/src/cryptofuzz/modules/wolfcrypt/bn_helper.cpp
Line | Count | Source (jump to first uncovered line) |
1 | | #include "bn_ops.h" |
2 | | #include <iostream> |
3 | | |
4 | | namespace cryptofuzz { |
5 | | namespace module { |
6 | | |
7 | | namespace wolfCrypt_detail { |
8 | | #if defined(CRYPTOFUZZ_WOLFCRYPT_ALLOCATION_FAILURES) |
9 | | extern bool disableAllocationFailures; |
10 | | extern bool haveAllocFailure; |
11 | | #endif |
12 | | } /* namespace wolfCrypt_detail */ |
13 | | |
14 | | namespace wolfCrypt_bignum { |
15 | | |
16 | 32.1k | Bignum::read_radix_error_t Bignum::read_radix(mp_int* dest, const std::string& str, const size_t base) { |
17 | 32.1k | return read_radix(dest, str.c_str(), base); |
18 | 32.1k | } |
19 | | |
20 | 32.2k | Bignum::read_radix_error_t Bignum::read_radix(mp_int* dest, const char* str, const size_t base) { |
21 | 32.2k | Bignum::read_radix_error_t ret; |
22 | | |
23 | | /* Create a temporary variable for storing the result of mp_read_radix, |
24 | | * because if mp_read_radix fails (e.g. due to allocation failure), |
25 | | * it will set the value of the destination variable to 0. |
26 | | * |
27 | | * See OSS-Fuzz 31709 / ZD 11834 for discussion. */ |
28 | 32.2k | auto newMp = (mp_int*)util::malloc(sizeof(mp_int)); |
29 | 32.2k | if ( mp_init(newMp) != MP_OKAY ) { |
30 | 0 | util::free(newMp); |
31 | 0 | return READ_RADIX_FAIL_MEMORY; |
32 | 0 | } |
33 | | |
34 | 32.2k | wolfCrypt_detail::haveAllocFailure = false; |
35 | 32.2k | if ( mp_read_radix(newMp, str, base) != MP_OKAY ) { |
36 | 845 | ret = wolfCrypt_detail::haveAllocFailure ? READ_RADIX_FAIL_MEMORY : READ_RADIX_FAIL_OTHER; |
37 | 845 | goto end; |
38 | 845 | } |
39 | | |
40 | 31.3k | wolfCrypt_detail::haveAllocFailure = false; |
41 | 31.3k | if ( mp_copy(newMp, dest) != MP_OKAY ) { |
42 | 496 | ret = wolfCrypt_detail::haveAllocFailure ? READ_RADIX_FAIL_MEMORY : READ_RADIX_FAIL_OTHER; |
43 | 496 | goto end; |
44 | 496 | } |
45 | | |
46 | 30.8k | ret = READ_RADIX_OK; |
47 | | |
48 | 32.2k | end: |
49 | 32.2k | CF_NORET(mp_clear(newMp)); |
50 | 32.2k | util::free(newMp); |
51 | | |
52 | 32.2k | return ret; |
53 | 30.8k | } |
54 | | |
55 | 4.89k | void Bignum::baseConversion(void) const { |
56 | 4.89k | #if !defined(WOLFSSL_SP_MATH) |
57 | 4.89k | uint8_t base = 2; |
58 | 4.89k | char* str = nullptr; |
59 | | |
60 | 4.89k | try { base = ds.Get<uint8_t>(); } catch ( fuzzing::datasource::Datasource::OutOfData ) { } |
61 | | |
62 | | #if defined(CRYPTOFUZZ_WOLFCRYPT_DEBUG) |
63 | | std::cout << "Convert to base " << std::to_string(base) << " and back" << std::endl; |
64 | | #endif |
65 | 4.89k | { |
66 | 4.89k | int size; |
67 | 4.89k | CF_CHECK_EQ(mp_radix_size(mp, base, &size), MP_OKAY); |
68 | 69 | CF_ASSERT(size > 0, "Output of mp_radix_size is 0 or less"); |
69 | | |
70 | 69 | str = (char*)util::malloc(size); |
71 | | |
72 | 69 | #if defined(WOLFSSL_SP_MATH) || defined(WOLFSSL_SP_MATH_ALL) || !defined(USE_FAST_MATH) |
73 | 69 | CF_CHECK_EQ(mp_toradix(mp, str, base), MP_OKAY); |
74 | | #else |
75 | | wolfCrypt_detail::haveAllocFailure = false; |
76 | | CF_ASSERT( |
77 | | mp_toradix(mp, str, base) == MP_OKAY || |
78 | | wolfCrypt_detail::haveAllocFailure || |
79 | | base < 2 || |
80 | | base > 64, |
81 | | "wolfCrypt cannot convert mp to string"); |
82 | | |
83 | | /* If allocation failure occurred, then do not use 'str' */ |
84 | | CF_CHECK_FALSE(wolfCrypt_detail::haveAllocFailure); |
85 | | #endif |
86 | | |
87 | 54 | { |
88 | 54 | const auto ret = read_radix(mp, str, base); |
89 | 54 | CF_ASSERT(ret == READ_RADIX_OK || ret == READ_RADIX_FAIL_MEMORY, "wolfCrypt cannot parse the output of mp_toradix"); |
90 | 54 | } |
91 | 54 | } |
92 | | |
93 | 4.89k | end: |
94 | 4.89k | util::free(str); |
95 | 4.89k | #endif |
96 | 4.89k | } |
97 | | |
98 | 4.65k | void Bignum::binaryConversion(void) const { |
99 | 4.65k | uint8_t* data = nullptr; |
100 | 4.65k | CF_CHECK_EQ(mp_isneg(mp), 0); |
101 | | |
102 | | #if LIBWOLFSSL_VERSION_HEX == 0x05005001 |
103 | | { |
104 | | /* Old version of the binary conversion logic, which doesn't crash if |
105 | | * mp_to_unsigned_bin_len() succeeds with an undersized buffer. |
106 | | * |
107 | | * This logic is retained specifically to prevent the libecc |
108 | | * OSS-Fuzz fuzzer from crashing, because this uses an older version |
109 | | * of wolfCrypt (specifically 0x05005001), which still has the |
110 | | * mp_to_unsigned_bin_len() bug. |
111 | | */ |
112 | | |
113 | | const auto size = mp_unsigned_bin_size(mp); |
114 | | CF_ASSERT(size >= 0, "mp_unsigned_bin_size returned negative value"); |
115 | | |
116 | | data = util::malloc(size); |
117 | | CF_CHECK_EQ(mp_to_unsigned_bin_len(mp, data, size), MP_OKAY); |
118 | | |
119 | | /* Ensure no allocation failure occurs in mp_read_unsigned_bin |
120 | | * because this can leave the mp in a corrupted state |
121 | | */ |
122 | | const auto cached_disableAllocationFailures = wolfCrypt_detail::disableAllocationFailures; |
123 | | wolfCrypt_detail::disableAllocationFailures = true; |
124 | | |
125 | | CF_ASSERT(mp_read_unsigned_bin(mp, data, size) == MP_OKAY, "Cannot parse output of mp_to_unsigned_bin_len"); |
126 | | |
127 | | wolfCrypt_detail::disableAllocationFailures = cached_disableAllocationFailures; |
128 | | } |
129 | | #else |
130 | 4.65k | { |
131 | 4.65k | bool randomSize = false; |
132 | | |
133 | 4.65k | try { randomSize = ds.Get<bool>(); } catch ( fuzzing::datasource::Datasource::OutOfData ) { } |
134 | | |
135 | 4.65k | size_t size = 0; |
136 | 4.65k | int numBits = 0; |
137 | | |
138 | 4.65k | if ( randomSize == false ) { |
139 | 2.35k | const auto size2 = mp_unsigned_bin_size(mp); |
140 | 2.35k | CF_ASSERT(size2 >= 0, "mp_unsigned_bin_size returned negative value"); |
141 | 2.35k | size = size2; |
142 | 2.35k | } else { |
143 | 2.30k | try { |
144 | 2.30k | size = ds.Get<uint16_t>(); |
145 | 2.30k | } catch ( fuzzing::datasource::Datasource::OutOfData ) { } |
146 | | |
147 | 2.30k | numBits = mp_count_bits(mp); |
148 | 2.30k | CF_ASSERT(numBits >= 0, "mp_count_bits result is negative"); |
149 | 2.30k | } |
150 | | |
151 | 4.65k | data = util::malloc(size); |
152 | 4.65k | CF_CHECK_EQ(mp_to_unsigned_bin_len(mp, data, size), MP_OKAY); |
153 | | |
154 | 4.18k | CF_ASSERT( |
155 | 4.18k | size * 8 >= static_cast<size_t>(numBits), |
156 | 4.18k | "mp_to_unsigned_bin_len succeeded with undersized buffer"); |
157 | | |
158 | | /* Ensure no allocation failure occurs in mp_read_unsigned_bin |
159 | | * because this can leave the mp in a corrupted state |
160 | | */ |
161 | 4.18k | const auto cached_disableAllocationFailures = wolfCrypt_detail::disableAllocationFailures; |
162 | 4.18k | wolfCrypt_detail::disableAllocationFailures = true; |
163 | | |
164 | 4.18k | if ( randomSize == false ) { |
165 | 1.96k | CF_ASSERT(mp_read_unsigned_bin(mp, data, size) == MP_OKAY, "Cannot parse output of mp_to_unsigned_bin_len"); |
166 | 2.22k | } else { |
167 | | /* mp_read_unsigned_bin can fail if the input buffer is too large. |
168 | | * |
169 | | * Read into a temp variable, and copy to mp if reading succeeds, otherwise |
170 | | * retain old value in mp. |
171 | | */ |
172 | 2.22k | Bignum tmp(ds); |
173 | 2.22k | if ( mp_read_unsigned_bin(tmp.GetPtrDirect(), data, size) == MP_OKAY ) { |
174 | | /* ignore result */ mp_copy(tmp.GetPtrDirect(), mp); |
175 | 38 | } |
176 | 2.22k | } |
177 | | |
178 | 4.18k | wolfCrypt_detail::disableAllocationFailures = cached_disableAllocationFailures; |
179 | 4.18k | } |
180 | 0 | #endif |
181 | | |
182 | | |
183 | 4.65k | end: |
184 | 4.65k | util::free(data); |
185 | 4.65k | } |
186 | | |
187 | 155k | void Bignum::invariants(void) const { |
188 | 155k | #if defined(WOLFSSL_SP_MATH) || defined(WOLFSSL_SP_MATH_ALL) |
189 | 155k | CF_ASSERT(mp->used <= mp->size, "used is larger than size"); |
190 | | #elif !defined(USE_FAST_MATH) |
191 | | CF_ASSERT(mp->used <= mp->alloc, "used is larger than size"); |
192 | | #endif |
193 | 155k | } |
194 | | |
195 | | Bignum::Bignum(Datasource& ds, const bool mp_init_size_ok) : |
196 | 47.0k | ds(ds) { |
197 | 47.0k | mp = (mp_int*)util::malloc(sizeof(mp_int)); |
198 | | |
199 | 47.0k | if ( init_mp_int(mp, ds, mp_init_size_ok) != MP_OKAY ) { |
200 | 0 | util::free(mp); |
201 | 0 | throw std::exception(); |
202 | 0 | } |
203 | 47.0k | } |
204 | | |
205 | | Bignum::Bignum(mp_int* mp, Datasource& ds) : |
206 | | mp(mp), |
207 | | ds(ds), |
208 | | noFree(true) |
209 | 1.02k | { } |
210 | | |
211 | | Bignum::Bignum(const Bignum& other) : |
212 | 30.4k | ds(other.ds) { |
213 | 30.4k | mp = (mp_int*)util::malloc(sizeof(mp_int)); |
214 | 30.4k | if ( init_mp_int(mp, ds) != MP_OKAY ) { |
215 | 0 | util::free(mp); |
216 | 0 | throw std::exception(); |
217 | 0 | } |
218 | 30.4k | if ( mp_copy(other.mp, mp) != MP_OKAY ) { |
219 | 0 | util::free(mp); |
220 | 0 | throw std::exception(); |
221 | 0 | } |
222 | 30.4k | } |
223 | | |
224 | | Bignum::Bignum(const Bignum&& other) : |
225 | 30.4k | ds(other.ds) { |
226 | 30.4k | mp = (mp_int*)util::malloc(sizeof(mp_int)); |
227 | 30.4k | if ( init_mp_int(mp, ds) != MP_OKAY ) { |
228 | 0 | util::free(mp); |
229 | 0 | throw std::exception(); |
230 | 0 | } |
231 | 30.4k | if ( mp_copy(other.mp, mp) != MP_OKAY ) { |
232 | 0 | util::free(mp); |
233 | 0 | throw std::exception(); |
234 | 0 | } |
235 | 30.4k | } |
236 | | |
237 | 108k | Bignum::~Bignum() { |
238 | 108k | invariants(); |
239 | 108k | if ( noFree == false ) { |
240 | 107k | CF_NORET(mp_clear(mp)); |
241 | 107k | util::free(mp); |
242 | 107k | } |
243 | 108k | } |
244 | | |
245 | 0 | void Bignum::SetNoFree(void) { |
246 | 0 | noFree = true; |
247 | 0 | } |
248 | | |
249 | 32.1k | bool Bignum::Set(const std::string s) { |
250 | 32.1k | bool ret = false; |
251 | | |
252 | 32.1k | bool hex = false; |
253 | 32.1k | try { |
254 | 32.1k | hex = ds.Get<bool>(); |
255 | 32.1k | } catch ( ... ) { } |
256 | | |
257 | | #if defined(WOLFSSL_SP_MATH) |
258 | | hex = true; |
259 | | #endif |
260 | | |
261 | 32.1k | if ( hex == true ) { |
262 | 4.80k | CF_CHECK_EQ(read_radix(mp, util::DecToHex(s), 16), READ_RADIX_OK); |
263 | 27.3k | } else { |
264 | 27.3k | CF_CHECK_EQ(read_radix(mp, s, 10), READ_RADIX_OK); |
265 | 26.2k | } |
266 | | |
267 | 30.8k | ret = true; |
268 | 32.1k | end: |
269 | 32.1k | return ret; |
270 | 30.8k | } |
271 | | |
272 | 1.82k | bool Bignum::Set(const component::Bignum i) { |
273 | 1.82k | bool ret = false; |
274 | | |
275 | 1.82k | CF_CHECK_EQ(Set(i.ToString()), true); |
276 | | |
277 | 1.81k | ret = true; |
278 | 1.82k | end: |
279 | 1.82k | return ret; |
280 | 1.81k | } |
281 | | |
282 | 46.1k | mp_int* Bignum::GetPtr(void) const { |
283 | 46.1k | invariants(); |
284 | | |
285 | 46.1k | { |
286 | | /* Optionally clamp the bignum. This should not affect its value. */ |
287 | | |
288 | 46.1k | bool clamp = false; |
289 | | |
290 | 46.1k | try { clamp = ds.Get<bool>(); } catch ( fuzzing::datasource::Datasource::OutOfData ) { } |
291 | | |
292 | 46.1k | if ( clamp ) { |
293 | | /* Implemented as a macro so CF_NORET cannot be used here */ |
294 | 4.92k | /* noret */ mp_clamp(mp); |
295 | 4.92k | } |
296 | 46.1k | } |
297 | | |
298 | 46.1k | { |
299 | | /* Optionally convert to a random base and back */ |
300 | | |
301 | 46.1k | bool convert = false; |
302 | | |
303 | 46.1k | try { convert = ds.Get<bool>(); } catch ( fuzzing::datasource::Datasource::OutOfData ) { } |
304 | | |
305 | 46.1k | if ( convert ) { |
306 | 4.89k | baseConversion(); |
307 | 4.89k | } |
308 | 46.1k | } |
309 | | |
310 | 46.1k | { |
311 | | /* Optionally convert to bytes and back */ |
312 | | |
313 | 46.1k | bool convert = false; |
314 | | |
315 | 46.1k | try { convert = ds.Get<bool>(); } catch ( fuzzing::datasource::Datasource::OutOfData ) { } |
316 | | |
317 | 46.1k | if ( convert ) { |
318 | 4.65k | binaryConversion(); |
319 | 4.65k | } |
320 | 46.1k | } |
321 | | |
322 | 46.1k | return mp; |
323 | 46.1k | } |
324 | | |
325 | 33.3k | mp_int* Bignum::GetPtrDirect(void) const { |
326 | 33.3k | return mp; |
327 | 33.3k | } |
328 | | |
329 | 462 | std::optional<uint64_t> Bignum::AsUint64(void) const { |
330 | 462 | std::optional<uint64_t> ret = std::nullopt; |
331 | 462 | uint64_t v = 0; |
332 | | |
333 | 462 | #if !defined(WOLFSSL_SP_MATH) |
334 | 462 | CF_CHECK_EQ(mp_isneg(mp), 0); |
335 | 462 | #endif |
336 | 462 | CF_CHECK_LTE(mp_count_bits(mp), (int)(sizeof(v) * 8)); |
337 | 389 | CF_CHECK_EQ(mp_to_unsigned_bin_len(mp, (uint8_t*)&v, sizeof(v)), MP_OKAY); |
338 | 389 | v = |
339 | 389 | ((v & 0xFF00000000000000) >> 56) | |
340 | 389 | ((v & 0x00FF000000000000) >> 40) | |
341 | 389 | ((v & 0x0000FF0000000000) >> 24) | |
342 | 389 | ((v & 0x000000FF00000000) >> 8) | |
343 | 389 | ((v & 0x00000000FF000000) << 8) | |
344 | 389 | ((v & 0x0000000000FF0000) << 24) | |
345 | 389 | ((v & 0x000000000000FF00) << 40) | |
346 | 389 | ((v & 0x00000000000000FF) << 56); |
347 | | |
348 | 389 | ret = v; |
349 | 462 | end: |
350 | 462 | return ret; |
351 | 389 | } |
352 | | |
353 | 6.34k | std::optional<std::string> Bignum::ToDecString(void) { |
354 | 6.34k | std::optional<std::string> ret = std::nullopt; |
355 | 6.34k | char* str = nullptr; |
356 | | |
357 | | #if defined(WOLFSSL_SP_MATH) |
358 | | str = (char*)util::malloc(8192); |
359 | | |
360 | | CF_CHECK_EQ(mp_tohex(mp, str), MP_OKAY); |
361 | | ret = { util::HexToDec(str) }; |
362 | | #else |
363 | 6.34k | bool hex = false; |
364 | 6.34k | int size; |
365 | | |
366 | 6.34k | try { |
367 | 6.34k | hex = ds.Get<bool>(); |
368 | 6.34k | } catch ( ... ) { } |
369 | | |
370 | | |
371 | 6.34k | if ( hex == true ) { |
372 | 495 | CF_CHECK_EQ(mp_radix_size(mp, 16, &size), MP_OKAY); |
373 | 495 | CF_ASSERT(size > 0, "Output of mp_radix_size is 0 or less"); |
374 | | |
375 | 495 | str = (char*)util::malloc(size+1); |
376 | | |
377 | 495 | CF_CHECK_EQ(mp_tohex(mp, str), MP_OKAY); |
378 | 495 | ret = { util::HexToDec(str) }; |
379 | 5.85k | } else { |
380 | 5.85k | CF_CHECK_EQ(mp_radix_size(mp, 10, &size), MP_OKAY); |
381 | 5.70k | CF_ASSERT(size > 0, "Output of mp_radix_size is 0 or less"); |
382 | | |
383 | 5.70k | str = (char*)util::malloc(size); |
384 | | |
385 | 5.70k | CF_CHECK_EQ(mp_toradix(mp, str, 10), MP_OKAY); |
386 | 5.60k | ret = std::string(str); |
387 | 5.60k | } |
388 | 6.09k | #endif |
389 | | |
390 | 6.34k | end: |
391 | 6.34k | free(str); |
392 | | |
393 | 6.34k | return ret; |
394 | 6.34k | } |
395 | | |
396 | 3.68k | std::optional<component::Bignum> Bignum::ToComponentBignum(void) { |
397 | 3.68k | std::optional<component::Bignum> ret = std::nullopt; |
398 | | |
399 | 3.68k | auto str = ToDecString(); |
400 | 3.68k | CF_CHECK_NE(str, std::nullopt); |
401 | 3.59k | ret = { str }; |
402 | 3.68k | end: |
403 | 3.68k | return ret; |
404 | 3.59k | } |
405 | | |
406 | 706 | bool Bignum::ToBin(uint8_t* dest, const size_t size) { |
407 | 706 | bool ret = false; |
408 | | |
409 | 706 | const auto required = mp_unsigned_bin_size(GetPtr()); |
410 | 706 | CF_ASSERT(required >= 0, "mp_unsigned_bin_size returned negative value"); |
411 | | |
412 | 706 | CF_CHECK_GTE(size, static_cast<size_t>(required)); |
413 | 706 | CF_CHECK_EQ(mp_to_unsigned_bin_len(GetPtr(), dest, size), MP_OKAY); |
414 | | |
415 | 674 | ret = true; |
416 | 706 | end: |
417 | 706 | return ret; |
418 | 674 | } |
419 | | |
420 | | |
421 | 709 | std::optional<std::vector<uint8_t>> Bignum::ToBin(Datasource& ds, const component::Bignum b, std::optional<size_t> size) { |
422 | 709 | std::optional<std::vector<uint8_t>> ret = std::nullopt; |
423 | 709 | std::vector<uint8_t> v; |
424 | 709 | Bignum bn(ds); |
425 | 709 | uint16_t padding = 0; |
426 | | |
427 | 709 | CF_CHECK_EQ(bn.Set(b), true); |
428 | 706 | if ( size != std::nullopt ) { |
429 | 0 | v.resize(*size); |
430 | 706 | } else { |
431 | 706 | try { |
432 | 706 | padding = ds.Get<uint16_t>(); |
433 | 706 | } catch ( fuzzing::datasource::Datasource::OutOfData ) { } |
434 | | |
435 | 706 | v.resize( mp_unsigned_bin_size(bn.GetPtr()) + padding ); |
436 | 706 | } |
437 | | |
438 | 706 | CF_CHECK_EQ(bn.ToBin(v.data(), v.size()), true); |
439 | | |
440 | 674 | ret = v; |
441 | 709 | end: |
442 | 709 | return ret; |
443 | 674 | } |
444 | | |
445 | | bool Bignum::ToBin( |
446 | | Datasource& ds, |
447 | | const component::Bignum b, |
448 | | uint8_t* dest, |
449 | | const size_t size, |
450 | 0 | const bool mustSucceed) { |
451 | 0 | bool ret = false; |
452 | 0 | if ( mustSucceed == true ) { |
453 | 0 | std::optional<std::vector<uint8_t>> bytes; |
454 | 0 | CF_CHECK_NE(bytes = util::DecToBin(b.ToTrimmedString(), size), std::nullopt); |
455 | 0 | memcpy(dest, bytes->data(), bytes->size()); |
456 | 0 | ret = true; |
457 | 0 | } else { |
458 | 0 | Bignum bn(ds); |
459 | |
|
460 | 0 | CF_CHECK_EQ(bn.Set(b), true); |
461 | 0 | CF_CHECK_EQ(bn.ToBin(dest, size), true); |
462 | |
|
463 | 0 | ret = true; |
464 | 0 | } |
465 | 0 | end: |
466 | 0 | return ret; |
467 | 0 | } |
468 | | |
469 | | bool Bignum::ToBin( |
470 | | Datasource& ds, |
471 | | const component::BignumPair b, |
472 | | uint8_t* dest, |
473 | | const size_t size, |
474 | 0 | const bool mustSucceed) { |
475 | 0 | CF_ASSERT((size % 2) == 0, "Input size is not multiple of 2 in Bignum::ToBin"); |
476 | |
|
477 | 0 | bool ret = false; |
478 | 0 | const auto halfSize = size / 2; |
479 | |
|
480 | 0 | CF_CHECK_EQ(ToBin(ds, b.first, dest, halfSize, mustSucceed), true); |
481 | 0 | CF_CHECK_EQ(ToBin(ds, b.second, dest + halfSize, halfSize, mustSucceed), true); |
482 | |
|
483 | 0 | ret = true; |
484 | 0 | end: |
485 | 0 | return ret; |
486 | 0 | } |
487 | | |
488 | 0 | std::optional<component::Bignum> Bignum::BinToBignum(Datasource& ds, const uint8_t* src, const size_t size) { |
489 | 0 | std::optional<component::Bignum> ret = std::nullopt; |
490 | |
|
491 | 0 | wolfCrypt_bignum::Bignum bn(ds); |
492 | 0 | CF_CHECK_EQ(mp_read_unsigned_bin(bn.GetPtr(), src, size), MP_OKAY); |
493 | |
|
494 | 0 | ret = bn.ToComponentBignum(); |
495 | |
|
496 | 0 | end: |
497 | 0 | return ret; |
498 | 0 | } |
499 | | |
500 | 0 | std::optional<component::BignumPair> Bignum::BinToBignumPair(Datasource& ds, const uint8_t* src, const size_t size) { |
501 | 0 | CF_ASSERT((size % 2) == 0, "Input size is not multiple of 2 in Bignum::BinToBignumPair"); |
502 | |
|
503 | 0 | std::optional<component::BignumPair> ret = std::nullopt; |
504 | 0 | std::optional<component::Bignum> A, B; |
505 | 0 | const auto halfSize = size / 2; |
506 | |
|
507 | 0 | { |
508 | 0 | wolfCrypt_bignum::Bignum bn(ds); |
509 | 0 | CF_CHECK_EQ(mp_read_unsigned_bin(bn.GetPtr(), src, halfSize), MP_OKAY); |
510 | 0 | CF_CHECK_NE(A = bn.ToComponentBignum(), std::nullopt); |
511 | 0 | } |
512 | | |
513 | 0 | { |
514 | 0 | wolfCrypt_bignum::Bignum bn(ds); |
515 | 0 | CF_CHECK_EQ(mp_read_unsigned_bin(bn.GetPtr(), src + halfSize, halfSize), MP_OKAY); |
516 | 0 | CF_CHECK_NE(B = bn.ToComponentBignum(), std::nullopt); |
517 | 0 | } |
518 | | |
519 | | |
520 | 0 | ret = {A->ToTrimmedString(), B->ToTrimmedString()}; |
521 | |
|
522 | 0 | end: |
523 | 0 | return ret; |
524 | 0 | } |
525 | | |
526 | 7.60k | void Bignum::Randomize(void) { |
527 | 7.60k | std::vector<uint8_t> data; |
528 | 7.60k | try { |
529 | 7.60k | data = ds.GetData(0, 1, 1024); |
530 | 7.60k | } catch ( fuzzing::datasource::Datasource::OutOfData ) { } |
531 | | |
532 | 7.60k | if ( !data.empty() ) { |
533 | | /* ignore return value */ mp_read_unsigned_bin(GetPtrDirect(), data.data(), data.size()); |
534 | 708 | } |
535 | 7.60k | } |
536 | | |
537 | 1.98k | bool Bignum::operator==(const Bignum& rhs) const { |
538 | 1.98k | return mp_cmp(GetPtr(), rhs.GetPtr()) == MP_EQ; |
539 | 1.98k | } |
540 | | |
541 | | BignumCluster::BignumCluster(Datasource& ds, Bignum bn0, Bignum bn1, Bignum bn2, Bignum bn3) : |
542 | | ds(ds), |
543 | | bn({bn0, bn1, bn2, bn3}) |
544 | 7.60k | { } |
545 | | |
546 | 7.60k | BignumCluster::~BignumCluster() { |
547 | 38.0k | for (size_t i = 0; i < 4; i++) { |
548 | 30.4k | if ( cache.bn[i] == nullptr ) { |
549 | 5.25k | continue; |
550 | 5.25k | } |
551 | | |
552 | 25.1k | mp_clear(cache.bn[i]); |
553 | 25.1k | util::free(cache.bn[i]); |
554 | 25.1k | } |
555 | 7.60k | } |
556 | | |
557 | 22.8k | Bignum& BignumCluster::operator[](const size_t index) { |
558 | 22.8k | CF_ASSERT(index < bn.size(), "Invalid index requested in BignumCluster::operator[]"); |
559 | | |
560 | 22.8k | try { |
561 | | /* Rewire? */ |
562 | 22.8k | if ( ds.Get<bool>() == true ) { |
563 | | /* Pick a random bignum */ |
564 | 2.01k | const auto newIndex = ds.Get<uint8_t>() % 4; |
565 | | |
566 | | /* Same value? */ |
567 | 2.01k | if ( bn[newIndex] == bn[index] ) { |
568 | | /* Then return reference to other bignum */ |
569 | 548 | return bn[newIndex]; |
570 | 548 | } |
571 | | |
572 | | /* Fall through */ |
573 | 2.01k | } |
574 | 22.8k | } catch ( fuzzing::datasource::Datasource::OutOfData ) { } |
575 | | |
576 | 22.2k | return bn[index]; |
577 | 22.8k | } |
578 | | |
579 | 27.6k | bool BignumCluster::Set(const size_t index, const std::string s) { |
580 | 27.6k | CF_ASSERT(index < bn.size(), "Invalid index requested in BignumCluster::Set"); |
581 | | |
582 | 27.6k | return bn[index].Set(s); |
583 | 27.6k | } |
584 | | |
585 | 65 | mp_int* BignumCluster::GetDestPtr(const size_t index) { |
586 | | /* Because it is requested as a destination pointer, |
587 | | * this bignum will be altered, hence invalidate |
588 | | * the cache |
589 | | */ |
590 | 65 | InvalidateCache(); |
591 | | |
592 | 65 | return bn[index].GetPtr(); |
593 | 65 | } |
594 | | |
595 | 4.93k | mp_int* BignumCluster::GetResPtr(void) { |
596 | 4.93k | CF_ASSERT(res_index == std::nullopt, "Reusing result pointer"); |
597 | | |
598 | 4.93k | res_index = 0; |
599 | | |
600 | 4.93k | try { res_index = ds.Get<uint8_t>() % 4; } |
601 | 4.93k | catch ( fuzzing::datasource::Datasource::OutOfData ) { } |
602 | | |
603 | 4.93k | InvalidateCache(); |
604 | | |
605 | 4.93k | return bn[*res_index].GetPtr(); |
606 | 4.93k | } |
607 | | |
608 | 3.35k | bool BignumCluster::CopyResult(Bignum& res) const { |
609 | 3.35k | bool ret = false; |
610 | | |
611 | 3.35k | CF_ASSERT(res_index != std::nullopt, "Result index is undefined"); |
612 | 3.35k | wolfCrypt_detail::disableAllocationFailures = true; |
613 | | |
614 | 3.35k | const auto src = bn[*res_index].GetPtrDirect(); |
615 | 3.35k | auto dest = res.GetPtr(); |
616 | | |
617 | 3.35k | if ( mp_copy(src, dest) != MP_OKAY ) { |
618 | | #if defined(USE_FAST_MATH) |
619 | | goto end; |
620 | | #elif defined(USE_INTEGER_HEAP_MATH) |
621 | | CF_NORET(mp_clear(dest)); |
622 | | CF_ASSERT(mp_init_size(dest, src->alloc) == 0, "Cannot initialze result"); |
623 | | CF_ASSERT( |
624 | | mp_copy(src, dest) == MP_OKAY, |
625 | | "mp_copy failed unexpectedly"); |
626 | | #else |
627 | 27 | CF_NORET(mp_clear(dest)); |
628 | 27 | CF_ASSERT(mp_init_size(dest, src->size) == 0, "Cannot initialze result"); |
629 | 27 | CF_ASSERT( |
630 | 27 | mp_copy(src, dest) == MP_OKAY, |
631 | 27 | "mp_copy failed unexpectedly"); |
632 | 27 | #endif |
633 | 27 | } |
634 | | |
635 | 3.35k | ret = true; |
636 | | #if defined(USE_FAST_MATH) |
637 | | end: |
638 | | #endif |
639 | 3.35k | wolfCrypt_detail::disableAllocationFailures = false; |
640 | 3.35k | return ret; |
641 | 3.35k | } |
642 | | |
643 | 6.29k | void BignumCluster::Save(void) { |
644 | 31.4k | for (size_t i = 0; i < 4; i++) { |
645 | 25.1k | mp_int* cached_mp = (mp_int*)util::malloc(sizeof(mp_int)); |
646 | | |
647 | 25.1k | wolfCrypt_detail::disableAllocationFailures = true; |
648 | | |
649 | 25.1k | CF_ASSERT(mp_init(cached_mp) == MP_OKAY, "mp_init failed unexpectedly"); |
650 | 25.1k | CF_ASSERT(mp_copy(bn[i].GetPtrDirect(), cached_mp) == MP_OKAY, "mp_copy failed unexpectedly"); |
651 | | |
652 | 25.1k | wolfCrypt_detail::disableAllocationFailures = false; |
653 | | |
654 | 25.1k | cache.bn[i] = cached_mp; |
655 | 25.1k | } |
656 | 6.29k | } |
657 | | |
658 | 5.00k | void BignumCluster::InvalidateCache(void) { |
659 | 5.00k | cache.invalid = true; |
660 | 5.00k | } |
661 | | |
662 | 3.68k | bool BignumCluster::EqualsCache(void) const { |
663 | 3.68k | if ( cache.invalid == true ) { |
664 | 3.21k | return true; |
665 | 3.21k | } |
666 | | |
667 | 2.36k | for (size_t i = 0; i < 4; i++) { |
668 | 1.88k | if ( cache.bn[i] == nullptr ) { |
669 | 0 | continue; |
670 | 0 | } |
671 | | |
672 | 1.88k | wolfCrypt_detail::disableAllocationFailures = true; |
673 | | |
674 | 1.88k | if ( mp_cmp(bn[i].GetPtrDirect(), cache.bn[i]) != MP_EQ ) { |
675 | | #if defined(CRYPTOFUZZ_WOLFCRYPT_DEBUG) |
676 | | char str[8192]; |
677 | | |
678 | | std::cout << "Bignum with index " << std::to_string(i) << " was changed" << std::endl; |
679 | | |
680 | | wolfCrypt_detail::disableAllocationFailures = true; |
681 | | |
682 | | CF_ASSERT(mp_tohex(cache.bn[i], str) == MP_OKAY, "mp_tohex failed unexpectedly"); |
683 | | printf("it was: %s\n", str); |
684 | | |
685 | | CF_ASSERT(mp_tohex(bn[i].GetPtrDirect(), str) == MP_OKAY, "mp_tohex failed unexpectedly"); |
686 | | printf("it is now %s\n", str); |
687 | | |
688 | | #endif |
689 | 0 | wolfCrypt_detail::disableAllocationFailures = false; |
690 | |
|
691 | 0 | return false; |
692 | 0 | } |
693 | | |
694 | 1.88k | wolfCrypt_detail::disableAllocationFailures = false; |
695 | 1.88k | } |
696 | | |
697 | 472 | return true; |
698 | 472 | } |
699 | | |
700 | | } /* namespace wolfCrypt_bignum */ |
701 | | } /* namespace module */ |
702 | | } /* namespace cryptofuzz */ |