/src/openssl32/fuzz/decoder.c
Line | Count | Source (jump to first uncovered line) |
1 | | /* |
2 | | * Copyright 2023-2024 The OpenSSL Project Authors. All Rights Reserved. |
3 | | * |
4 | | * Licensed under the Apache License 2.0 (the "License"); |
5 | | * you may not use this file except in compliance with the License. |
6 | | * You may obtain a copy of the License at |
7 | | * https://www.openssl.org/source/license.html |
8 | | * or in the file LICENSE in the source distribution. |
9 | | */ |
10 | | |
11 | | #include <openssl/decoder.h> |
12 | | #include <openssl/err.h> |
13 | | #include <openssl/rand.h> |
14 | | #include "fuzzer.h" |
15 | | |
16 | | static ASN1_PCTX *pctx; |
17 | | |
18 | | int FuzzerInitialize(int *argc, char ***argv) |
19 | 108 | { |
20 | 108 | FuzzerSetRand(); |
21 | | |
22 | 108 | OPENSSL_init_crypto(OPENSSL_INIT_LOAD_CRYPTO_STRINGS |
23 | 108 | | OPENSSL_INIT_ADD_ALL_CIPHERS |
24 | 108 | | OPENSSL_INIT_ADD_ALL_DIGESTS, NULL); |
25 | | |
26 | 108 | pctx = ASN1_PCTX_new(); |
27 | 108 | ASN1_PCTX_set_flags(pctx, ASN1_PCTX_FLAGS_SHOW_ABSENT |
28 | 108 | | ASN1_PCTX_FLAGS_SHOW_SEQUENCE |
29 | 108 | | ASN1_PCTX_FLAGS_SHOW_SSOF |
30 | 108 | | ASN1_PCTX_FLAGS_SHOW_TYPE |
31 | 108 | | ASN1_PCTX_FLAGS_SHOW_FIELD_STRUCT_NAME); |
32 | 108 | ASN1_PCTX_set_str_flags(pctx, ASN1_STRFLGS_UTF8_CONVERT |
33 | 108 | | ASN1_STRFLGS_SHOW_TYPE |
34 | 108 | | ASN1_STRFLGS_DUMP_ALL); |
35 | | |
36 | 108 | ERR_clear_error(); |
37 | 108 | CRYPTO_free_ex_index(0, -1); |
38 | 108 | return 1; |
39 | 108 | } |
40 | | |
41 | | int FuzzerTestOneInput(const uint8_t *buf, size_t len) |
42 | 16.4k | { |
43 | 16.4k | OSSL_DECODER_CTX *dctx; |
44 | 16.4k | EVP_PKEY *pkey = NULL; |
45 | 16.4k | EVP_PKEY_CTX *ctx = NULL; |
46 | 16.4k | BIO *bio; |
47 | | |
48 | 16.4k | bio = BIO_new(BIO_s_null()); |
49 | 16.4k | dctx = OSSL_DECODER_CTX_new_for_pkey(&pkey, NULL, NULL, NULL, 0, NULL, |
50 | 16.4k | NULL); |
51 | 16.4k | if (dctx == NULL) { |
52 | 0 | return 0; |
53 | 0 | } |
54 | 16.4k | if (OSSL_DECODER_from_data(dctx, &buf, &len)) { |
55 | 8.25k | EVP_PKEY *pkey2; |
56 | | |
57 | 8.25k | EVP_PKEY_print_public(bio, pkey, 1, pctx); |
58 | 8.25k | EVP_PKEY_print_private(bio, pkey, 1, pctx); |
59 | 8.25k | EVP_PKEY_print_params(bio, pkey, 1, pctx); |
60 | | |
61 | 8.25k | pkey2 = EVP_PKEY_dup(pkey); |
62 | 8.25k | OPENSSL_assert(pkey2 != NULL); |
63 | 8.25k | EVP_PKEY_eq(pkey, pkey2); |
64 | 8.25k | EVP_PKEY_free(pkey2); |
65 | | |
66 | 8.25k | ctx = EVP_PKEY_CTX_new(pkey, NULL); |
67 | | /* |
68 | | * Param check will take too long time on large DH parameters. |
69 | | * Skip it. |
70 | | */ |
71 | 8.25k | if ((!EVP_PKEY_is_a(pkey, "DH") && !EVP_PKEY_is_a(pkey, "DHX")) |
72 | 8.25k | || EVP_PKEY_get_bits(pkey) <= 2048) |
73 | 8.22k | EVP_PKEY_param_check(ctx); |
74 | | |
75 | 8.25k | EVP_PKEY_public_check(ctx); |
76 | | /* Private and pairwise checks are unbounded, skip for large keys. */ |
77 | 8.25k | if (EVP_PKEY_get_bits(pkey) <= 4096) { |
78 | 7.57k | EVP_PKEY_private_check(ctx); |
79 | 7.57k | EVP_PKEY_pairwise_check(ctx); |
80 | 7.57k | } |
81 | 8.25k | OPENSSL_assert(ctx != NULL); |
82 | 8.25k | EVP_PKEY_CTX_free(ctx); |
83 | 8.25k | EVP_PKEY_free(pkey); |
84 | 8.25k | } |
85 | 16.4k | OSSL_DECODER_CTX_free(dctx); |
86 | | |
87 | 16.4k | BIO_free(bio); |
88 | 16.4k | ERR_clear_error(); |
89 | 16.4k | return 0; |
90 | 16.4k | } |
91 | | |
92 | | void FuzzerCleanup(void) |
93 | 0 | { |
94 | 0 | ASN1_PCTX_free(pctx); |
95 | 0 | FuzzerClearRand(); |
96 | 0 | } |