|  | // Copyright 2022 The BoringSSL Authors | 
|  | // | 
|  | // Licensed under the Apache License, Version 2.0 (the "License"); | 
|  | // you may not use this file except in compliance with the License. | 
|  | // You may obtain a copy of the License at | 
|  | // | 
|  | //     https://www.apache.org/licenses/LICENSE-2.0 | 
|  | // | 
|  | // Unless required by applicable law or agreed to in writing, software | 
|  | // distributed under the License is distributed on an "AS IS" BASIS, | 
|  | // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | 
|  | // See the License for the specific language governing permissions and | 
|  | // limitations under the License. | 
|  |  | 
|  | #include <stdlib.h> | 
|  | #include <string.h> | 
|  |  | 
|  | #include <openssl/bytestring.h> | 
|  | #include <openssl/ecdsa.h> | 
|  | #include <openssl/mem.h> | 
|  |  | 
|  |  | 
|  | extern "C" int LLVMFuzzerTestOneInput(const uint8_t *buf, size_t len) { | 
|  | CBS cbs, body; | 
|  | CBS_ASN1_TAG tag; | 
|  | CBS_init(&cbs, buf, len); | 
|  | if (CBS_get_any_asn1(&cbs, &body, &tag)) { | 
|  | // DER has a unique encoding, so any parsed input should round-trip | 
|  | // correctly. | 
|  | size_t consumed = len - CBS_len(&cbs); | 
|  | bssl::ScopedCBB cbb; | 
|  | if (!CBB_init(cbb.get(), consumed) || | 
|  | !CBB_add_asn1_element(cbb.get(), tag, CBS_data(&body), | 
|  | CBS_len(&body)) || | 
|  | CBB_len(cbb.get()) != consumed || | 
|  | memcmp(CBB_data(cbb.get()), buf, consumed) != 0) { | 
|  | abort(); | 
|  | } | 
|  | } | 
|  |  | 
|  | ECDSA_SIG *sig = ECDSA_SIG_from_bytes(buf, len); | 
|  | if (sig != NULL) { | 
|  | uint8_t *enc; | 
|  | size_t enc_len; | 
|  | if (!ECDSA_SIG_to_bytes(&enc, &enc_len, sig) || | 
|  | enc_len != len || | 
|  | memcmp(buf, enc, len) != 0) { | 
|  | abort(); | 
|  | } | 
|  | OPENSSL_free(enc); | 
|  | ECDSA_SIG_free(sig); | 
|  | } | 
|  |  | 
|  | return 0; | 
|  | } |