X-Git-Url: https://git.openssl.org/?a=blobdiff_plain;f=fuzz%2Fbignum.c;h=c5136601b1b1f714cd3d72bb0369a0a0174095db;hb=d0123525cd82be320f6b8b91ca287a2e572341cc;hp=643e6e7c658259d0234825937ba70fceaa4173ad;hpb=f59d0131cb6fc224aee0a0a92de1f04cdebe97c8;p=openssl.git diff --git a/fuzz/bignum.c b/fuzz/bignum.c index 643e6e7c65..c5136601b1 100644 --- a/fuzz/bignum.c +++ b/fuzz/bignum.c @@ -15,32 +15,41 @@ #include #include +#include #include "fuzzer.h" -int FuzzerTestOneInput(const uint8_t *buf, size_t len) { - int success = 0; - static BN_CTX *ctx; - static BN_MONT_CTX *mont; - static BIGNUM *b1; - static BIGNUM *b2; - static BIGNUM *b3; - static BIGNUM *b4; - static BIGNUM *b5; - if (ctx == NULL) { - b1 = BN_new(); - b2 = BN_new(); - b3 = BN_new(); - b4 = BN_new(); - b5 = BN_new(); - ctx = BN_CTX_new(); - mont = BN_MONT_CTX_new(); - } - // Divide the input into three parts, using the values of the first two - // bytes to choose lengths, which generate b1, b2 and b3. Use three bits - // of the third byte to choose signs for the three numbers. +int FuzzerInitialize(int *argc, char ***argv) +{ + OPENSSL_init_crypto(OPENSSL_INIT_LOAD_CRYPTO_STRINGS, NULL); + ERR_get_state(); + + return 1; +} + +int FuzzerTestOneInput(const uint8_t *buf, size_t len) +{ + int success = 0; size_t l1 = 0, l2 = 0, l3 = 0; - int s1 = 0, s2 = 0, s3 = 0; + int s1 = 0, s3 = 0; + BN_CTX *ctx; + BIGNUM *b1; + BIGNUM *b2; + BIGNUM *b3; + BIGNUM *b4; + BIGNUM *b5; + + b1 = BN_new(); + b2 = BN_new(); + b3 = BN_new(); + b4 = BN_new(); + b5 = BN_new(); + ctx = BN_CTX_new(); + + /* Divide the input into three parts, using the values of the first two + * bytes to choose lengths, which generate b1, b2 and b3. Use three bits + * of the third byte to choose signs for the three numbers. + */ if (len > 2) { len -= 3; l1 = (buf[0] * len) / 255; @@ -50,18 +59,16 @@ int FuzzerTestOneInput(const uint8_t *buf, size_t len) { l3 = len - l1 - l2; s1 = buf[0] & 1; - s2 = buf[0] & 2; s3 = buf[0] & 4; ++buf; } OPENSSL_assert(BN_bin2bn(buf, l1, b1) == b1); BN_set_negative(b1, s1); OPENSSL_assert(BN_bin2bn(buf + l1, l2, b2) == b2); - BN_set_negative(b2, s2); OPENSSL_assert(BN_bin2bn(buf + l1 + l2, l3, b3) == b3); BN_set_negative(b3, s3); - // mod 0 is undefined + /* mod 0 is undefined */ if (BN_is_zero(b3)) { success = 1; goto done; @@ -86,6 +93,17 @@ int FuzzerTestOneInput(const uint8_t *buf, size_t len) { done: OPENSSL_assert(success); + BN_free(b1); + BN_free(b2); + BN_free(b3); + BN_free(b4); + BN_free(b5); + BN_CTX_free(ctx); + ERR_clear_error(); return 0; } + +void FuzzerCleanup(void) +{ +}