File: csp_fuzzer.cpp

package info (click to toggle)
firefox 147.0-1
  • links: PTS, VCS
  • area: main
  • in suites: sid
  • size: 4,683,324 kB
  • sloc: cpp: 7,607,156; javascript: 6,532,492; ansic: 3,775,158; python: 1,415,368; xml: 634,556; asm: 438,949; java: 186,241; sh: 62,751; makefile: 18,079; objc: 13,092; perl: 12,808; yacc: 4,583; cs: 3,846; pascal: 3,448; lex: 1,720; ruby: 1,003; php: 436; lisp: 258; awk: 247; sql: 66; sed: 54; csh: 10; exp: 6
file content (41 lines) | stat: -rw-r--r-- 1,432 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
/* vim: set ts=8 sts=2 et sw=2 tw=80: */
/* This Source Code Form is subject to the terms of the Mozilla Public
 * License, v. 2.0. If a copy of the MPL was not distributed with this
 * file, You can obtain one at https://mozilla.org/MPL/2.0/. */

#include "FuzzingInterface.h"
#include "mozilla/BasePrincipal.h"
#include "nsCSPContext.h"
#include "nsComponentManagerUtils.h"
#include "nsNetUtil.h"
#include "nsStringFwd.h"

static int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) {
  nsresult ret;
  nsCOMPtr<nsIURI> selfURI;
  ret = NS_NewURI(getter_AddRefs(selfURI), "http://selfuri.com");
  if (ret != NS_OK) return 0;

  mozilla::OriginAttributes attrs;
  nsCOMPtr<nsIPrincipal> selfURIPrincipal =
      mozilla::BasePrincipal::CreateContentPrincipal(selfURI, attrs);
  if (!selfURIPrincipal) return 0;

  nsCOMPtr<nsIContentSecurityPolicy> csp =
      do_CreateInstance(NS_CSPCONTEXT_CONTRACTID, &ret);
  if (ret != NS_OK) return 0;

  ret =
      csp->SetRequestContextWithPrincipal(selfURIPrincipal, selfURI, ""_ns, 0);
  if (ret != NS_OK) return 0;

  NS_ConvertASCIItoUTF16 policy(reinterpret_cast<const char*>(data), size);
  if (!policy.get()) return 0;
  csp->AppendPolicy(policy, false, false);

  return 0;
}

MOZ_FUZZING_INTERFACE_RAW(nullptr, LLVMFuzzerTestOneInput,
                          ContentSecurityPolicyParser);