X-Git-Url: https://git.openssl.org/gitweb/?a=blobdiff_plain;f=fuzz%2Fbignum.c;h=43e134bc141081db6fc0d7848fa828ada33a7263;hb=255af26c5d8039ee009a0ee718fbdc4023d045ec;hp=28a439e7d72f2d4950300a01186dd9ee63442bcd;hpb=c38bb72797916f2a0ab9906aad29162ca8d53546;p=openssl.git diff --git a/fuzz/bignum.c b/fuzz/bignum.c index 28a439e7d7..43e134bc14 100644 --- a/fuzz/bignum.c +++ b/fuzz/bignum.c @@ -17,15 +17,20 @@ #include #include "fuzzer.h" -int LLVMFuzzerTestOneInput(const uint8_t *buf, size_t len) { - int success = 0; +int FuzzerInitialize(int *argc, char ***argv) { + return 1; +} + +int FuzzerTestOneInput(const uint8_t *buf, size_t len) { static BN_CTX *ctx; - static BN_MONT_CTX *mont; static BIGNUM *b1; static BIGNUM *b2; static BIGNUM *b3; static BIGNUM *b4; static BIGNUM *b5; + int success = 0; + size_t l1 = 0, l2 = 0, l3 = 0; + int s1 = 0, s2 = 0, s3 = 0; if (ctx == NULL) { b1 = BN_new(); @@ -34,13 +39,11 @@ int LLVMFuzzerTestOneInput(const uint8_t *buf, size_t len) { b4 = BN_new(); b5 = BN_new(); ctx = BN_CTX_new(); - mont = BN_MONT_CTX_new(); } - // Divide the input into three parts, using the values of the first two - // bytes to choose lengths, which generate b1, b2 and b3. Use three bits - // of the third byte to choose signs for the three numbers. - size_t l1 = 0, l2 = 0, l3 = 0; - int s1 = 0, s2 = 0, s3 = 0; + /* Divide the input into three parts, using the values of the first two + * bytes to choose lengths, which generate b1, b2 and b3. Use three bits + * of the third byte to choose signs for the three numbers. + */ if (len > 2) { len -= 3; l1 = (buf[0] * len) / 255; @@ -61,7 +64,7 @@ int LLVMFuzzerTestOneInput(const uint8_t *buf, size_t len) { OPENSSL_assert(BN_bin2bn(buf + l1 + l2, l3, b3) == b3); BN_set_negative(b3, s3); - // mod 0 is undefined + /* mod 0 is undefined */ if (BN_is_zero(b3)) { success = 1; goto done;