Sync pki to chromium ce4bc9571462aa298d79b591df9d997323cf5157
Bug: chromium:1322914
Change-Id: Ic5a1349013bcfb279e5fee9f9838c63558d663b7
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/63025
Auto-Submit: Bob Beck <bbe@google.com>
Commit-Queue: Bob Beck <bbe@google.com>
Reviewed-by: David Benjamin <davidben@google.com>
diff --git a/fuzz/CMakeLists.txt b/fuzz/CMakeLists.txt
index 3905f55..adf7aa5 100644
--- a/fuzz/CMakeLists.txt
+++ b/fuzz/CMakeLists.txt
@@ -36,6 +36,7 @@
fuzzer(ocsp_parse_ocsp_single_response_fuzzer pki)
fuzzer(parse_authority_key_identifier_fuzzer pki)
fuzzer(parse_certificate_fuzzer pki)
+fuzzer(parse_crldp_fuzzer pki)
fuzzer(pkcs12)
fuzzer(pkcs8)
fuzzer(privkey)
diff --git a/fuzz/parse_crldp_fuzzer.cc b/fuzz/parse_crldp_fuzzer.cc
new file mode 100644
index 0000000..ebf3ba2
--- /dev/null
+++ b/fuzz/parse_crldp_fuzzer.cc
@@ -0,0 +1,24 @@
+// Copyright 2023 The Chromium Authors
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#include <stddef.h>
+#include <stdint.h>
+
+#include "../pki/parse_certificate.h"
+#include "../pki/input.h"
+#include <openssl/base.h>
+
+extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) {
+ std::vector<bssl::ParsedDistributionPoint> distribution_points;
+
+ bool success = ParseCrlDistributionPoints(bssl::der::Input(data, size),
+ &distribution_points);
+
+ if (success) {
+ // A valid CRLDistributionPoints must have at least 1 element.
+ BSSL_CHECK(!distribution_points.empty());
+ }
+
+ return 0;
+}
diff --git a/fuzz/parse_crldp_fuzzer_corpus/crldp_issuer_as_dirname.der b/fuzz/parse_crldp_fuzzer_corpus/crldp_issuer_as_dirname.der
new file mode 100644
index 0000000..26241d2
--- /dev/null
+++ b/fuzz/parse_crldp_fuzzer_corpus/crldp_issuer_as_dirname.der
@@ -0,0 +1,3 @@
+0â0ß ¤0}10 UUS10U
+Test Certificates 20111"0 UindirectCRL CA3 cRLIssuer1)0'U indirect CRL for indirectCRL CA3¢V¤T0R10 UUS10U
+Test Certificates 20111"0 UindirectCRL CA3 cRLIssuer
\ No newline at end of file
diff --git a/fuzz/parse_crldp_fuzzer_corpus/relative_name_and_reasons_and_multiple_dps.der b/fuzz/parse_crldp_fuzzer_corpus/relative_name_and_reasons_and_multiple_dps.der
new file mode 100644
index 0000000..c81bcf3
--- /dev/null
+++ b/fuzz/parse_crldp_fuzzer_corpus/relative_name_and_reasons_and_multiple_dps.der
Binary files differ