
import com.code_intelligence.jazzer.api.FuzzedDataProvider;
|
|
import java.util.Base64;
|
|
|
|
public class ExampleValueProfileFuzzer {
|
|
private static String base64(byte[] input) {
|
|
return Base64.getEncoder().encodeToString(input);
|
|
}
|
|
|
|
private static long insecureEncrypt(long input) {
|
|
long key = 0xefe4eb93215cb6b0L;
|
|
return input ^ key;
|
|
}
|
|
|
|
public static void fuzzerTestOneInput(FuzzedDataProvider data) {
|
|
// Without -use_value_profile=1, the fuzzer gets stuck here as there is no direct correspondence
|
|
// between the input bytes and the compared string. With value profile, the fuzzer can guess the
|
|
// expected input byte by byte, which takes linear rather than exponential time.
|
|
if (base64(data.consumeBytes(6)).equals("SmF6emVy")) {
|
|
long[] plaintextBlocks = data.consumeLongs(2);
|
|
if (plaintextBlocks.length != 2)
|
|
return;
|
|
if (insecureEncrypt(plaintextBlocks[0]) == 0x9fc48ee64d3dc090L) {
|
|
// Without --fake_pcs (enabled by default with -use_value_profile=1), the fuzzer would get
|
|
// stuck here as the value profile information for long comparisons would not be able to
|
|
// distinguish between this comparison and the one above.
|
|
if (insecureEncrypt(plaintextBlocks[1]) == 0x888a82ff483ad9c2L) {
|
|
mustNeverBeCalled();
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
private static void mustNeverBeCalled() {
|
|
throw new IllegalStateException("mustNeverBeCalled has been called");
|
|
}
|
|
}
|