CommonCryptoUtilsFuzzer.java
// Copyright 2023 the cncf-fuzzing authors
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//
///////////////////////////////////////////////////////////////////////////
import com.code_intelligence.jazzer.api.FuzzedDataProvider;
import java.io.ByteArrayInputStream;
import java.io.IOException;
import java.math.BigInteger;
import java.security.KeyPair;
import java.security.GeneralSecurityException;
import java.security.cert.CertificateFactory;
import java.security.cert.X509Certificate;
import java.util.EnumSet;
import org.keycloak.common.util.CertificateUtils;
import org.keycloak.common.util.DerUtils;
import org.keycloak.common.util.KeyUtils;
import org.keycloak.common.util.KeystoreUtil;
import org.keycloak.common.util.PemUtils;
/**
* This fuzzer targets the methods in different crypto related
* util classes in the common package.
*/
public class CommonCryptoUtilsFuzzer {
public static void fuzzerTestOneInput(FuzzedDataProvider data) throws Exception {
X509Certificate cert = null;
KeyPair keyPair = null;
try {
CertificateFactory cf = CertificateFactory.getInstance("X.509");
// Randomly choose which utils method to invoke
Integer choice = data.consumeInt(1, 22);
switch (choice) {
case 1:
cert = (X509Certificate) cf.generateCertificate(
new ByteArrayInputStream(data.consumeBytes(data.remainingBytes() / 2)));
keyPair = KeyUtils.generateRsaKeyPair(2048);
CertificateUtils.generateV3Certificate(
keyPair, keyPair.getPrivate(), cert, data.consumeRemainingAsString());
break;
case 2:
keyPair = KeyUtils.generateRsaKeyPair(2048);
CertificateUtils.generateV1SelfSignedCertificate(
keyPair, data.consumeRemainingAsString());
break;
case 3:
keyPair = KeyUtils.generateRsaKeyPair(2048);
BigInteger serial = BigInteger.valueOf(data.consumeLong());
CertificateUtils.generateV1SelfSignedCertificate(
keyPair, data.consumeRemainingAsString(), serial);
break;
case 4:
DerUtils.decodePrivateKey(new ByteArrayInputStream(data.consumeRemainingAsBytes()));
break;
case 5:
DerUtils.decodePrivateKey(data.consumeRemainingAsBytes());
break;
case 6:
DerUtils.decodePublicKey(
data.consumeBytes(data.remainingBytes() / 2), data.consumeRemainingAsString());
break;
case 7:
DerUtils.decodeCertificate(new ByteArrayInputStream(data.consumeRemainingAsBytes()));
break;
case 8:
keyPair = KeyUtils.generateRsaKeyPair(2048);
KeyUtils.createKeyId(keyPair.getPrivate());
break;
case 9:
KeystoreUtil.loadKeyStore(
data.consumeString(data.remainingBytes() / 2), data.consumeRemainingAsString());
break;
case 10:
KeystoreUtil.loadKeyPairFromKeystore(data.consumeString(data.remainingBytes() / 2),
data.consumeString(data.remainingBytes() / 2),
data.consumeString(data.remainingBytes() / 2),
data.consumeString(data.remainingBytes() / 2),
data.pickValue(EnumSet.allOf(KeystoreUtil.KeystoreFormat.class)));
break;
case 11:
KeystoreUtil.getKeystoreType(data.consumeString(data.remainingBytes() / 2),
data.consumeString(data.remainingBytes() / 2), data.consumeRemainingAsString());
break;
case 12:
PemUtils.decodeCertificate(data.consumeRemainingAsString());
break;
case 13:
PemUtils.decodePublicKey(data.consumeRemainingAsString());
break;
case 14:
PemUtils.decodePublicKey(
data.consumeString(data.remainingBytes() / 2), data.consumeRemainingAsString());
break;
case 15:
PemUtils.decodePrivateKey(data.consumeRemainingAsString());
break;
case 16:
keyPair = KeyUtils.generateRsaKeyPair(2048);
PemUtils.encodeKey(keyPair.getPrivate());
break;
case 17:
cert = (X509Certificate) cf.generateCertificate(
new ByteArrayInputStream(data.consumeBytes(data.remainingBytes() / 2)));
PemUtils.encodeCertificate(cert);
break;
case 18:
PemUtils.pemToDer(data.consumeRemainingAsString());
break;
case 19:
PemUtils.removeBeginEnd(data.consumeRemainingAsString());
break;
case 20:
PemUtils.addPrivateKeyBeginEnd(data.consumeRemainingAsString());
break;
case 21:
PemUtils.addRsaPrivateKeyBeginEnd(data.consumeRemainingAsString());
break;
case 22:
String encoding = data.consumeString(data.remainingBytes() / 2);
String[] chain = {data.consumeRemainingAsString()};
PemUtils.generateThumbprint(chain, encoding);
break;
}
} catch (GeneralSecurityException | RuntimeException | IOException e) {
// Known exception
}
}
}