blob: a1310eb1522fda08f8aba562c2c8221f31d4aa3b [file] [log] [blame]
// Copyright 2021 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include <stddef.h>
#include <stdint.h>
#include <string>
#include <vector>
#include <fuzzer/FuzzedDataProvider.h>
#include "extensions/common/csp_validator.h"
#include "extensions/common/install_warning.h"
#include "third_party/icu/fuzzers/fuzzer_utils.h"
namespace extensions {
namespace {
// Performs common initialization that's shared between all runs.
struct Environment {
IcuEnvironment icu_environment;
};
} // namespace
extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) {
static Environment env;
const size_t kMaxSize = 10000;
if (size > kMaxSize) {
// Bail out if the input is too big (the exact limit is arbitrary), to avoid
// going out of memory when the CSP validator produces many warnings.
return 0;
}
FuzzedDataProvider fuzzed_data_provider(data, size);
const std::string content_security_policy =
fuzzed_data_provider.ConsumeRandomLengthString();
const std::string manifest_key =
fuzzed_data_provider.ConsumeRandomLengthString();
std::vector<InstallWarning> install_warnings;
csp_validator::SanitizeContentSecurityPolicy(
content_security_policy, manifest_key,
/*options=*/fuzzed_data_provider.ConsumeIntegralInRange(0, 4),
&install_warnings);
csp_validator::GetSandboxedPageCSPDisallowingRemoteSources(
content_security_policy, manifest_key, &install_warnings);
std::u16string error;
csp_validator::DoesCSPDisallowRemoteCode(content_security_policy,
manifest_key, &error);
return 0;
}
} // namespace extensions