mirror of
https://github.com/openssl/openssl.git
synced 2024-12-21 06:09:35 +08:00
29696af689
These checks still take too long time on clusterfuzz so they are longer than the timeout limit. Reviewed-by: Neil Horman <nhorman@openssl.org> Reviewed-by: Kurt Roeckx <kurt@roeckx.be> (Merged from https://github.com/openssl/openssl/pull/24781)
97 lines
2.8 KiB
C
97 lines
2.8 KiB
C
/*
|
|
* Copyright 2023 The OpenSSL Project Authors. All Rights Reserved.
|
|
*
|
|
* Licensed under the Apache License 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
* https://www.openssl.org/source/license.html
|
|
* or in the file LICENSE in the source distribution.
|
|
*/
|
|
|
|
#include <openssl/decoder.h>
|
|
#include <openssl/err.h>
|
|
#include <openssl/rand.h>
|
|
#include "fuzzer.h"
|
|
|
|
static ASN1_PCTX *pctx;
|
|
|
|
int FuzzerInitialize(int *argc, char ***argv)
|
|
{
|
|
FuzzerSetRand();
|
|
|
|
OPENSSL_init_crypto(OPENSSL_INIT_LOAD_CRYPTO_STRINGS
|
|
| OPENSSL_INIT_ADD_ALL_CIPHERS
|
|
| OPENSSL_INIT_ADD_ALL_DIGESTS, NULL);
|
|
|
|
pctx = ASN1_PCTX_new();
|
|
ASN1_PCTX_set_flags(pctx, ASN1_PCTX_FLAGS_SHOW_ABSENT
|
|
| ASN1_PCTX_FLAGS_SHOW_SEQUENCE
|
|
| ASN1_PCTX_FLAGS_SHOW_SSOF
|
|
| ASN1_PCTX_FLAGS_SHOW_TYPE
|
|
| ASN1_PCTX_FLAGS_SHOW_FIELD_STRUCT_NAME);
|
|
ASN1_PCTX_set_str_flags(pctx, ASN1_STRFLGS_UTF8_CONVERT
|
|
| ASN1_STRFLGS_SHOW_TYPE
|
|
| ASN1_STRFLGS_DUMP_ALL);
|
|
|
|
ERR_clear_error();
|
|
CRYPTO_free_ex_index(0, -1);
|
|
return 1;
|
|
}
|
|
|
|
int FuzzerTestOneInput(const uint8_t *buf, size_t len)
|
|
{
|
|
OSSL_DECODER_CTX *dctx;
|
|
EVP_PKEY *pkey = NULL;
|
|
EVP_PKEY_CTX *ctx = NULL;
|
|
BIO *bio;
|
|
|
|
bio = BIO_new(BIO_s_null());
|
|
dctx = OSSL_DECODER_CTX_new_for_pkey(&pkey, NULL, NULL, NULL, 0, NULL,
|
|
NULL);
|
|
if (dctx == NULL) {
|
|
return 0;
|
|
}
|
|
if (OSSL_DECODER_from_data(dctx, &buf, &len)) {
|
|
EVP_PKEY *pkey2;
|
|
|
|
EVP_PKEY_print_public(bio, pkey, 1, pctx);
|
|
EVP_PKEY_print_private(bio, pkey, 1, pctx);
|
|
EVP_PKEY_print_params(bio, pkey, 1, pctx);
|
|
|
|
pkey2 = EVP_PKEY_dup(pkey);
|
|
OPENSSL_assert(pkey2 != NULL);
|
|
EVP_PKEY_eq(pkey, pkey2);
|
|
EVP_PKEY_free(pkey2);
|
|
|
|
ctx = EVP_PKEY_CTX_new(pkey, NULL);
|
|
/*
|
|
* Param check will take too long time on large DH parameters.
|
|
* Skip it.
|
|
*/
|
|
if ((!EVP_PKEY_is_a(pkey, "DH") && !EVP_PKEY_is_a(pkey, "DHX"))
|
|
|| EVP_PKEY_get_bits(pkey) <= 2048)
|
|
EVP_PKEY_param_check(ctx);
|
|
|
|
EVP_PKEY_public_check(ctx);
|
|
/* Private and pairwise checks are unbounded, skip for large keys. */
|
|
if (EVP_PKEY_get_bits(pkey) <= 4096) {
|
|
EVP_PKEY_private_check(ctx);
|
|
EVP_PKEY_pairwise_check(ctx);
|
|
}
|
|
OPENSSL_assert(ctx != NULL);
|
|
EVP_PKEY_CTX_free(ctx);
|
|
EVP_PKEY_free(pkey);
|
|
}
|
|
OSSL_DECODER_CTX_free(dctx);
|
|
|
|
BIO_free(bio);
|
|
ERR_clear_error();
|
|
return 0;
|
|
}
|
|
|
|
void FuzzerCleanup(void)
|
|
{
|
|
ASN1_PCTX_free(pctx);
|
|
FuzzerClearRand();
|
|
}
|