9f08a1c63e
Instead of setting a "magic" global variable to force RAND to keep consistent state and always generate the same bytestream, have the fuzzing code install its own RAND_METHOD that does this. For BN_RAND_DEBUG, we just don't do it; that debugging was about mucking with BN's internal representation, not requiring predictable rand bytes. Reviewed-by: Paul Dale <paul.dale@oracle.com> (Merged from https://github.com/openssl/openssl/pull/4025)
80 lines
1.6 KiB
C
80 lines
1.6 KiB
C
/*
|
|
* Copyright 2016 The OpenSSL Project Authors. All Rights Reserved.
|
|
*
|
|
* Licensed under the OpenSSL licenses, (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
* https://www.openssl.org/source/license.html
|
|
* or in the file LICENSE in the source distribution.
|
|
*/
|
|
|
|
/*
|
|
* Given a list of files, run each of them through the fuzzer. Note that
|
|
* failure will be indicated by some kind of crash. Switching on things like
|
|
* asan improves the test.
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <sys/stat.h>
|
|
#include <openssl/crypto.h>
|
|
#include <openssl/rand.h>
|
|
#include "fuzzer.h"
|
|
|
|
static int fuzz_bytes(unsigned char *buf, int num)
|
|
{
|
|
unsigned char val = 1;
|
|
|
|
while (--num >= 0)
|
|
*buf++ = val++;
|
|
return 1;
|
|
}
|
|
|
|
static int fuzz_status(void)
|
|
{
|
|
return 1;
|
|
}
|
|
|
|
static RAND_METHOD fuzz_rand_method = {
|
|
NULL,
|
|
fuzz_bytes,
|
|
NULL,
|
|
NULL,
|
|
fuzz_bytes,
|
|
fuzz_status
|
|
};
|
|
|
|
void FuzzerSetRand(void)
|
|
{
|
|
RAND_set_rand_method(&fuzz_rand_method);
|
|
}
|
|
|
|
|
|
|
|
int main(int argc, char **argv) {
|
|
int n;
|
|
|
|
FuzzerInitialize(&argc, &argv);
|
|
|
|
for (n = 1; n < argc; ++n) {
|
|
struct stat st;
|
|
FILE *f;
|
|
unsigned char *buf;
|
|
size_t s;
|
|
|
|
stat(argv[n], &st);
|
|
f = fopen(argv[n], "rb");
|
|
if (f == NULL)
|
|
continue;
|
|
buf = malloc(st.st_size);
|
|
s = fread(buf, 1, st.st_size, f);
|
|
OPENSSL_assert(s == (size_t)st.st_size);
|
|
FuzzerTestOneInput(buf, s);
|
|
free(buf);
|
|
fclose(f);
|
|
}
|
|
|
|
FuzzerCleanup();
|
|
|
|
return 0;
|
|
}
|