Add fuzzer for libcrypto_utils

Bug: 149857881
Test: Follow go/android-fuzzing to build and test

Change-Id: Ic943f5a635545f5952e5d56969099593250b6ac9
diff --git a/fuzzing/system_fuzzers/libcrypto_utils/Android.bp b/fuzzing/system_fuzzers/libcrypto_utils/Android.bp
new file mode 100644
index 0000000..4214b35
--- /dev/null
+++ b/fuzzing/system_fuzzers/libcrypto_utils/Android.bp
@@ -0,0 +1,17 @@
+cc_fuzz {
+    host_supported: true,
+    name : "libcrypto_utils_fuzzer",
+    srcs: [
+        "libcrypto_utils_fuzzer.cpp",
+    ],
+    cflags: [
+        "-Wall",
+        "-Werror",
+        "-Wextra",
+    ],
+    shared_libs: [
+        "libcrypto_utils",
+        "libcrypto",
+    ],
+}
+
diff --git a/fuzzing/system_fuzzers/libcrypto_utils/libcrypto_utils_fuzzer.cpp b/fuzzing/system_fuzzers/libcrypto_utils/libcrypto_utils_fuzzer.cpp
new file mode 100644
index 0000000..b14086d
--- /dev/null
+++ b/fuzzing/system_fuzzers/libcrypto_utils/libcrypto_utils_fuzzer.cpp
@@ -0,0 +1,65 @@
+/*
+ * Copyright 2020 The Android Open Source Project
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ *      http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+#include <crypto_utils/android_pubkey.h>
+#include <fuzzer/FuzzedDataProvider.h>
+#include <string.h>
+#include <memory>
+#include <openssl/obj_mac.h>
+#include <openssl/rsa.h>
+#include <cstdio>
+
+#define ANDROID_PUBKEY_MODULUS_SIZE_WORDS (ANDROID_PUBKEY_MODULUS_SIZE / 4)
+
+extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, std::size_t size) {
+    if (size < 2050) {
+        return 0;
+    }
+
+    FuzzedDataProvider fdp(data, size);
+
+    uint8_t buffer[ANDROID_PUBKEY_ENCODED_SIZE];
+    uint32_t modulus_size_words = ANDROID_PUBKEY_MODULUS_SIZE_WORDS;
+    memcpy(buffer, &modulus_size_words, sizeof(uint32_t));
+
+    uint32_t n0inv = fdp.ConsumeIntegralInRange<uint32_t>(0,2^32);
+    memcpy(buffer+sizeof(uint32_t), &n0inv, sizeof(uint32_t));
+
+    std::string s = fdp.ConsumeBytesAsString(ANDROID_PUBKEY_MODULUS_SIZE);
+    uint8_t* modulus = (uint8_t*)s.c_str();
+    memcpy(buffer+sizeof(uint32_t)*2, modulus,
+           sizeof(uint8_t)*ANDROID_PUBKEY_MODULUS_SIZE);
+
+    std::string ss = fdp.ConsumeBytesAsString(ANDROID_PUBKEY_MODULUS_SIZE);
+    uint8_t* rr = (uint8_t*)ss.c_str();
+    memcpy(buffer+sizeof(uint32_t)*2+ANDROID_PUBKEY_MODULUS_SIZE, rr,
+           sizeof(uint8_t)*ANDROID_PUBKEY_MODULUS_SIZE);
+
+    int flip = fdp.ConsumeIntegralInRange<uint32_t>(0,1);
+    buffer[ANDROID_PUBKEY_ENCODED_SIZE-1] = (uint8_t)(flip == 0 ? 3 : 65537);
+
+    RSA* new_key = nullptr;
+    android_pubkey_decode(buffer, sizeof(uint8_t)*ANDROID_PUBKEY_ENCODED_SIZE, &new_key);
+
+    uint8_t key_data[ANDROID_PUBKEY_ENCODED_SIZE];
+    android_pubkey_encode(new_key, key_data, sizeof(key_data));
+
+    assert(0 == memcmp(buffer, key_data, sizeof(buffer)));
+
+    RSA_free(new_key);
+
+    return 0;
+}