Update X509 fuzzer to verify a chain
authorKurt Roeckx <kurt@roeckx.be>
Sun, 18 Dec 2022 19:54:15 +0000 (20:54 +0100)
committerHugo Landau <hlandau@openssl.org>
Fri, 1 Sep 2023 09:14:25 +0000 (10:14 +0100)
commit869d95b00e22b68897a541abf3bcee3589d2d519
treed1e9484e32849d06d98438d89734e68b31d2d869
parent63cecc23e1b9b60c2dd030e887fee810f29ac197
Update X509 fuzzer to verify a chain

It add supports for verifying that it's been signed by a CA, and
checks the CRL and OCSP status

Can find CVE-2022-4203 and CVE-2023-0286

Reviewed-by: Bernd Edlinger <bernd.edlinger@hotmail.de>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com>
Reviewed-by: Hugo Landau <hlandau@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/20243)

(cherry picked from commit 399c2da08ab9c6a382f8e9950742a022e847fec0)
fuzz/build.info
fuzz/x509.c
test/recipes/99-test_fuzz_x509.t