// Copyright 2018 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include #include #include #include "base/at_exit.h" #include "base/i18n/icu_util.h" #include "components/cbor/reader.h" #include "device/fido/authenticator_get_assertion_response.h" #include "device/fido/authenticator_get_info_response.h" #include "device/fido/authenticator_make_credential_response.h" #include "device/fido/ctap2_device_operation.h" #include "device/fido/ctap_get_assertion_request.h" #include "device/fido/device_response_converter.h" #include "device/fido/fido_transport_protocol.h" #include "device/fido/get_assertion_task.h" namespace device { // Creating a PublicKeyCredentialUserEntity from a CBOR value can involve URL // parsing, which relies on ICU for IDN handling. This is why ICU needs to be // initialized explicitly. // See: http://crbug/808412 struct IcuEnvironment { IcuEnvironment() { CHECK(base::i18n::InitializeICU()); } // Used by ICU integration. base::AtExitManager at_exit_manager; }; IcuEnvironment* env = new IcuEnvironment(); extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { cbor::Reader::Config config; config.allow_invalid_utf8 = true; std::vector input(data, data + size); base::Optional input_cbor = cbor::Reader::Read(input, config); if (input_cbor) { input_cbor = FixInvalidUTF8(std::move(*input_cbor), [](const std::vector& path) { return path.size() == 2; }); } std::array relying_party_id_hash = {}; auto response = device::ReadCTAPMakeCredentialResponse( FidoTransportProtocol::kUsbHumanInterfaceDevice, input_cbor); if (response) response->EraseAttestationStatement(AttestationObject::AAGUID::kErase); response = device::AuthenticatorMakeCredentialResponse:: CreateFromU2fRegisterResponse( FidoTransportProtocol::kUsbHumanInterfaceDevice, relying_party_id_hash, input); if (response) response->EraseAttestationStatement(AttestationObject::AAGUID::kErase); device::ReadCTAPGetAssertionResponse(input_cbor); std::vector u2f_response_data(data, data + size); std::vector key_handle(data, data + size); device::AuthenticatorGetAssertionResponse::CreateFromU2fSignResponse( relying_party_id_hash, u2f_response_data, key_handle); device::ReadCTAPGetInfoResponse(input); return 0; } } // namespace device