libsoliton/soliton/fuzz/fuzz_targets/fuzz_ratchet_encrypt.rs
Kamal Tufekcic 1d99048c95
Some checks failed
CI / lint (push) Successful in 1m37s
CI / test-python (push) Successful in 1m49s
CI / test-zig (push) Successful in 1m39s
CI / test-wasm (push) Successful in 1m54s
CI / test (push) Successful in 14m44s
CI / miri (push) Successful in 14m18s
CI / build (push) Successful in 1m9s
CI / fuzz-regression (push) Successful in 9m9s
CI / publish (push) Failing after 1m10s
CI / publish-python (push) Failing after 1m46s
CI / publish-wasm (push) Has been cancelled
initial commit
Signed-off-by: Kamal Tufekcic <kamal@lo.sh>
2026-04-02 23:48:10 +03:00

19 lines
650 B
Rust

#![no_main]
#![allow(deprecated)]
use libfuzzer_sys::fuzz_target;
use soliton::ratchet::RatchetState;
fuzz_target!(|data: &[u8]| {
// Deserialize adversarial state, then encrypt.
// Exercises: ChainExhausted guard,
// perform_kem_ratchet_send (keygen + encaps + kdf_root),
// kdf_msg_key, nonce construction, AAD building, AEAD encrypt,
// and the session-fatal zeroize path on AEAD failure.
let Ok(mut state) = RatchetState::from_bytes(data) else {
return;
};
// Fixed plaintext — fingerprints are stored in the deserialized state,
// not passed as parameters.
let _ = state.encrypt(b"fuzz");
});