diff options
author | 2023-10-10 14:33:42 +0000 | |
---|---|---|
committer | 2023-10-10 14:33:42 +0000 | |
commit | af1a266670d040d2f4083ff309d732d648afba2a (patch) | |
tree | 2fc46203448ddcc6f81546d379abfaeb323575e9 /roms/edk2/CryptoPkg/Library/OpensslLib/openssl/boringssl/fuzz/session.cc | |
parent | e02cda008591317b1625707ff8e115a4841aa889 (diff) |
Change-Id: Iaf8d18082d3991dec7c0ebbea540f092188eb4ec
Diffstat (limited to 'roms/edk2/CryptoPkg/Library/OpensslLib/openssl/boringssl/fuzz/session.cc')
-rw-r--r-- | roms/edk2/CryptoPkg/Library/OpensslLib/openssl/boringssl/fuzz/session.cc | 48 |
1 files changed, 48 insertions, 0 deletions
diff --git a/roms/edk2/CryptoPkg/Library/OpensslLib/openssl/boringssl/fuzz/session.cc b/roms/edk2/CryptoPkg/Library/OpensslLib/openssl/boringssl/fuzz/session.cc new file mode 100644 index 000000000..d25fb826b --- /dev/null +++ b/roms/edk2/CryptoPkg/Library/OpensslLib/openssl/boringssl/fuzz/session.cc @@ -0,0 +1,48 @@ +/* Copyright (c) 2016, Google Inc. + * + * Permission to use, copy, modify, and/or distribute this software for any + * purpose with or without fee is hereby granted, provided that the above + * copyright notice and this permission notice appear in all copies. + * + * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES + * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF + * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY + * SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES + * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION + * OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN + * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */ + +#include <stdio.h> + +#include <openssl/mem.h> +#include <openssl/ssl.h> + +struct GlobalState { + GlobalState() : ctx(SSL_CTX_new(TLS_method())) {} + + bssl::UniquePtr<SSL_CTX> ctx; +}; + +static GlobalState g_state; + +extern "C" int LLVMFuzzerTestOneInput(const uint8_t *buf, size_t len) { + // Parse in our session. + bssl::UniquePtr<SSL_SESSION> session( + SSL_SESSION_from_bytes(buf, len, g_state.ctx.get())); + + // If the format was invalid, just return. + if (!session) { + return 0; + } + + // Stress the encoder. + size_t encoded_len; + uint8_t *encoded; + if (!SSL_SESSION_to_bytes(session.get(), &encoded, &encoded_len)) { + fprintf(stderr, "SSL_SESSION_to_bytes failed.\n"); + return 1; + } + + OPENSSL_free(encoded); + return 0; +} |