/src/openssl31/fuzz/bignum.c
Line | Count | Source (jump to first uncovered line) |
1 | | /* |
2 | | * Copyright 2016-2024 The OpenSSL Project Authors. All Rights Reserved. |
3 | | * |
4 | | * Licensed under the Apache License 2.0 (the "License"); |
5 | | * you may not use this file except in compliance with the License. |
6 | | * You may obtain a copy of the License at |
7 | | * https://www.openssl.org/source/license.html |
8 | | * or in the file LICENSE in the source distribution. |
9 | | */ |
10 | | |
11 | | /* |
12 | | * Confirm that a^b mod c agrees when calculated cleverly vs naively, for |
13 | | * random a, b and c. |
14 | | */ |
15 | | |
16 | | #include <stdio.h> |
17 | | #include <openssl/bn.h> |
18 | | #include <openssl/err.h> |
19 | | #include "fuzzer.h" |
20 | | |
21 | | |
22 | | int FuzzerInitialize(int *argc, char ***argv) |
23 | 108 | { |
24 | 108 | OPENSSL_init_crypto(OPENSSL_INIT_LOAD_CRYPTO_STRINGS, NULL); |
25 | 108 | ERR_clear_error(); |
26 | | |
27 | 108 | return 1; |
28 | 108 | } |
29 | | |
30 | | int FuzzerTestOneInput(const uint8_t *buf, size_t len) |
31 | 11.8k | { |
32 | 11.8k | int success = 0; |
33 | 11.8k | size_t l1 = 0, l2 = 0, l3 = 0; |
34 | 11.8k | int s1 = 0, s3 = 0; |
35 | 11.8k | BN_CTX *ctx; |
36 | 11.8k | BIGNUM *b1; |
37 | 11.8k | BIGNUM *b2; |
38 | 11.8k | BIGNUM *b3; |
39 | 11.8k | BIGNUM *b4; |
40 | 11.8k | BIGNUM *b5; |
41 | | |
42 | 11.8k | b1 = BN_new(); |
43 | 11.8k | b2 = BN_new(); |
44 | 11.8k | b3 = BN_new(); |
45 | 11.8k | b4 = BN_new(); |
46 | 11.8k | b5 = BN_new(); |
47 | 11.8k | ctx = BN_CTX_new(); |
48 | | |
49 | | /* Divide the input into three parts, using the values of the first two |
50 | | * bytes to choose lengths, which generate b1, b2 and b3. Use three bits |
51 | | * of the third byte to choose signs for the three numbers. |
52 | | */ |
53 | 11.8k | if (len > 2) { |
54 | 11.8k | len -= 3; |
55 | | /* limit l1, l2, and l3 to be no more than 512 bytes */ |
56 | 11.8k | l1 = ((buf[0] * len) / 255) % 512; |
57 | 11.8k | ++buf; |
58 | 11.8k | l2 = ((buf[0] * (len - l1)) / 255) % 512; |
59 | 11.8k | ++buf; |
60 | 11.8k | l3 = (len - l1 - l2) % 512; |
61 | | |
62 | 11.8k | s1 = buf[0] & 1; |
63 | 11.8k | s3 = buf[0] & 4; |
64 | 11.8k | ++buf; |
65 | 11.8k | } |
66 | 11.8k | OPENSSL_assert(BN_bin2bn(buf, l1, b1) == b1); |
67 | 11.8k | BN_set_negative(b1, s1); |
68 | 11.8k | OPENSSL_assert(BN_bin2bn(buf + l1, l2, b2) == b2); |
69 | 11.8k | OPENSSL_assert(BN_bin2bn(buf + l1 + l2, l3, b3) == b3); |
70 | 11.8k | BN_set_negative(b3, s3); |
71 | | |
72 | | /* mod 0 is undefined */ |
73 | 11.8k | if (BN_is_zero(b3)) { |
74 | 178 | success = 1; |
75 | 178 | goto done; |
76 | 178 | } |
77 | | |
78 | 11.6k | OPENSSL_assert(BN_mod_exp(b4, b1, b2, b3, ctx)); |
79 | 11.6k | OPENSSL_assert(BN_mod_exp_simple(b5, b1, b2, b3, ctx)); |
80 | | |
81 | 11.6k | success = BN_cmp(b4, b5) == 0; |
82 | 11.6k | if (!success) { |
83 | 0 | BN_print_fp(stdout, b1); |
84 | 0 | putchar('\n'); |
85 | 0 | BN_print_fp(stdout, b2); |
86 | 0 | putchar('\n'); |
87 | 0 | BN_print_fp(stdout, b3); |
88 | 0 | putchar('\n'); |
89 | 0 | BN_print_fp(stdout, b4); |
90 | 0 | putchar('\n'); |
91 | 0 | BN_print_fp(stdout, b5); |
92 | 0 | putchar('\n'); |
93 | 0 | } |
94 | | |
95 | 11.8k | done: |
96 | 11.8k | OPENSSL_assert(success); |
97 | 11.8k | BN_free(b1); |
98 | 11.8k | BN_free(b2); |
99 | 11.8k | BN_free(b3); |
100 | 11.8k | BN_free(b4); |
101 | 11.8k | BN_free(b5); |
102 | 11.8k | BN_CTX_free(ctx); |
103 | 11.8k | ERR_clear_error(); |
104 | | |
105 | 11.8k | return 0; |
106 | 11.6k | } |
107 | | |
108 | | void FuzzerCleanup(void) |
109 | 0 | { |
110 | 0 | } |