fuzz/brontide: random+static encrypt harnesses
This commit is contained in:
parent
468e5c03e9
commit
0be5660a2a
37
fuzz/brontide/random_init_encrypt.go
Normal file
37
fuzz/brontide/random_init_encrypt.go
Normal file
@ -0,0 +1,37 @@
|
||||
// +build gofuzz
|
||||
|
||||
package brontidefuzz
|
||||
|
||||
import (
|
||||
"bytes"
|
||||
"math"
|
||||
)
|
||||
|
||||
// Fuzz_random_init_encrypt is a go-fuzz harness that encrypts arbitrary data
|
||||
// with the initiator.
|
||||
func Fuzz_random_init_encrypt(data []byte) int {
|
||||
// Ensure that length of message is not greater than max allowed size.
|
||||
if len(data) > math.MaxUint16 {
|
||||
return 0
|
||||
}
|
||||
|
||||
// This will return brontide machines with random keys.
|
||||
initiator, responder := getBrontideMachines()
|
||||
|
||||
// Complete the brontide handshake.
|
||||
completeHandshake(initiator, responder)
|
||||
|
||||
var b bytes.Buffer
|
||||
|
||||
// Encrypt the message using WriteMessage w/ initiator machine.
|
||||
if err := initiator.WriteMessage(data); err != nil {
|
||||
nilAndPanic(initiator, responder, err)
|
||||
}
|
||||
|
||||
// Flush the encrypted message w/ initiator machine.
|
||||
if _, err := initiator.Flush(&b); err != nil {
|
||||
nilAndPanic(initiator, responder, err)
|
||||
}
|
||||
|
||||
return 1
|
||||
}
|
37
fuzz/brontide/random_resp_encrypt.go
Normal file
37
fuzz/brontide/random_resp_encrypt.go
Normal file
@ -0,0 +1,37 @@
|
||||
// +build gofuzz
|
||||
|
||||
package brontidefuzz
|
||||
|
||||
import (
|
||||
"bytes"
|
||||
"math"
|
||||
)
|
||||
|
||||
// Fuzz_random_resp_encrypt is a go-fuzz harness that encrypts arbitrary data
|
||||
// with the responder.
|
||||
func Fuzz_random_resp_encrypt(data []byte) int {
|
||||
// Ensure that length of message is not greater than max allowed size.
|
||||
if len(data) > math.MaxUint16 {
|
||||
return 0
|
||||
}
|
||||
|
||||
// This will return brontide machines with random keys.
|
||||
initiator, responder := getBrontideMachines()
|
||||
|
||||
// Complete the brontide handshake.
|
||||
completeHandshake(initiator, responder)
|
||||
|
||||
var b bytes.Buffer
|
||||
|
||||
// Encrypt the message using WriteMessage w/ responder machine.
|
||||
if err := responder.WriteMessage(data); err != nil {
|
||||
nilAndPanic(initiator, responder, err)
|
||||
}
|
||||
|
||||
// Flush the encrypted message w/ responder machine.
|
||||
if _, err := responder.Flush(&b); err != nil {
|
||||
nilAndPanic(initiator, responder, err)
|
||||
}
|
||||
|
||||
return 1
|
||||
}
|
37
fuzz/brontide/static_init_encrypt.go
Normal file
37
fuzz/brontide/static_init_encrypt.go
Normal file
@ -0,0 +1,37 @@
|
||||
// +build gofuzz
|
||||
|
||||
package brontidefuzz
|
||||
|
||||
import (
|
||||
"bytes"
|
||||
"math"
|
||||
)
|
||||
|
||||
// Fuzz_static_init_encrypt is a go-fuzz harness that encrypts arbitrary data
|
||||
// with the initiator.
|
||||
func Fuzz_static_init_encrypt(data []byte) int {
|
||||
// Ensure that length of message is not greater than max allowed size.
|
||||
if len(data) > math.MaxUint16 {
|
||||
return 0
|
||||
}
|
||||
|
||||
// This will return brontide machines with static keys.
|
||||
initiator, responder := getStaticBrontideMachines()
|
||||
|
||||
// Complete the brontide handshake.
|
||||
completeHandshake(initiator, responder)
|
||||
|
||||
var b bytes.Buffer
|
||||
|
||||
// Encrypt the message using WriteMessage w/ initiator machine.
|
||||
if err := initiator.WriteMessage(data); err != nil {
|
||||
nilAndPanic(initiator, responder, err)
|
||||
}
|
||||
|
||||
// Flush the encrypted message w/ initiator machine.
|
||||
if _, err := initiator.Flush(&b); err != nil {
|
||||
nilAndPanic(initiator, responder, err)
|
||||
}
|
||||
|
||||
return 1
|
||||
}
|
37
fuzz/brontide/static_resp_encrypt.go
Normal file
37
fuzz/brontide/static_resp_encrypt.go
Normal file
@ -0,0 +1,37 @@
|
||||
// +build gofuzz
|
||||
|
||||
package brontidefuzz
|
||||
|
||||
import (
|
||||
"bytes"
|
||||
"math"
|
||||
)
|
||||
|
||||
// Fuzz_static_resp_encrypt is a go-fuzz harness that encrypts arbitrary data
|
||||
// with the responder.
|
||||
func Fuzz_static_resp_encrypt(data []byte) int {
|
||||
// Ensure that length of message is not greater than max allowed size.
|
||||
if len(data) > math.MaxUint16 {
|
||||
return 0
|
||||
}
|
||||
|
||||
// This will return brontide machines with static keys.
|
||||
initiator, responder := getStaticBrontideMachines()
|
||||
|
||||
// Complete the brontide handshake.
|
||||
completeHandshake(initiator, responder)
|
||||
|
||||
var b bytes.Buffer
|
||||
|
||||
// Encrypt the message using WriteMessage w/ responder machine.
|
||||
if err := responder.WriteMessage(data); err != nil {
|
||||
nilAndPanic(initiator, responder, err)
|
||||
}
|
||||
|
||||
// Flush the encrypted message w/ responder machine.
|
||||
if _, err := responder.Flush(&b); err != nil {
|
||||
nilAndPanic(initiator, responder, err)
|
||||
}
|
||||
|
||||
return 1
|
||||
}
|
Loading…
Reference in New Issue
Block a user