/src/openssl31/fuzz/bndiv.c
Line | Count | Source (jump to first uncovered line) |
1 | | /* |
2 | | * Copyright 2016 The OpenSSL Project Authors. All Rights Reserved. |
3 | | * |
4 | | * Licensed under the Apache License 2.0 (the "License"); |
5 | | * you may not use this file except in compliance with the License. |
6 | | * You may obtain a copy of the License at |
7 | | * https://www.openssl.org/source/license.html |
8 | | * or in the file LICENSE in the source distribution. |
9 | | */ |
10 | | |
11 | | /* |
12 | | * Confirm that if (d, r) = a / b, then b * d + r == a, and that sign(d) == |
13 | | * sign(a), and 0 <= r <= b |
14 | | */ |
15 | | |
16 | | #include <stdio.h> |
17 | | #include <openssl/bn.h> |
18 | | #include <openssl/err.h> |
19 | | #include "fuzzer.h" |
20 | | |
21 | | /* 256 kB */ |
22 | 10.5k | #define MAX_LEN (256 * 1000) |
23 | | |
24 | | static BN_CTX *ctx; |
25 | | static BIGNUM *b1; |
26 | | static BIGNUM *b2; |
27 | | static BIGNUM *b3; |
28 | | static BIGNUM *b4; |
29 | | static BIGNUM *b5; |
30 | | |
31 | | int FuzzerInitialize(int *argc, char ***argv) |
32 | 108 | { |
33 | 108 | b1 = BN_new(); |
34 | 108 | b2 = BN_new(); |
35 | 108 | b3 = BN_new(); |
36 | 108 | b4 = BN_new(); |
37 | 108 | b5 = BN_new(); |
38 | 108 | ctx = BN_CTX_new(); |
39 | | |
40 | 108 | OPENSSL_init_crypto(OPENSSL_INIT_LOAD_CRYPTO_STRINGS, NULL); |
41 | 108 | ERR_clear_error(); |
42 | | |
43 | 108 | return 1; |
44 | 108 | } |
45 | | |
46 | | int FuzzerTestOneInput(const uint8_t *buf, size_t len) |
47 | 10.5k | { |
48 | 10.5k | int success = 0; |
49 | 10.5k | size_t l1 = 0, l2 = 0; |
50 | | /* s1 and s2 will be the signs for b1 and b2. */ |
51 | 10.5k | int s1 = 0, s2 = 0; |
52 | | |
53 | | /* limit the size of the input to avoid timeout */ |
54 | 10.5k | if (len > MAX_LEN) |
55 | 10 | len = MAX_LEN; |
56 | | |
57 | | /* We are going to split the buffer in two, sizes l1 and l2, giving b1 and |
58 | | * b2. |
59 | | */ |
60 | 10.5k | if (len > 0) { |
61 | 10.5k | --len; |
62 | | /* Use first byte to divide the remaining buffer into 3Fths. I admit |
63 | | * this disallows some number sizes. If it matters, better ideas are |
64 | | * welcome (Ben). |
65 | | */ |
66 | 10.5k | l1 = ((buf[0] & 0x3f) * len) / 0x3f; |
67 | 10.5k | s1 = buf[0] & 0x40; |
68 | 10.5k | s2 = buf[0] & 0x80; |
69 | 10.5k | ++buf; |
70 | 10.5k | l2 = len - l1; |
71 | 10.5k | } |
72 | 10.5k | OPENSSL_assert(BN_bin2bn(buf, l1, b1) == b1); |
73 | 10.5k | BN_set_negative(b1, s1); |
74 | 10.5k | OPENSSL_assert(BN_bin2bn(buf + l1, l2, b2) == b2); |
75 | 10.5k | BN_set_negative(b2, s2); |
76 | | |
77 | | /* divide by 0 is an error */ |
78 | 10.5k | if (BN_is_zero(b2)) { |
79 | 64 | success = 1; |
80 | 64 | goto done; |
81 | 64 | } |
82 | | |
83 | 10.4k | OPENSSL_assert(BN_div(b3, b4, b1, b2, ctx)); |
84 | 10.4k | if (BN_is_zero(b1)) |
85 | 1.25k | success = BN_is_zero(b3) && BN_is_zero(b4); |
86 | 9.19k | else if (BN_is_negative(b1)) |
87 | 6.10k | success = (BN_is_negative(b3) != BN_is_negative(b2) || BN_is_zero(b3)) |
88 | 6.10k | && (BN_is_negative(b4) || BN_is_zero(b4)); |
89 | 3.09k | else |
90 | 3.09k | success = (BN_is_negative(b3) == BN_is_negative(b2) || BN_is_zero(b3)) |
91 | 3.09k | && (!BN_is_negative(b4) || BN_is_zero(b4)); |
92 | 10.4k | OPENSSL_assert(BN_mul(b5, b3, b2, ctx)); |
93 | 10.4k | OPENSSL_assert(BN_add(b5, b5, b4)); |
94 | | |
95 | 10.4k | success = success && BN_cmp(b5, b1) == 0; |
96 | 10.4k | if (!success) { |
97 | 0 | BN_print_fp(stdout, b1); |
98 | 0 | putchar('\n'); |
99 | 0 | BN_print_fp(stdout, b2); |
100 | 0 | putchar('\n'); |
101 | 0 | BN_print_fp(stdout, b3); |
102 | 0 | putchar('\n'); |
103 | 0 | BN_print_fp(stdout, b4); |
104 | 0 | putchar('\n'); |
105 | 0 | BN_print_fp(stdout, b5); |
106 | 0 | putchar('\n'); |
107 | 0 | printf("%d %d %d %d %d %d %d\n", BN_is_negative(b1), |
108 | 0 | BN_is_negative(b2), |
109 | 0 | BN_is_negative(b3), BN_is_negative(b4), BN_is_zero(b4), |
110 | 0 | BN_is_negative(b3) != BN_is_negative(b2) |
111 | 0 | && (BN_is_negative(b4) || BN_is_zero(b4)), |
112 | 0 | BN_cmp(b5, b1)); |
113 | 0 | puts("----\n"); |
114 | 0 | } |
115 | | |
116 | 10.5k | done: |
117 | 10.5k | OPENSSL_assert(success); |
118 | 10.5k | ERR_clear_error(); |
119 | | |
120 | 10.5k | return 0; |
121 | 10.4k | } |
122 | | |
123 | | void FuzzerCleanup(void) |
124 | 0 | { |
125 | 0 | BN_free(b1); |
126 | 0 | BN_free(b2); |
127 | 0 | BN_free(b3); |
128 | 0 | BN_free(b4); |
129 | 0 | BN_free(b5); |
130 | 0 | BN_CTX_free(ctx); |
131 | 0 | } |