/src/cryptofuzz-fastmath/modules/wolfcrypt/bn_helper.cpp
Line | Count | Source (jump to first uncovered line) |
1 | | #include "bn_ops.h" |
2 | | #include <iostream> |
3 | | |
4 | | namespace cryptofuzz { |
5 | | namespace module { |
6 | | |
7 | | namespace wolfCrypt_detail { |
8 | | #if defined(CRYPTOFUZZ_WOLFCRYPT_ALLOCATION_FAILURES) |
9 | | extern bool disableAllocationFailures; |
10 | | extern bool haveAllocFailure; |
11 | | #endif |
12 | | } /* namespace wolfCrypt_detail */ |
13 | | |
14 | | namespace wolfCrypt_bignum { |
15 | | |
16 | 0 | Bignum::read_radix_error_t Bignum::read_radix(mp_int* dest, const std::string& str, const size_t base) { |
17 | 0 | return read_radix(dest, str.c_str(), base); |
18 | 0 | } |
19 | | |
20 | 0 | Bignum::read_radix_error_t Bignum::read_radix(mp_int* dest, const char* str, const size_t base) { |
21 | 0 | Bignum::read_radix_error_t ret; |
22 | | |
23 | | /* Create a temporary variable for storing the result of mp_read_radix, |
24 | | * because if mp_read_radix fails (e.g. due to allocation failure), |
25 | | * it will set the value of the destination variable to 0. |
26 | | * |
27 | | * See OSS-Fuzz 31709 / ZD 11834 for discussion. */ |
28 | 0 | auto newMp = (mp_int*)util::malloc(sizeof(mp_int)); |
29 | 0 | if ( mp_init(newMp) != MP_OKAY ) { |
30 | 0 | util::free(newMp); |
31 | 0 | return READ_RADIX_FAIL_MEMORY; |
32 | 0 | } |
33 | | |
34 | 0 | wolfCrypt_detail::haveAllocFailure = false; |
35 | 0 | if ( mp_read_radix(newMp, str, base) != MP_OKAY ) { |
36 | 0 | ret = wolfCrypt_detail::haveAllocFailure ? READ_RADIX_FAIL_MEMORY : READ_RADIX_FAIL_OTHER; |
37 | 0 | goto end; |
38 | 0 | } |
39 | | |
40 | 0 | wolfCrypt_detail::haveAllocFailure = false; |
41 | 0 | if ( mp_copy(newMp, dest) != MP_OKAY ) { |
42 | 0 | ret = wolfCrypt_detail::haveAllocFailure ? READ_RADIX_FAIL_MEMORY : READ_RADIX_FAIL_OTHER; |
43 | 0 | goto end; |
44 | 0 | } |
45 | | |
46 | 0 | ret = READ_RADIX_OK; |
47 | |
|
48 | 0 | end: |
49 | 0 | CF_NORET(mp_clear(newMp)); |
50 | 0 | util::free(newMp); |
51 | |
|
52 | 0 | return ret; |
53 | 0 | } |
54 | | |
55 | 0 | void Bignum::baseConversion(void) const { |
56 | 0 | #if !defined(WOLFSSL_SP_MATH) |
57 | 0 | uint8_t base = 2; |
58 | 0 | char* str = nullptr; |
59 | |
|
60 | 0 | try { base = ds.Get<uint8_t>(); } catch ( fuzzing::datasource::Datasource::OutOfData ) { } |
61 | |
|
62 | | #if defined(CRYPTOFUZZ_WOLFCRYPT_DEBUG) |
63 | | std::cout << "Convert to base " << std::to_string(base) << " and back" << std::endl; |
64 | | #endif |
65 | 0 | { |
66 | 0 | int size; |
67 | 0 | CF_CHECK_EQ(mp_radix_size(mp, base, &size), MP_OKAY); |
68 | 0 | CF_ASSERT(size > 0, "Output of mp_radix_size is 0 or less"); |
69 | |
|
70 | 0 | str = (char*)util::malloc(size); |
71 | |
|
72 | | #if defined(WOLFSSL_SP_MATH) || defined(WOLFSSL_SP_MATH_ALL) || !defined(USE_FAST_MATH) |
73 | | CF_CHECK_EQ(mp_toradix(mp, str, base), MP_OKAY); |
74 | | #else |
75 | 0 | wolfCrypt_detail::haveAllocFailure = false; |
76 | 0 | CF_ASSERT( |
77 | 0 | mp_toradix(mp, str, base) == MP_OKAY || |
78 | 0 | wolfCrypt_detail::haveAllocFailure || |
79 | 0 | base < 2 || |
80 | 0 | base > 64, |
81 | 0 | "wolfCrypt cannot convert mp to string"); |
82 | | |
83 | | /* If allocation failure occurred, then do not use 'str' */ |
84 | 0 | CF_CHECK_FALSE(wolfCrypt_detail::haveAllocFailure); |
85 | 0 | #endif |
86 | |
|
87 | 0 | { |
88 | 0 | const auto ret = read_radix(mp, str, base); |
89 | 0 | CF_ASSERT(ret == READ_RADIX_OK || ret == READ_RADIX_FAIL_MEMORY, "wolfCrypt cannot parse the output of mp_toradix"); |
90 | 0 | } |
91 | 0 | } |
92 | | |
93 | 0 | end: |
94 | 0 | util::free(str); |
95 | 0 | #endif |
96 | 0 | } |
97 | | |
98 | 1.36k | void Bignum::binaryConversion(void) const { |
99 | 1.36k | uint8_t* data = nullptr; |
100 | 1.36k | CF_CHECK_EQ(mp_isneg(mp), 0); |
101 | | |
102 | | #if LIBWOLFSSL_VERSION_HEX == 0x05005001 |
103 | | { |
104 | | /* Old version of the binary conversion logic, which doesn't crash if |
105 | | * mp_to_unsigned_bin_len() succeeds with an undersized buffer. |
106 | | * |
107 | | * This logic is retained specifically to prevent the libecc |
108 | | * OSS-Fuzz fuzzer from crashing, because this uses an older version |
109 | | * of wolfCrypt (specifically 0x05005001), which still has the |
110 | | * mp_to_unsigned_bin_len() bug. |
111 | | */ |
112 | | |
113 | | const auto size = mp_unsigned_bin_size(mp); |
114 | | CF_ASSERT(size >= 0, "mp_unsigned_bin_size returned negative value"); |
115 | | |
116 | | data = util::malloc(size); |
117 | | CF_CHECK_EQ(mp_to_unsigned_bin_len(mp, data, size), MP_OKAY); |
118 | | |
119 | | /* Ensure no allocation failure occurs in mp_read_unsigned_bin |
120 | | * because this can leave the mp in a corrupted state |
121 | | */ |
122 | | const auto cached_disableAllocationFailures = wolfCrypt_detail::disableAllocationFailures; |
123 | | wolfCrypt_detail::disableAllocationFailures = true; |
124 | | |
125 | | CF_ASSERT(mp_read_unsigned_bin(mp, data, size) == MP_OKAY, "Cannot parse output of mp_to_unsigned_bin_len"); |
126 | | |
127 | | wolfCrypt_detail::disableAllocationFailures = cached_disableAllocationFailures; |
128 | | } |
129 | | #else |
130 | 1.19k | { |
131 | 1.19k | bool randomSize = false; |
132 | | |
133 | 1.19k | try { randomSize = ds.Get<bool>(); } catch ( fuzzing::datasource::Datasource::OutOfData ) { } |
134 | | |
135 | 1.19k | size_t size = 0; |
136 | 1.19k | int numBits = 0; |
137 | | |
138 | 1.19k | if ( randomSize == false ) { |
139 | 528 | const auto size2 = mp_unsigned_bin_size(mp); |
140 | 528 | CF_ASSERT(size2 >= 0, "mp_unsigned_bin_size returned negative value"); |
141 | 528 | size = size2; |
142 | 667 | } else { |
143 | 667 | try { |
144 | 667 | size = ds.Get<uint16_t>(); |
145 | 667 | } catch ( fuzzing::datasource::Datasource::OutOfData ) { } |
146 | | |
147 | 667 | numBits = mp_count_bits(mp); |
148 | 667 | CF_ASSERT(numBits >= 0, "mp_count_bits result is negative"); |
149 | 667 | } |
150 | | |
151 | 1.19k | data = util::malloc(size); |
152 | 1.19k | CF_CHECK_EQ(mp_to_unsigned_bin_len(mp, data, size), MP_OKAY); |
153 | | |
154 | 570 | CF_ASSERT( |
155 | 570 | size * 8 >= static_cast<size_t>(numBits), |
156 | 570 | "mp_to_unsigned_bin_len succeeded with undersized buffer"); |
157 | | |
158 | | /* Ensure no allocation failure occurs in mp_read_unsigned_bin |
159 | | * because this can leave the mp in a corrupted state |
160 | | */ |
161 | 570 | const auto cached_disableAllocationFailures = wolfCrypt_detail::disableAllocationFailures; |
162 | 570 | wolfCrypt_detail::disableAllocationFailures = true; |
163 | | |
164 | 570 | if ( randomSize == false ) { |
165 | 338 | CF_ASSERT(mp_read_unsigned_bin(mp, data, size) == MP_OKAY, "Cannot parse output of mp_to_unsigned_bin_len"); |
166 | 338 | } else { |
167 | | /* mp_read_unsigned_bin can fail if the input buffer is too large. |
168 | | * |
169 | | * Read into a temp variable, and copy to mp if reading succeeds, otherwise |
170 | | * retain old value in mp. |
171 | | */ |
172 | 232 | Bignum tmp(ds); |
173 | 232 | if ( mp_read_unsigned_bin(tmp.GetPtrDirect(), data, size) == MP_OKAY ) { |
174 | 232 | /* ignore result */ mp_copy(tmp.GetPtrDirect(), mp); |
175 | 232 | } |
176 | 232 | } |
177 | | |
178 | 570 | wolfCrypt_detail::disableAllocationFailures = cached_disableAllocationFailures; |
179 | 570 | } |
180 | 0 | #endif |
181 | | |
182 | | |
183 | 1.36k | end: |
184 | 1.36k | util::free(data); |
185 | 1.36k | } |
186 | | |
187 | | void Bignum::invariants(void) const { |
188 | | #if defined(WOLFSSL_SP_MATH) || defined(WOLFSSL_SP_MATH_ALL) |
189 | | CF_ASSERT(mp->used <= mp->size, "used is larger than size"); |
190 | | #elif !defined(USE_FAST_MATH) |
191 | | CF_ASSERT(mp->used <= mp->alloc, "used is larger than size"); |
192 | | #endif |
193 | | } |
194 | | |
195 | | Bignum::Bignum(Datasource& ds, const bool mp_init_size_ok) : |
196 | 197k | ds(ds) { |
197 | 197k | mp = (mp_int*)util::malloc(sizeof(mp_int)); |
198 | | |
199 | 197k | if ( init_mp_int(mp, ds, mp_init_size_ok) != MP_OKAY ) { |
200 | 0 | util::free(mp); |
201 | 0 | throw std::exception(); |
202 | 0 | } |
203 | 197k | } |
204 | | |
205 | | Bignum::Bignum(mp_int* mp, Datasource& ds) : |
206 | 0 | mp(mp), |
207 | 0 | ds(ds), |
208 | 0 | noFree(true) |
209 | 0 | { } |
210 | | |
211 | | Bignum::Bignum(const Bignum& other) : |
212 | 103k | ds(other.ds) { |
213 | 103k | mp = (mp_int*)util::malloc(sizeof(mp_int)); |
214 | 103k | if ( init_mp_int(mp, ds) != MP_OKAY ) { |
215 | 0 | util::free(mp); |
216 | 0 | throw std::exception(); |
217 | 0 | } |
218 | 103k | if ( mp_copy(other.mp, mp) != MP_OKAY ) { |
219 | 117 | util::free(mp); |
220 | 117 | throw std::exception(); |
221 | 117 | } |
222 | 103k | } |
223 | | |
224 | | Bignum::Bignum(const Bignum&& other) : |
225 | 104k | ds(other.ds) { |
226 | 104k | mp = (mp_int*)util::malloc(sizeof(mp_int)); |
227 | 104k | if ( init_mp_int(mp, ds) != MP_OKAY ) { |
228 | 0 | util::free(mp); |
229 | 0 | throw std::exception(); |
230 | 0 | } |
231 | 104k | if ( mp_copy(other.mp, mp) != MP_OKAY ) { |
232 | 679 | util::free(mp); |
233 | 679 | throw std::exception(); |
234 | 679 | } |
235 | 104k | } |
236 | | |
237 | 411k | Bignum::~Bignum() { |
238 | 411k | invariants(); |
239 | 411k | if ( noFree == false ) { |
240 | 404k | CF_NORET(mp_clear(mp)); |
241 | 404k | util::free(mp); |
242 | 404k | } |
243 | 411k | } |
244 | | |
245 | 0 | void Bignum::SetNoFree(void) { |
246 | 0 | noFree = true; |
247 | 0 | } |
248 | | |
249 | 138k | bool Bignum::Set(const std::string s) { |
250 | 138k | bool ret = false; |
251 | | |
252 | 138k | bool hex = false; |
253 | 138k | try { |
254 | 138k | hex = ds.Get<bool>(); |
255 | 138k | } catch ( ... ) { } |
256 | | |
257 | | #if defined(WOLFSSL_SP_MATH) |
258 | | hex = true; |
259 | | #endif |
260 | | |
261 | 138k | if ( hex == true ) { |
262 | 13.0k | CF_CHECK_EQ(read_radix(mp, util::DecToHex(s), 16), READ_RADIX_OK); |
263 | 125k | } else { |
264 | 125k | CF_CHECK_EQ(read_radix(mp, s, 10), READ_RADIX_OK); |
265 | 124k | } |
266 | | |
267 | 136k | ret = true; |
268 | 138k | end: |
269 | 138k | return ret; |
270 | 136k | } |
271 | | |
272 | 18.1k | bool Bignum::Set(const component::Bignum i) { |
273 | 18.1k | bool ret = false; |
274 | | |
275 | 18.1k | CF_CHECK_EQ(Set(i.ToString()), true); |
276 | | |
277 | 17.5k | ret = true; |
278 | 18.1k | end: |
279 | 18.1k | return ret; |
280 | 17.5k | } |
281 | | |
282 | | mp_int* Bignum::GetPtr(void) const { |
283 | | invariants(); |
284 | | |
285 | | { |
286 | | /* Optionally clamp the bignum. This should not affect its value. */ |
287 | | |
288 | | bool clamp = false; |
289 | | |
290 | | try { clamp = ds.Get<bool>(); } catch ( fuzzing::datasource::Datasource::OutOfData ) { } |
291 | | |
292 | | if ( clamp ) { |
293 | | /* Implemented as a macro so CF_NORET cannot be used here */ |
294 | | /* noret */ mp_clamp(mp); |
295 | | } |
296 | | } |
297 | | |
298 | | { |
299 | | /* Optionally convert to a random base and back */ |
300 | | |
301 | | bool convert = false; |
302 | | |
303 | | try { convert = ds.Get<bool>(); } catch ( fuzzing::datasource::Datasource::OutOfData ) { } |
304 | | |
305 | | if ( convert ) { |
306 | | baseConversion(); |
307 | | } |
308 | | } |
309 | | |
310 | | { |
311 | | /* Optionally convert to bytes and back */ |
312 | | |
313 | | bool convert = false; |
314 | | |
315 | | try { convert = ds.Get<bool>(); } catch ( fuzzing::datasource::Datasource::OutOfData ) { } |
316 | | |
317 | | if ( convert ) { |
318 | | binaryConversion(); |
319 | | } |
320 | | } |
321 | | |
322 | | return mp; |
323 | | } |
324 | | |
325 | 129k | mp_int* Bignum::GetPtrDirect(void) const { |
326 | 129k | return mp; |
327 | 129k | } |
328 | | |
329 | 487 | std::optional<uint64_t> Bignum::AsUint64(void) const { |
330 | 487 | std::optional<uint64_t> ret = std::nullopt; |
331 | 487 | uint64_t v = 0; |
332 | | |
333 | 487 | #if !defined(WOLFSSL_SP_MATH) |
334 | 487 | CF_CHECK_EQ(mp_isneg(mp), 0); |
335 | 467 | #endif |
336 | 467 | CF_CHECK_LTE(mp_count_bits(mp), (int)(sizeof(v) * 8)); |
337 | 454 | CF_CHECK_EQ(mp_to_unsigned_bin_len(mp, (uint8_t*)&v, sizeof(v)), MP_OKAY); |
338 | 450 | v = |
339 | 450 | ((v & 0xFF00000000000000) >> 56) | |
340 | 450 | ((v & 0x00FF000000000000) >> 40) | |
341 | 450 | ((v & 0x0000FF0000000000) >> 24) | |
342 | 450 | ((v & 0x000000FF00000000) >> 8) | |
343 | 450 | ((v & 0x00000000FF000000) << 8) | |
344 | 450 | ((v & 0x0000000000FF0000) << 24) | |
345 | 450 | ((v & 0x000000000000FF00) << 40) | |
346 | 450 | ((v & 0x00000000000000FF) << 56); |
347 | | |
348 | 450 | ret = v; |
349 | 487 | end: |
350 | 487 | return ret; |
351 | 450 | } |
352 | | |
353 | 27.9k | std::optional<std::string> Bignum::ToDecString(void) { |
354 | 27.9k | std::optional<std::string> ret = std::nullopt; |
355 | 27.9k | char* str = nullptr; |
356 | | |
357 | | #if defined(WOLFSSL_SP_MATH) |
358 | | str = (char*)util::malloc(8192); |
359 | | |
360 | | CF_CHECK_EQ(mp_tohex(mp, str), MP_OKAY); |
361 | | ret = { util::HexToDec(str) }; |
362 | | #else |
363 | 27.9k | bool hex = false; |
364 | 27.9k | int size; |
365 | | |
366 | 27.9k | try { |
367 | 27.9k | hex = ds.Get<bool>(); |
368 | 27.9k | } catch ( ... ) { } |
369 | | |
370 | | |
371 | 27.9k | if ( hex == true ) { |
372 | 1.49k | CF_CHECK_EQ(mp_radix_size(mp, 16, &size), MP_OKAY); |
373 | 1.41k | CF_ASSERT(size > 0, "Output of mp_radix_size is 0 or less"); |
374 | | |
375 | 1.41k | str = (char*)util::malloc(size+1); |
376 | | |
377 | 1.41k | CF_CHECK_EQ(mp_tohex(mp, str), MP_OKAY); |
378 | 1.40k | ret = { util::HexToDec(str) }; |
379 | 26.4k | } else { |
380 | 26.4k | CF_CHECK_EQ(mp_radix_size(mp, 10, &size), MP_OKAY); |
381 | 25.9k | CF_ASSERT(size > 0, "Output of mp_radix_size is 0 or less"); |
382 | | |
383 | 25.9k | str = (char*)util::malloc(size); |
384 | | |
385 | 25.9k | CF_CHECK_EQ(mp_toradix(mp, str, 10), MP_OKAY); |
386 | 25.7k | ret = std::string(str); |
387 | 25.7k | } |
388 | 27.1k | #endif |
389 | | |
390 | 27.9k | end: |
391 | 27.9k | free(str); |
392 | | |
393 | 27.9k | return ret; |
394 | 27.9k | } |
395 | | |
396 | 13.8k | std::optional<component::Bignum> Bignum::ToComponentBignum(void) { |
397 | 13.8k | std::optional<component::Bignum> ret = std::nullopt; |
398 | | |
399 | 13.8k | auto str = ToDecString(); |
400 | 13.8k | CF_CHECK_NE(str, std::nullopt); |
401 | 13.4k | ret = { str }; |
402 | 13.8k | end: |
403 | 13.8k | return ret; |
404 | 13.4k | } |
405 | | |
406 | 11.6k | bool Bignum::ToBin(uint8_t* dest, const size_t size) { |
407 | 11.6k | bool ret = false; |
408 | | |
409 | 11.6k | const auto required = mp_unsigned_bin_size(GetPtr()); |
410 | 11.6k | CF_ASSERT(required >= 0, "mp_unsigned_bin_size returned negative value"); |
411 | | |
412 | 11.6k | CF_CHECK_GTE(size, static_cast<size_t>(required)); |
413 | 11.4k | CF_CHECK_EQ(mp_to_unsigned_bin_len(GetPtr(), dest, size), MP_OKAY); |
414 | | |
415 | 11.0k | ret = true; |
416 | 11.6k | end: |
417 | 11.6k | return ret; |
418 | 11.0k | } |
419 | | |
420 | | |
421 | 9.86k | std::optional<std::vector<uint8_t>> Bignum::ToBin(Datasource& ds, const component::Bignum b, std::optional<size_t> size) { |
422 | 9.86k | std::optional<std::vector<uint8_t>> ret = std::nullopt; |
423 | 9.86k | std::vector<uint8_t> v; |
424 | 9.86k | Bignum bn(ds); |
425 | 9.86k | uint16_t padding = 0; |
426 | | |
427 | 9.86k | CF_CHECK_EQ(bn.Set(b), true); |
428 | 9.48k | if ( size != std::nullopt ) { |
429 | 0 | v.resize(*size); |
430 | 9.48k | } else { |
431 | 9.48k | try { |
432 | 9.48k | padding = ds.Get<uint16_t>(); |
433 | 9.48k | } catch ( fuzzing::datasource::Datasource::OutOfData ) { } |
434 | | |
435 | 9.48k | v.resize( mp_unsigned_bin_size(bn.GetPtr()) + padding ); |
436 | 9.48k | } |
437 | | |
438 | 9.48k | CF_CHECK_EQ(bn.ToBin(v.data(), v.size()), true); |
439 | | |
440 | 9.05k | ret = v; |
441 | 9.86k | end: |
442 | 9.86k | return ret; |
443 | 9.05k | } |
444 | | |
445 | | bool Bignum::ToBin( |
446 | | Datasource& ds, |
447 | | const component::Bignum b, |
448 | | uint8_t* dest, |
449 | | const size_t size, |
450 | 9.69k | const bool mustSucceed) { |
451 | 9.69k | bool ret = false; |
452 | 9.69k | if ( mustSucceed == true ) { |
453 | 7.85k | std::optional<std::vector<uint8_t>> bytes; |
454 | 7.85k | CF_CHECK_NE(bytes = util::DecToBin(b.ToTrimmedString(), size), std::nullopt); |
455 | 7.66k | memcpy(dest, bytes->data(), bytes->size()); |
456 | 7.66k | ret = true; |
457 | 7.66k | } else { |
458 | 1.83k | Bignum bn(ds); |
459 | | |
460 | 1.83k | CF_CHECK_EQ(bn.Set(b), true); |
461 | 1.70k | CF_CHECK_EQ(bn.ToBin(dest, size), true); |
462 | | |
463 | 1.64k | ret = true; |
464 | 1.64k | } |
465 | 9.69k | end: |
466 | 9.69k | return ret; |
467 | 9.69k | } |
468 | | |
469 | | bool Bignum::ToBin( |
470 | | Datasource& ds, |
471 | | const component::BignumPair b, |
472 | | uint8_t* dest, |
473 | | const size_t size, |
474 | 2.57k | const bool mustSucceed) { |
475 | 2.57k | CF_ASSERT((size % 2) == 0, "Input size is not multiple of 2 in Bignum::ToBin"); |
476 | | |
477 | 2.57k | bool ret = false; |
478 | 2.57k | const auto halfSize = size / 2; |
479 | | |
480 | 2.57k | CF_CHECK_EQ(ToBin(ds, b.first, dest, halfSize, mustSucceed), true); |
481 | 2.51k | CF_CHECK_EQ(ToBin(ds, b.second, dest + halfSize, halfSize, mustSucceed), true); |
482 | | |
483 | 2.45k | ret = true; |
484 | 2.57k | end: |
485 | 2.57k | return ret; |
486 | 2.45k | } |
487 | | |
488 | 1.94k | std::optional<component::Bignum> Bignum::BinToBignum(Datasource& ds, const uint8_t* src, const size_t size) { |
489 | 1.94k | std::optional<component::Bignum> ret = std::nullopt; |
490 | | |
491 | 1.94k | wolfCrypt_bignum::Bignum bn(ds); |
492 | 1.94k | CF_CHECK_EQ(mp_read_unsigned_bin(bn.GetPtr(), src, size), MP_OKAY); |
493 | | |
494 | 1.80k | ret = bn.ToComponentBignum(); |
495 | | |
496 | 1.94k | end: |
497 | 1.94k | return ret; |
498 | 1.80k | } |
499 | | |
500 | 1.32k | std::optional<component::BignumPair> Bignum::BinToBignumPair(Datasource& ds, const uint8_t* src, const size_t size) { |
501 | 1.32k | CF_ASSERT((size % 2) == 0, "Input size is not multiple of 2 in Bignum::BinToBignumPair"); |
502 | | |
503 | 1.32k | std::optional<component::BignumPair> ret = std::nullopt; |
504 | 1.32k | std::optional<component::Bignum> A, B; |
505 | 1.32k | const auto halfSize = size / 2; |
506 | | |
507 | 1.32k | { |
508 | 1.32k | wolfCrypt_bignum::Bignum bn(ds); |
509 | 1.32k | CF_CHECK_EQ(mp_read_unsigned_bin(bn.GetPtr(), src, halfSize), MP_OKAY); |
510 | 1.30k | CF_CHECK_NE(A = bn.ToComponentBignum(), std::nullopt); |
511 | 1.27k | } |
512 | | |
513 | 0 | { |
514 | 1.27k | wolfCrypt_bignum::Bignum bn(ds); |
515 | 1.27k | CF_CHECK_EQ(mp_read_unsigned_bin(bn.GetPtr(), src + halfSize, halfSize), MP_OKAY); |
516 | 1.25k | CF_CHECK_NE(B = bn.ToComponentBignum(), std::nullopt); |
517 | 1.23k | } |
518 | | |
519 | | |
520 | 0 | ret = {A->ToTrimmedString(), B->ToTrimmedString()}; |
521 | | |
522 | 1.32k | end: |
523 | 1.32k | return ret; |
524 | 1.23k | } |
525 | | |
526 | 25.7k | void Bignum::Randomize(void) { |
527 | 25.7k | std::vector<uint8_t> data; |
528 | 25.7k | try { |
529 | 25.7k | data = ds.GetData(0, 1, 1024); |
530 | 25.7k | } catch ( fuzzing::datasource::Datasource::OutOfData ) { } |
531 | | |
532 | 25.7k | if ( !data.empty() ) { |
533 | 843 | /* ignore return value */ mp_read_unsigned_bin(GetPtrDirect(), data.data(), data.size()); |
534 | 843 | } |
535 | 25.7k | } |
536 | | |
537 | 3.55k | bool Bignum::operator==(const Bignum& rhs) const { |
538 | 3.55k | return mp_cmp(GetPtr(), rhs.GetPtr()) == MP_EQ; |
539 | 3.55k | } |
540 | | |
541 | | BignumCluster::BignumCluster(Datasource& ds, Bignum bn0, Bignum bn1, Bignum bn2, Bignum bn3) : |
542 | 25.8k | ds(ds), |
543 | 25.8k | bn({bn0, bn1, bn2, bn3}) |
544 | 25.8k | { } |
545 | | |
546 | 25.7k | BignumCluster::~BignumCluster() { |
547 | 128k | for (size_t i = 0; i < 4; i++) { |
548 | 102k | if ( cache.bn[i] == nullptr ) { |
549 | 2.55k | continue; |
550 | 2.55k | } |
551 | | |
552 | 100k | mp_clear(cache.bn[i]); |
553 | 100k | util::free(cache.bn[i]); |
554 | 100k | } |
555 | 25.7k | } |
556 | | |
557 | 39.2k | Bignum& BignumCluster::operator[](const size_t index) { |
558 | 39.2k | CF_ASSERT(index < bn.size(), "Invalid index requested in BignumCluster::operator[]"); |
559 | | |
560 | 39.2k | try { |
561 | | /* Rewire? */ |
562 | 39.2k | if ( ds.Get<bool>() == true ) { |
563 | | /* Pick a random bignum */ |
564 | 3.66k | const auto newIndex = ds.Get<uint8_t>() % 4; |
565 | | |
566 | | /* Same value? */ |
567 | 3.66k | if ( bn[newIndex] == bn[index] ) { |
568 | | /* Then return reference to other bignum */ |
569 | 1.33k | return bn[newIndex]; |
570 | 1.33k | } |
571 | | |
572 | | /* Fall through */ |
573 | 3.66k | } |
574 | 39.2k | } catch ( fuzzing::datasource::Datasource::OutOfData ) { } |
575 | | |
576 | 37.8k | return bn[index]; |
577 | 39.2k | } |
578 | | |
579 | 101k | bool BignumCluster::Set(const size_t index, const std::string s) { |
580 | 101k | CF_ASSERT(index < bn.size(), "Invalid index requested in BignumCluster::Set"); |
581 | | |
582 | 101k | return bn[index].Set(s); |
583 | 101k | } |
584 | | |
585 | 247 | mp_int* BignumCluster::GetDestPtr(const size_t index) { |
586 | | /* Because it is requested as a destination pointer, |
587 | | * this bignum will be altered, hence invalidate |
588 | | * the cache |
589 | | */ |
590 | 247 | InvalidateCache(); |
591 | | |
592 | 247 | return bn[index].GetPtr(); |
593 | 247 | } |
594 | | |
595 | 8.51k | mp_int* BignumCluster::GetResPtr(void) { |
596 | 8.51k | CF_ASSERT(res_index == std::nullopt, "Reusing result pointer"); |
597 | | |
598 | 8.51k | res_index = 0; |
599 | | |
600 | 8.51k | try { res_index = ds.Get<uint8_t>() % 4; } |
601 | 8.51k | catch ( fuzzing::datasource::Datasource::OutOfData ) { } |
602 | | |
603 | 8.51k | InvalidateCache(); |
604 | | |
605 | 8.51k | return bn[*res_index].GetPtr(); |
606 | 8.51k | } |
607 | | |
608 | | bool BignumCluster::CopyResult(Bignum& res) const { |
609 | | bool ret = false; |
610 | | |
611 | | CF_ASSERT(res_index != std::nullopt, "Result index is undefined"); |
612 | | wolfCrypt_detail::disableAllocationFailures = true; |
613 | | |
614 | | const auto src = bn[*res_index].GetPtrDirect(); |
615 | | auto dest = res.GetPtr(); |
616 | | |
617 | | if ( mp_copy(src, dest) != MP_OKAY ) { |
618 | | #if defined(USE_FAST_MATH) |
619 | | goto end; |
620 | | #elif defined(USE_INTEGER_HEAP_MATH) |
621 | | CF_NORET(mp_clear(dest)); |
622 | | CF_ASSERT(mp_init_size(dest, src->alloc) == 0, "Cannot initialze result"); |
623 | | CF_ASSERT( |
624 | | mp_copy(src, dest) == MP_OKAY, |
625 | | "mp_copy failed unexpectedly"); |
626 | | #else |
627 | | CF_NORET(mp_clear(dest)); |
628 | | CF_ASSERT(mp_init_size(dest, src->size) == 0, "Cannot initialze result"); |
629 | | CF_ASSERT( |
630 | | mp_copy(src, dest) == MP_OKAY, |
631 | | "mp_copy failed unexpectedly"); |
632 | | #endif |
633 | | } |
634 | | |
635 | | ret = true; |
636 | | #if defined(USE_FAST_MATH) |
637 | | end: |
638 | | #endif |
639 | | wolfCrypt_detail::disableAllocationFailures = false; |
640 | | return ret; |
641 | | } |
642 | | |
643 | 25.0k | void BignumCluster::Save(void) { |
644 | 125k | for (size_t i = 0; i < 4; i++) { |
645 | 100k | mp_int* cached_mp = (mp_int*)util::malloc(sizeof(mp_int)); |
646 | | |
647 | 100k | wolfCrypt_detail::disableAllocationFailures = true; |
648 | | |
649 | 100k | CF_ASSERT(mp_init(cached_mp) == MP_OKAY, "mp_init failed unexpectedly"); |
650 | 100k | CF_ASSERT(mp_copy(bn[i].GetPtrDirect(), cached_mp) == MP_OKAY, "mp_copy failed unexpectedly"); |
651 | | |
652 | 100k | wolfCrypt_detail::disableAllocationFailures = false; |
653 | | |
654 | 100k | cache.bn[i] = cached_mp; |
655 | 100k | } |
656 | 25.0k | } |
657 | | |
658 | 8.83k | void BignumCluster::InvalidateCache(void) { |
659 | 8.83k | cache.invalid = true; |
660 | 8.83k | } |
661 | | |
662 | 9.43k | bool BignumCluster::EqualsCache(void) const { |
663 | 9.43k | if ( cache.invalid == true ) { |
664 | 5.99k | return true; |
665 | 5.99k | } |
666 | | |
667 | 17.2k | for (size_t i = 0; i < 4; i++) { |
668 | 13.7k | if ( cache.bn[i] == nullptr ) { |
669 | 0 | continue; |
670 | 0 | } |
671 | | |
672 | 13.7k | wolfCrypt_detail::disableAllocationFailures = true; |
673 | | |
674 | 13.7k | if ( mp_cmp(bn[i].GetPtrDirect(), cache.bn[i]) != MP_EQ ) { |
675 | | #if defined(CRYPTOFUZZ_WOLFCRYPT_DEBUG) |
676 | | char str[8192]; |
677 | | |
678 | | std::cout << "Bignum with index " << std::to_string(i) << " was changed" << std::endl; |
679 | | |
680 | | wolfCrypt_detail::disableAllocationFailures = true; |
681 | | |
682 | | CF_ASSERT(mp_tohex(cache.bn[i], str) == MP_OKAY, "mp_tohex failed unexpectedly"); |
683 | | printf("it was: %s\n", str); |
684 | | |
685 | | CF_ASSERT(mp_tohex(bn[i].GetPtrDirect(), str) == MP_OKAY, "mp_tohex failed unexpectedly"); |
686 | | printf("it is now %s\n", str); |
687 | | |
688 | | #endif |
689 | 0 | wolfCrypt_detail::disableAllocationFailures = false; |
690 | |
|
691 | 0 | return false; |
692 | 0 | } |
693 | | |
694 | 13.7k | wolfCrypt_detail::disableAllocationFailures = false; |
695 | 13.7k | } |
696 | | |
697 | 3.44k | return true; |
698 | 3.44k | } |
699 | | |
700 | | } /* namespace wolfCrypt_bignum */ |
701 | | } /* namespace module */ |
702 | | } /* namespace cryptofuzz */ |