93 lines
		
	
	
		
			2.9 KiB
		
	
	
	
		
			Bash
		
	
	
		
			Executable File
		
	
	
			
		
		
	
	
			93 lines
		
	
	
		
			2.9 KiB
		
	
	
	
		
			Bash
		
	
	
		
			Executable File
		
	
	
| #!/bin/bash -eux
 | |
| #
 | |
| # Copyright 2018 Google Inc.
 | |
| #
 | |
| # Licensed under the Apache License, Version 2.0 (the "License");
 | |
| # you may not use this file except in compliance with the License.
 | |
| # You may obtain a copy of the License at
 | |
| #
 | |
| #      http://www.apache.org/licenses/LICENSE-2.0
 | |
| #
 | |
| # Unless required by applicable law or agreed to in writing, software
 | |
| # distributed under the License is distributed on an "AS IS" BASIS,
 | |
| # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
| # See the License for the specific language governing permissions and
 | |
| # limitations under the License.
 | |
| #
 | |
| ################################################################################
 | |
| 
 | |
| # Install Boost headers
 | |
| cd $SRC/
 | |
| tar jxf boost_1_74_0.tar.bz2
 | |
| cd boost_1_74_0/
 | |
| CFLAGS="" CXXFLAGS="" ./bootstrap.sh
 | |
| CFLAGS="" CXXFLAGS="" ./b2 headers
 | |
| cp -R boost/ /usr/include/
 | |
| 
 | |
| mkdir -p $WORK/libressl
 | |
| cd $WORK/libressl
 | |
| 
 | |
| CMAKE_DEFINES=""
 | |
| if [[ $CFLAGS = *sanitize=memory* ]]
 | |
| then
 | |
|   CMAKE_DEFINES+=" -DOPENSSL_NO_ASM=1"
 | |
| fi
 | |
| 
 | |
| cmake -DCMAKE_C_COMPILER=$CC -DCMAKE_CXX_COMPILER=$CXX \
 | |
|       -DCMAKE_C_FLAGS="$CFLAGS" -DCMAKE_CXX_FLAGS="$CXXFLAGS" \
 | |
|       $CMAKE_DEFINES $SRC/libressl/
 | |
| make -j$(nproc)
 | |
| 
 | |
| LIBRESSL_FUZZERS=$SRC/libressl.fuzzers
 | |
| fuzzerFiles=$(find $LIBRESSL_FUZZERS -name "*.c" | egrep -v 'driver.c|test-corpus.c')
 | |
| 
 | |
| find . -name "*.a"
 | |
| 
 | |
| $CC -c $CFLAGS \
 | |
|     -o $WORK/driver.o \
 | |
|     $LIBRESSL_FUZZERS/driver.c \
 | |
|     -I $SRC/libressl/include -I $SRC/libressl
 | |
| 
 | |
| for F in $fuzzerFiles; do
 | |
|   fuzzerName=$(basename $F .c)
 | |
|   echo "Building fuzzer $fuzzerName"
 | |
|   $CC -c $CFLAGS \
 | |
|       -o $WORK/${fuzzerName}.o \
 | |
|       $F -I $SRC/libressl/include -I $SRC/libressl
 | |
| 
 | |
|   $CXX $CXXFLAGS \
 | |
|       -o $OUT/${fuzzerName} -fsanitize-recover=address \
 | |
|       $WORK/driver.o $WORK/${fuzzerName}.o ./ssl/libssl.a ./crypto/libcrypto.a ./tls/libtls.a $LIB_FUZZING_ENGINE
 | |
| 
 | |
|   if [ -d "$LIBRESSL_FUZZERS/corpora/${fuzzerName}/" ]; then
 | |
|     zip -j $OUT/${fuzzerName}_seed_corpus.zip $LIBRESSL_FUZZERS/corpora/${fuzzerName}/*
 | |
|   fi
 | |
| done
 | |
| 
 | |
| cp $SRC/*.options $OUT/
 | |
| cp $LIBRESSL_FUZZERS/oids.txt $OUT/asn1.dict
 | |
| cp $LIBRESSL_FUZZERS/oids.txt $OUT/x509.dict
 | |
| 
 | |
| # Cryptofuzz
 | |
| cd $SRC/cryptofuzz/
 | |
| if [[ $CFLAGS = *sanitize=memory* ]]
 | |
| then
 | |
|     export CXXFLAGS="$CXXFLAGS -DMSAN"
 | |
| fi
 | |
| # Generate lookup tables
 | |
| python3 gen_repository.py
 | |
| # Compile Cryptofuzz LibreSSL module
 | |
| cd $SRC/cryptofuzz/modules/openssl
 | |
| OPENSSL_INCLUDE_PATH="$SRC/libressl/include" OPENSSL_LIBCRYPTO_A_PATH="$WORK/libressl/crypto/libcrypto.a" CXXFLAGS="$CXXFLAGS -DCRYPTOFUZZ_LIBRESSL" make
 | |
| # Compile Cryptofuzz
 | |
| cd $SRC/cryptofuzz/
 | |
| LIBFUZZER_LINK="$LIB_FUZZING_ENGINE" CXXFLAGS="$CXXFLAGS -DCRYPTOFUZZ_LIBRESSL -I $SRC/libressl/include" make -j$(nproc)
 | |
| # Generate dictionary
 | |
| ./generate_dict
 | |
| # Copy fuzzer
 | |
| cp $SRC/cryptofuzz/cryptofuzz $OUT/cryptofuzz
 | |
| # Copy dictionary
 | |
| cp $SRC/cryptofuzz/cryptofuzz-dict.txt $OUT/cryptofuzz.dict
 | |
| # Copy seed corpus
 | |
| cp $SRC/cryptofuzz-corpora/libressl_latest.zip $OUT/cryptofuzz_seed_corpus.zip
 |