Coverage Report

Created: 2026-02-14 07:20

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/openssl30/fuzz/cmp.c
Line
Count
Source
1
/*
2
 * Copyright 2007-2021 The OpenSSL Project Authors. All Rights Reserved.
3
 *
4
 * Licensed under the Apache License 2.0 (the "License").  You may not use
5
 * this file except in compliance with the License.  You can obtain a copy
6
 * in the file LICENSE in the source distribution or at
7
 * https://www.openssl.org/source/license.html
8
 */
9
10
/*
11
 * Test CMP DER parsing.
12
 */
13
14
#include <openssl/bio.h>
15
#include <openssl/cmp.h>
16
#include "../crypto/cmp/cmp_local.h"
17
#include <openssl/err.h>
18
#include "fuzzer.h"
19
20
int FuzzerInitialize(int *argc, char ***argv)
21
216
{
22
216
    FuzzerSetRand();
23
216
    OPENSSL_init_crypto(OPENSSL_INIT_LOAD_CRYPTO_STRINGS, NULL);
24
216
    ERR_clear_error();
25
216
    CRYPTO_free_ex_index(0, -1);
26
216
    return 1;
27
216
}
28
29
static int num_responses;
30
31
static OSSL_CMP_MSG *transfer_cb(OSSL_CMP_CTX *ctx, const OSSL_CMP_MSG *req)
32
0
{
33
0
    if (num_responses++ > 2)
34
0
        return NULL; /* prevent loops due to repeated pollRep */
35
0
    return OSSL_CMP_MSG_dup((OSSL_CMP_MSG *)
36
0
            OSSL_CMP_CTX_get_transfer_cb_arg(ctx));
37
0
}
38
39
static int print_noop(const char *func, const char *file, int line,
40
    OSSL_CMP_severity level, const char *msg)
41
394k
{
42
394k
    return 1;
43
394k
}
44
45
static int allow_unprotected(const OSSL_CMP_CTX *ctx, const OSSL_CMP_MSG *rep,
46
    int invalid_protection, int expected_type)
47
32.6k
{
48
32.6k
    return 1;
49
32.6k
}
50
51
static void cmp_client_process_response(OSSL_CMP_CTX *ctx, OSSL_CMP_MSG *msg)
52
39.4k
{
53
39.4k
    X509_NAME *name = X509_NAME_new();
54
39.4k
    ASN1_INTEGER *serial = ASN1_INTEGER_new();
55
56
39.4k
    ctx->unprotectedSend = 1; /* satisfy ossl_cmp_msg_protect() */
57
39.4k
    ctx->disableConfirm = 1; /* check just one response message */
58
39.4k
    ctx->popoMethod = OSSL_CRMF_POPO_NONE; /* satisfy ossl_cmp_certReq_new() */
59
39.4k
    ctx->oldCert = X509_new(); /* satisfy crm_new() and ossl_cmp_rr_new() */
60
39.4k
    if (!OSSL_CMP_CTX_set1_secretValue(ctx, (unsigned char *)"",
61
39.4k
            0) /* prevent too unspecific error */
62
39.4k
        || ctx->oldCert == NULL
63
39.4k
        || name == NULL || !X509_set_issuer_name(ctx->oldCert, name)
64
39.4k
        || serial == NULL || !X509_set_serialNumber(ctx->oldCert, serial))
65
0
        goto err;
66
67
39.4k
    (void)OSSL_CMP_CTX_set_transfer_cb(ctx, transfer_cb);
68
39.4k
    (void)OSSL_CMP_CTX_set_transfer_cb_arg(ctx, msg);
69
39.4k
    (void)OSSL_CMP_CTX_set_log_cb(ctx, print_noop);
70
39.4k
    num_responses = 0;
71
39.4k
    switch (msg->body != NULL ? msg->body->type : -1) {
72
1.05k
    case OSSL_CMP_PKIBODY_IP:
73
1.05k
        (void)OSSL_CMP_exec_IR_ses(ctx);
74
1.05k
        break;
75
84
    case OSSL_CMP_PKIBODY_CP:
76
84
        (void)OSSL_CMP_exec_CR_ses(ctx);
77
84
        (void)OSSL_CMP_exec_P10CR_ses(ctx);
78
84
        break;
79
76
    case OSSL_CMP_PKIBODY_KUP:
80
76
        (void)OSSL_CMP_exec_KUR_ses(ctx);
81
76
        break;
82
373
    case OSSL_CMP_PKIBODY_POLLREP:
83
373
        ctx->status = OSSL_CMP_PKISTATUS_waiting;
84
373
        (void)OSSL_CMP_try_certreq(ctx, OSSL_CMP_PKIBODY_CR, NULL, NULL);
85
373
        break;
86
193
    case OSSL_CMP_PKIBODY_RP:
87
193
        (void)OSSL_CMP_exec_RR_ses(ctx);
88
193
        break;
89
1.00k
    case OSSL_CMP_PKIBODY_GENP:
90
1.00k
        sk_OSSL_CMP_ITAV_pop_free(OSSL_CMP_exec_GENM_ses(ctx),
91
1.00k
            OSSL_CMP_ITAV_free);
92
1.00k
        break;
93
36.7k
    default:
94
36.7k
        (void)ossl_cmp_msg_check_update(ctx, msg, allow_unprotected, 0);
95
36.7k
        break;
96
39.4k
    }
97
39.4k
err:
98
39.4k
    X509_NAME_free(name);
99
39.4k
    ASN1_INTEGER_free(serial);
100
39.4k
}
101
102
static OSSL_CMP_PKISI *process_cert_request(OSSL_CMP_SRV_CTX *srv_ctx,
103
    const OSSL_CMP_MSG *cert_req,
104
    int certReqId,
105
    const OSSL_CRMF_MSG *crm,
106
    const X509_REQ *p10cr,
107
    X509 **certOut,
108
    STACK_OF(X509) **chainOut,
109
    STACK_OF(X509) **caPubs)
110
6.45k
{
111
6.45k
    ERR_raise(ERR_LIB_CMP, CMP_R_ERROR_PROCESSING_MESSAGE);
112
6.45k
    return NULL;
113
6.45k
}
114
115
static OSSL_CMP_PKISI *process_rr(OSSL_CMP_SRV_CTX *srv_ctx,
116
    const OSSL_CMP_MSG *rr,
117
    const X509_NAME *issuer,
118
    const ASN1_INTEGER *serial)
119
73
{
120
73
    ERR_raise(ERR_LIB_CMP, CMP_R_ERROR_PROCESSING_MESSAGE);
121
73
    return NULL;
122
73
}
123
124
static int process_genm(OSSL_CMP_SRV_CTX *srv_ctx,
125
    const OSSL_CMP_MSG *genm,
126
    const STACK_OF(OSSL_CMP_ITAV) *in,
127
    STACK_OF(OSSL_CMP_ITAV) **out)
128
358
{
129
358
    ERR_raise(ERR_LIB_CMP, CMP_R_ERROR_PROCESSING_MESSAGE);
130
358
    return 0;
131
358
}
132
133
static void process_error(OSSL_CMP_SRV_CTX *srv_ctx, const OSSL_CMP_MSG *error,
134
    const OSSL_CMP_PKISI *statusInfo,
135
    const ASN1_INTEGER *errorCode,
136
    const OSSL_CMP_PKIFREETEXT *errorDetails)
137
800
{
138
800
    ERR_raise(ERR_LIB_CMP, CMP_R_ERROR_PROCESSING_MESSAGE);
139
800
}
140
141
static int process_certConf(OSSL_CMP_SRV_CTX *srv_ctx,
142
    const OSSL_CMP_MSG *certConf, int certReqId,
143
    const ASN1_OCTET_STRING *certHash,
144
    const OSSL_CMP_PKISI *si)
145
0
{
146
0
    ERR_raise(ERR_LIB_CMP, CMP_R_ERROR_PROCESSING_MESSAGE);
147
0
    return 0;
148
0
}
149
150
static int process_pollReq(OSSL_CMP_SRV_CTX *srv_ctx,
151
    const OSSL_CMP_MSG *pollReq, int certReqId,
152
    OSSL_CMP_MSG **certReq, int64_t *check_after)
153
56
{
154
56
    ERR_raise(ERR_LIB_CMP, CMP_R_ERROR_PROCESSING_MESSAGE);
155
56
    return 0;
156
56
}
157
158
int FuzzerTestOneInput(const uint8_t *buf, size_t len)
159
10.2k
{
160
10.2k
    OSSL_CMP_MSG *msg;
161
10.2k
    BIO *in;
162
163
10.2k
    if (len == 0)
164
0
        return 0;
165
166
10.2k
    in = BIO_new(BIO_s_mem());
167
10.2k
    OPENSSL_assert((size_t)BIO_write(in, buf, len) == len);
168
10.2k
    msg = d2i_OSSL_CMP_MSG_bio(in, NULL);
169
10.2k
    if (msg != NULL) {
170
6.98k
        BIO *out = BIO_new(BIO_s_null());
171
6.98k
        OSSL_CMP_SRV_CTX *srv_ctx = OSSL_CMP_SRV_CTX_new(NULL, NULL);
172
6.98k
        OSSL_CMP_CTX *client_ctx = OSSL_CMP_CTX_new(NULL, NULL);
173
174
6.98k
        i2d_OSSL_CMP_MSG_bio(out, msg);
175
6.98k
        ASN1_item_print(out, (ASN1_VALUE *)msg, 4,
176
6.98k
            ASN1_ITEM_rptr(OSSL_CMP_MSG), NULL);
177
6.98k
        BIO_free(out);
178
179
6.98k
        if (client_ctx != NULL)
180
6.98k
            cmp_client_process_response(client_ctx, msg);
181
6.98k
        if (srv_ctx != NULL
182
6.98k
            && OSSL_CMP_CTX_set_log_cb(OSSL_CMP_SRV_CTX_get0_cmp_ctx(srv_ctx),
183
6.98k
                print_noop)
184
6.98k
            && OSSL_CMP_SRV_CTX_init(srv_ctx, NULL, process_cert_request,
185
6.98k
                process_rr, process_genm, process_error,
186
6.98k
                process_certConf, process_pollReq))
187
6.98k
            OSSL_CMP_MSG_free(OSSL_CMP_SRV_process_request(srv_ctx, msg));
188
189
6.98k
        OSSL_CMP_CTX_free(client_ctx);
190
6.98k
        OSSL_CMP_SRV_CTX_free(srv_ctx);
191
6.98k
        OSSL_CMP_MSG_free(msg);
192
6.98k
    }
193
194
10.2k
    BIO_free(in);
195
10.2k
    ERR_clear_error();
196
197
10.2k
    return 0;
198
10.2k
}
199
200
void FuzzerCleanup(void)
201
0
{
202
0
    FuzzerClearRand();
203
0
}