| // Copyright 2016 The BoringSSL Authors |
| // |
| // Licensed under the Apache License, Version 2.0 (the "License"); |
| // you may not use this file except in compliance with the License. |
| // You may obtain a copy of the License at |
| // |
| // https://www.apache.org/licenses/LICENSE-2.0 |
| // |
| // Unless required by applicable law or agreed to in writing, software |
| // distributed under the License is distributed on an "AS IS" BASIS, |
| // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| // See the License for the specific language governing permissions and |
| // limitations under the License. |
| |
| #include <stdio.h> |
| |
| #include <openssl/mem.h> |
| #include <openssl/ssl.h> |
| |
| struct GlobalState { |
| GlobalState() : ctx(SSL_CTX_new(TLS_method())) {} |
| |
| bssl::UniquePtr<SSL_CTX> ctx; |
| }; |
| |
| static GlobalState g_state; |
| |
| extern "C" int LLVMFuzzerTestOneInput(const uint8_t *buf, size_t len) { |
| // Parse in our session. |
| bssl::UniquePtr<SSL_SESSION> session( |
| SSL_SESSION_from_bytes(buf, len, g_state.ctx.get())); |
| |
| // If the format was invalid, just return. |
| if (!session) { |
| return 0; |
| } |
| |
| // Stress the encoder. |
| size_t encoded_len; |
| uint8_t *encoded; |
| if (!SSL_SESSION_to_bytes(session.get(), &encoded, &encoded_len)) { |
| fprintf(stderr, "SSL_SESSION_to_bytes failed.\n"); |
| return 1; |
| } |
| |
| OPENSSL_free(encoded); |
| return 0; |
| } |