blob: c3abf101dde310b8dddc725282173c0b65c03995 [file] [log] [blame]
// Copyright 2018 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include <stddef.h>
#include <stdint.h>
#include <vector>
#include "base/at_exit.h"
#include "base/i18n/icu_util.h"
#include "device/fido/authenticator_get_assertion_response.h"
#include "device/fido/authenticator_get_info_response.h"
#include "device/fido/authenticator_make_credential_response.h"
#include "device/fido/device_response_converter.h"
#include "device/fido/fido_transport_protocol.h"
namespace device {
// Creating a PublicKeyCredentialUserEntity from a CBOR value can involve URL
// parsing, which relies on ICU for IDN handling. This is why ICU needs to be
// initialized explicitly.
// See: http://crbug/808412
struct IcuEnvironment {
IcuEnvironment() { CHECK(base::i18n::InitializeICU()); }
// Used by ICU integration.
base::AtExitManager at_exit_manager;
};
IcuEnvironment* env = new IcuEnvironment();
extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) {
std::vector<uint8_t> input(data, data + size);
std::array<uint8_t, 32> relying_party_id_hash = {};
auto response = device::ReadCTAPMakeCredentialResponse(
FidoTransportProtocol::kUsbHumanInterfaceDevice, input);
if (response)
response->EraseAttestationStatement(AttestationObject::AAGUID::kErase);
response = device::AuthenticatorMakeCredentialResponse::
CreateFromU2fRegisterResponse(
FidoTransportProtocol::kUsbHumanInterfaceDevice,
relying_party_id_hash, input);
if (response)
response->EraseAttestationStatement(AttestationObject::AAGUID::kErase);
device::ReadCTAPGetAssertionResponse(input);
std::vector<uint8_t> u2f_response_data(data, data + size);
std::vector<uint8_t> key_handle(data, data + size);
device::AuthenticatorGetAssertionResponse::CreateFromU2fSignResponse(
relying_party_id_hash, u2f_response_data, key_handle);
device::ReadCTAPGetInfoResponse(input);
return 0;
}
} // namespace device