| // Copyright 2022 The BoringSSL Authors |
| // |
| // Licensed under the Apache License, Version 2.0 (the "License"); |
| // you may not use this file except in compliance with the License. |
| // You may obtain a copy of the License at |
| // |
| // https://www.apache.org/licenses/LICENSE-2.0 |
| // |
| // Unless required by applicable law or agreed to in writing, software |
| // distributed under the License is distributed on an "AS IS" BASIS, |
| // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| // See the License for the specific language governing permissions and |
| // limitations under the License. |
| |
| #include <stdlib.h> |
| #include <string.h> |
| |
| #include <openssl/bytestring.h> |
| #include <openssl/ecdsa.h> |
| #include <openssl/mem.h> |
| |
| |
| extern "C" int LLVMFuzzerTestOneInput(const uint8_t *buf, size_t len) { |
| CBS cbs, body; |
| CBS_ASN1_TAG tag; |
| CBS_init(&cbs, buf, len); |
| if (CBS_get_any_asn1(&cbs, &body, &tag)) { |
| // DER has a unique encoding, so any parsed input should round-trip |
| // correctly. |
| size_t consumed = len - CBS_len(&cbs); |
| bssl::ScopedCBB cbb; |
| CBB body_cbb; |
| if (!CBB_init(cbb.get(), consumed) || |
| !CBB_add_asn1(cbb.get(), &body_cbb, tag) || |
| !CBB_add_bytes(&body_cbb, CBS_data(&body), CBS_len(&body)) || |
| !CBB_flush(cbb.get()) || |
| CBB_len(cbb.get()) != consumed || |
| memcmp(CBB_data(cbb.get()), buf, consumed) != 0) { |
| abort(); |
| } |
| } |
| |
| ECDSA_SIG *sig = ECDSA_SIG_from_bytes(buf, len); |
| if (sig != NULL) { |
| uint8_t *enc; |
| size_t enc_len; |
| if (!ECDSA_SIG_to_bytes(&enc, &enc_len, sig) || |
| enc_len != len || |
| memcmp(buf, enc, len) != 0) { |
| abort(); |
| } |
| OPENSSL_free(enc); |
| ECDSA_SIG_free(sig); |
| } |
| |
| return 0; |
| } |