| lh | 9ed821d | 2023-04-07 01:36:19 -0700 | [diff] [blame] | 1 | /* | 
 | 2 |  * Copyright 2016 The OpenSSL Project Authors. All Rights Reserved. | 
 | 3 |  * | 
 | 4 |  * Licensed under the OpenSSL licenses, (the "License"); | 
 | 5 |  * you may not use this file except in compliance with the License. | 
 | 6 |  * You may obtain a copy of the License at | 
 | 7 |  * https://www.openssl.org/source/license.html | 
 | 8 |  * or in the file LICENSE in the source distribution. | 
 | 9 |  */ | 
 | 10 |  | 
 | 11 | /* | 
 | 12 |  * Confirm that if (d, r) = a / b, then b * d + r == a, and that sign(d) == | 
 | 13 |  * sign(a), and 0 <= r <= b | 
 | 14 |  */ | 
 | 15 |  | 
 | 16 | #include <stdio.h> | 
 | 17 | #include <openssl/bn.h> | 
 | 18 | #include <openssl/err.h> | 
 | 19 | #include "fuzzer.h" | 
 | 20 |  | 
 | 21 | /* 256 kB */ | 
 | 22 | #define MAX_LEN (256 * 1000) | 
 | 23 |  | 
 | 24 | static BN_CTX *ctx; | 
 | 25 | static BIGNUM *b1; | 
 | 26 | static BIGNUM *b2; | 
 | 27 | static BIGNUM *b3; | 
 | 28 | static BIGNUM *b4; | 
 | 29 | static BIGNUM *b5; | 
 | 30 |  | 
 | 31 | int FuzzerInitialize(int *argc, char ***argv) | 
 | 32 | { | 
 | 33 |     b1 = BN_new(); | 
 | 34 |     b2 = BN_new(); | 
 | 35 |     b3 = BN_new(); | 
 | 36 |     b4 = BN_new(); | 
 | 37 |     b5 = BN_new(); | 
 | 38 |     ctx = BN_CTX_new(); | 
 | 39 |  | 
 | 40 |     OPENSSL_init_crypto(OPENSSL_INIT_LOAD_CRYPTO_STRINGS, NULL); | 
 | 41 |     ERR_get_state(); | 
 | 42 |  | 
 | 43 |     return 1; | 
 | 44 | } | 
 | 45 |  | 
 | 46 | int FuzzerTestOneInput(const uint8_t *buf, size_t len) | 
 | 47 | { | 
 | 48 |     int success = 0; | 
 | 49 |     size_t l1 = 0, l2 = 0; | 
 | 50 |     /* s1 and s2 will be the signs for b1 and b2. */ | 
 | 51 |     int s1 = 0, s2 = 0; | 
 | 52 |  | 
 | 53 |     /* limit the size of the input to avoid timeout */ | 
 | 54 |     if (len > MAX_LEN) | 
 | 55 |         len = MAX_LEN; | 
 | 56 |  | 
 | 57 |     /* We are going to split the buffer in two, sizes l1 and l2, giving b1 and | 
 | 58 |      * b2. | 
 | 59 |      */ | 
 | 60 |     if (len > 0) { | 
 | 61 |         --len; | 
 | 62 |         /* Use first byte to divide the remaining buffer into 3Fths. I admit | 
 | 63 |          * this disallows some number sizes. If it matters, better ideas are | 
 | 64 |          * welcome (Ben). | 
 | 65 |          */ | 
 | 66 |         l1 = ((buf[0] & 0x3f) * len) / 0x3f; | 
 | 67 |         s1 = buf[0] & 0x40; | 
 | 68 |         s2 = buf[0] & 0x80; | 
 | 69 |         ++buf; | 
 | 70 |         l2 = len - l1; | 
 | 71 |     } | 
 | 72 |     OPENSSL_assert(BN_bin2bn(buf, l1, b1) == b1); | 
 | 73 |     BN_set_negative(b1, s1); | 
 | 74 |     OPENSSL_assert(BN_bin2bn(buf + l1, l2, b2) == b2); | 
 | 75 |     BN_set_negative(b2, s2); | 
 | 76 |  | 
 | 77 |     /* divide by 0 is an error */ | 
 | 78 |     if (BN_is_zero(b2)) { | 
 | 79 |         success = 1; | 
 | 80 |         goto done; | 
 | 81 |     } | 
 | 82 |  | 
 | 83 |     OPENSSL_assert(BN_div(b3, b4, b1, b2, ctx)); | 
 | 84 |     if (BN_is_zero(b1)) | 
 | 85 |         success = BN_is_zero(b3) && BN_is_zero(b4); | 
 | 86 |     else if (BN_is_negative(b1)) | 
 | 87 |         success = (BN_is_negative(b3) != BN_is_negative(b2) || BN_is_zero(b3)) | 
 | 88 |             && (BN_is_negative(b4) || BN_is_zero(b4)); | 
 | 89 |     else | 
 | 90 |         success = (BN_is_negative(b3) == BN_is_negative(b2)  || BN_is_zero(b3)) | 
 | 91 |             && (!BN_is_negative(b4) || BN_is_zero(b4)); | 
 | 92 |     OPENSSL_assert(BN_mul(b5, b3, b2, ctx)); | 
 | 93 |     OPENSSL_assert(BN_add(b5, b5, b4)); | 
 | 94 |  | 
 | 95 |     success = success && BN_cmp(b5, b1) == 0; | 
 | 96 |     if (!success) { | 
 | 97 |         BN_print_fp(stdout, b1); | 
 | 98 |         putchar('\n'); | 
 | 99 |         BN_print_fp(stdout, b2); | 
 | 100 |         putchar('\n'); | 
 | 101 |         BN_print_fp(stdout, b3); | 
 | 102 |         putchar('\n'); | 
 | 103 |         BN_print_fp(stdout, b4); | 
 | 104 |         putchar('\n'); | 
 | 105 |         BN_print_fp(stdout, b5); | 
 | 106 |         putchar('\n'); | 
 | 107 |         printf("%d %d %d %d %d %d %d\n", BN_is_negative(b1), | 
 | 108 |                BN_is_negative(b2), | 
 | 109 |                BN_is_negative(b3), BN_is_negative(b4), BN_is_zero(b4), | 
 | 110 |                BN_is_negative(b3) != BN_is_negative(b2) | 
 | 111 |                && (BN_is_negative(b4) || BN_is_zero(b4)), | 
 | 112 |                BN_cmp(b5, b1)); | 
 | 113 |         puts("----\n"); | 
 | 114 |     } | 
 | 115 |  | 
 | 116 |  done: | 
 | 117 |     OPENSSL_assert(success); | 
 | 118 |     ERR_clear_error(); | 
 | 119 |  | 
 | 120 |     return 0; | 
 | 121 | } | 
 | 122 |  | 
 | 123 | void FuzzerCleanup(void) | 
 | 124 | { | 
 | 125 |     BN_free(b1); | 
 | 126 |     BN_free(b2); | 
 | 127 |     BN_free(b3); | 
 | 128 |     BN_free(b4); | 
 | 129 |     BN_free(b5); | 
 | 130 |     BN_CTX_free(ctx); | 
 | 131 | } |