Skip to content

Commit 1db0be8

Browse files
committed
Merge bitcoin/bitcoin#28263: Add fuzz test for FSChaCha20Poly1305, AEADChacha20Poly1305
8607773 Add fuzz test for FSChaCha20Poly1305 (stratospher) c807f33 Add fuzz test for AEADChacha20Poly1305 (stratospher) Pull request description: This PR adds fuzz tests for `AEADChaCha20Poly1305` and `FSChaCha20Poly1305` introduced in #28008. Run using: ``` $ FUZZ=crypto_aeadchacha20poly1305 src/test/fuzz/fuzz $ FUZZ=crypto_fschacha20poly1305 src/test/fuzz/fuzz ``` ACKs for top commit: dergoegge: tACK 8607773 marcofleon: Tested ACK 8607773. Ran both targets for ~200 CPU hours. Coverage of intended targets looks good to me. The simulation of damaged keys and checks that follow seem useful as well. Tree-SHA512: b6b85661d896e653caeed330f941fde665fc2bbd97ecd340808a3f365c469fe9134aa77316569a771dc36d1158cac1a5f76700bcfc45fff12aef07562e48feb9
2 parents 5f538f2 + 8607773 commit 1db0be8

File tree

2 files changed

+201
-0
lines changed

2 files changed

+201
-0
lines changed

src/Makefile.test.include

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -309,6 +309,7 @@ test_fuzz_fuzz_SOURCES = \
309309
test/fuzz/crypto_aes256.cpp \
310310
test/fuzz/crypto_aes256cbc.cpp \
311311
test/fuzz/crypto_chacha20.cpp \
312+
test/fuzz/crypto_chacha20poly1305.cpp \
312313
test/fuzz/crypto_common.cpp \
313314
test/fuzz/crypto_diff_fuzz_chacha20.cpp \
314315
test/fuzz/crypto_hkdf_hmac_sha256_l32.cpp \
Lines changed: 200 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,200 @@
1+
// Copyright (c) 2020-2021 The Bitcoin Core developers
2+
// Distributed under the MIT software license, see the accompanying
3+
// file COPYING or http://www.opensource.org/licenses/mit-license.php.
4+
5+
#include <crypto/chacha20poly1305.h>
6+
#include <random.h>
7+
#include <span.h>
8+
#include <test/fuzz/FuzzedDataProvider.h>
9+
#include <test/fuzz/fuzz.h>
10+
#include <test/fuzz/util.h>
11+
12+
#include <cstddef>
13+
#include <cstdint>
14+
#include <vector>
15+
16+
constexpr static inline void crypt_till_rekey(FSChaCha20Poly1305& aead, int rekey_interval, bool encrypt)
17+
{
18+
for (int i = 0; i < rekey_interval; ++i) {
19+
std::byte dummy_tag[FSChaCha20Poly1305::EXPANSION] = {{}};
20+
if (encrypt) {
21+
aead.Encrypt(Span{dummy_tag}.first(0), Span{dummy_tag}.first(0), dummy_tag);
22+
} else {
23+
aead.Decrypt(dummy_tag, Span{dummy_tag}.first(0), Span{dummy_tag}.first(0));
24+
}
25+
}
26+
}
27+
28+
FUZZ_TARGET(crypto_aeadchacha20poly1305)
29+
{
30+
FuzzedDataProvider provider{buffer.data(), buffer.size()};
31+
32+
auto key = provider.ConsumeBytes<std::byte>(32);
33+
key.resize(32);
34+
AEADChaCha20Poly1305 aead(key);
35+
36+
// Initialize RNG deterministically, to generate contents and AAD. We assume that there are no
37+
// (potentially buggy) edge cases triggered by specific values of contents/AAD, so we can avoid
38+
// reading the actual data for those from the fuzzer input (which would need large amounts of
39+
// data).
40+
InsecureRandomContext rng(provider.ConsumeIntegral<uint64_t>());
41+
42+
LIMITED_WHILE(provider.ConsumeBool(), 10000)
43+
{
44+
// Mode:
45+
// - Bit 0: whether to use single-plain Encrypt/Decrypt; otherwise use a split at prefix.
46+
// - Bit 2: whether this ciphertext will be corrupted (making it the last sent one)
47+
// - Bit 3-4: controls the maximum aad length (max 511 bytes)
48+
// - Bit 5-7: controls the maximum content length (max 16383 bytes, for performance reasons)
49+
unsigned mode = provider.ConsumeIntegral<uint8_t>();
50+
bool use_splits = mode & 1;
51+
bool damage = mode & 4;
52+
unsigned aad_length_bits = 3 * ((mode >> 3) & 3);
53+
unsigned aad_length = provider.ConsumeIntegralInRange<unsigned>(0, (1 << aad_length_bits) - 1);
54+
unsigned length_bits = 2 * ((mode >> 5) & 7);
55+
unsigned length = provider.ConsumeIntegralInRange<unsigned>(0, (1 << length_bits) - 1);
56+
// Generate aad and content.
57+
auto aad = rng.randbytes<std::byte>(aad_length);
58+
auto plain = rng.randbytes<std::byte>(length);
59+
std::vector<std::byte> cipher(length + AEADChaCha20Poly1305::EXPANSION);
60+
// Generate nonce
61+
AEADChaCha20Poly1305::Nonce96 nonce = {(uint32_t)rng(), rng()};
62+
63+
if (use_splits && length > 0) {
64+
size_t split_index = provider.ConsumeIntegralInRange<size_t>(1, length);
65+
aead.Encrypt(Span{plain}.first(split_index), Span{plain}.subspan(split_index), aad, nonce, cipher);
66+
} else {
67+
aead.Encrypt(plain, aad, nonce, cipher);
68+
}
69+
70+
// Test Keystream output
71+
std::vector<std::byte> keystream(length);
72+
aead.Keystream(nonce, keystream);
73+
for (size_t i = 0; i < length; ++i) {
74+
assert((plain[i] ^ keystream[i]) == cipher[i]);
75+
}
76+
77+
std::vector<std::byte> decrypted_contents(length);
78+
bool ok{false};
79+
80+
// damage the key
81+
unsigned key_position = provider.ConsumeIntegralInRange<unsigned>(0, 31);
82+
std::byte damage_val{(uint8_t)(1U << (key_position & 7))};
83+
std::vector<std::byte> bad_key = key;
84+
bad_key[key_position] ^= damage_val;
85+
86+
AEADChaCha20Poly1305 bad_aead(bad_key);
87+
ok = bad_aead.Decrypt(cipher, aad, nonce, decrypted_contents);
88+
assert(!ok);
89+
90+
// Optionally damage 1 bit in either the cipher (corresponding to a change in transit)
91+
// or the aad (to make sure that decryption will fail if the AAD mismatches).
92+
if (damage) {
93+
unsigned damage_bit = provider.ConsumeIntegralInRange<unsigned>(0, (cipher.size() + aad.size()) * 8U - 1U);
94+
unsigned damage_pos = damage_bit >> 3;
95+
std::byte damage_val{(uint8_t)(1U << (damage_bit & 7))};
96+
if (damage_pos >= cipher.size()) {
97+
aad[damage_pos - cipher.size()] ^= damage_val;
98+
} else {
99+
cipher[damage_pos] ^= damage_val;
100+
}
101+
}
102+
103+
if (use_splits && length > 0) {
104+
size_t split_index = provider.ConsumeIntegralInRange<size_t>(1, length);
105+
ok = aead.Decrypt(cipher, aad, nonce, Span{decrypted_contents}.first(split_index), Span{decrypted_contents}.subspan(split_index));
106+
} else {
107+
ok = aead.Decrypt(cipher, aad, nonce, decrypted_contents);
108+
}
109+
110+
// Decryption *must* fail if the packet was damaged, and succeed if it wasn't.
111+
assert(!ok == damage);
112+
if (!ok) break;
113+
assert(decrypted_contents == plain);
114+
}
115+
}
116+
117+
FUZZ_TARGET(crypto_fschacha20poly1305)
118+
{
119+
FuzzedDataProvider provider{buffer.data(), buffer.size()};
120+
121+
uint32_t rekey_interval = provider.ConsumeIntegralInRange<size_t>(32, 512);
122+
auto key = provider.ConsumeBytes<std::byte>(32);
123+
key.resize(32);
124+
FSChaCha20Poly1305 enc_aead(key, rekey_interval);
125+
FSChaCha20Poly1305 dec_aead(key, rekey_interval);
126+
127+
// Initialize RNG deterministically, to generate contents and AAD. We assume that there are no
128+
// (potentially buggy) edge cases triggered by specific values of contents/AAD, so we can avoid
129+
// reading the actual data for those from the fuzzer input (which would need large amounts of
130+
// data).
131+
InsecureRandomContext rng(provider.ConsumeIntegral<uint64_t>());
132+
133+
LIMITED_WHILE(provider.ConsumeBool(), 10000)
134+
{
135+
// Mode:
136+
// - Bit 0: whether to use single-plain Encrypt/Decrypt; otherwise use a split at prefix.
137+
// - Bit 2: whether this ciphertext will be corrupted (making it the last sent one)
138+
// - Bit 3-4: controls the maximum aad length (max 511 bytes)
139+
// - Bit 5-7: controls the maximum content length (max 16383 bytes, for performance reasons)
140+
unsigned mode = provider.ConsumeIntegral<uint8_t>();
141+
bool use_splits = mode & 1;
142+
bool damage = mode & 4;
143+
unsigned aad_length_bits = 3 * ((mode >> 3) & 3);
144+
unsigned aad_length = provider.ConsumeIntegralInRange<unsigned>(0, (1 << aad_length_bits) - 1);
145+
unsigned length_bits = 2 * ((mode >> 5) & 7);
146+
unsigned length = provider.ConsumeIntegralInRange<unsigned>(0, (1 << length_bits) - 1);
147+
// Generate aad and content.
148+
auto aad = rng.randbytes<std::byte>(aad_length);
149+
auto plain = rng.randbytes<std::byte>(length);
150+
std::vector<std::byte> cipher(length + FSChaCha20Poly1305::EXPANSION);
151+
152+
crypt_till_rekey(enc_aead, rekey_interval, true);
153+
if (use_splits && length > 0) {
154+
size_t split_index = provider.ConsumeIntegralInRange<size_t>(1, length);
155+
enc_aead.Encrypt(Span{plain}.first(split_index), Span{plain}.subspan(split_index), aad, cipher);
156+
} else {
157+
enc_aead.Encrypt(plain, aad, cipher);
158+
}
159+
160+
std::vector<std::byte> decrypted_contents(length);
161+
bool ok{false};
162+
163+
// damage the key
164+
unsigned key_position = provider.ConsumeIntegralInRange<unsigned>(0, 31);
165+
std::byte damage_val{(uint8_t)(1U << (key_position & 7))};
166+
std::vector<std::byte> bad_key = key;
167+
bad_key[key_position] ^= damage_val;
168+
169+
FSChaCha20Poly1305 bad_fs_aead(bad_key, rekey_interval);
170+
crypt_till_rekey(bad_fs_aead, rekey_interval, false);
171+
ok = bad_fs_aead.Decrypt(cipher, aad, decrypted_contents);
172+
assert(!ok);
173+
174+
// Optionally damage 1 bit in either the cipher (corresponding to a change in transit)
175+
// or the aad (to make sure that decryption will fail if the AAD mismatches).
176+
if (damage) {
177+
unsigned damage_bit = provider.ConsumeIntegralInRange<unsigned>(0, (cipher.size() + aad.size()) * 8U - 1U);
178+
unsigned damage_pos = damage_bit >> 3;
179+
std::byte damage_val{(uint8_t)(1U << (damage_bit & 7))};
180+
if (damage_pos >= cipher.size()) {
181+
aad[damage_pos - cipher.size()] ^= damage_val;
182+
} else {
183+
cipher[damage_pos] ^= damage_val;
184+
}
185+
}
186+
187+
crypt_till_rekey(dec_aead, rekey_interval, false);
188+
if (use_splits && length > 0) {
189+
size_t split_index = provider.ConsumeIntegralInRange<size_t>(1, length);
190+
ok = dec_aead.Decrypt(cipher, aad, Span{decrypted_contents}.first(split_index), Span{decrypted_contents}.subspan(split_index));
191+
} else {
192+
ok = dec_aead.Decrypt(cipher, aad, decrypted_contents);
193+
}
194+
195+
// Decryption *must* fail if the packet was damaged, and succeed if it wasn't.
196+
assert(!ok == damage);
197+
if (!ok) break;
198+
assert(decrypted_contents == plain);
199+
}
200+
}

0 commit comments

Comments
 (0)