xref: /openssl/fuzz/pem.c (revision da1c088f)
1 /*
2  * Copyright 2022-2023 The OpenSSL Project Authors. All Rights Reserved.
3  *
4  * Licensed under the Apache License 2.0 (the "License");
5  * you may not use this file except in compliance with the License.
6  * You may obtain a copy of the License at
7  * https://www.openssl.org/source/license.html
8  * or in the file LICENSE in the source distribution.
9  */
10 
11 #include <openssl/pem.h>
12 #include <openssl/err.h>
13 #include "fuzzer.h"
14 
FuzzerInitialize(int * argc,char *** argv)15 int FuzzerInitialize(int *argc, char ***argv)
16 {
17     OPENSSL_init_crypto(OPENSSL_INIT_LOAD_CRYPTO_STRINGS, NULL);
18     ERR_clear_error();
19     CRYPTO_free_ex_index(0, -1);
20     return 1;
21 }
22 
FuzzerTestOneInput(const uint8_t * buf,size_t len)23 int FuzzerTestOneInput(const uint8_t *buf, size_t len)
24 {
25     BIO *in;
26     char *name = NULL, *header = NULL;
27     unsigned char *data = NULL;
28     long outlen;
29 
30     if (len <= 1)
31         return 0;
32 
33     in = BIO_new(BIO_s_mem());
34     OPENSSL_assert((size_t)BIO_write(in, buf + 1, len - 1) == len - 1);
35     if (PEM_read_bio_ex(in, &name, &header, &data, &outlen, buf[0]) == 1) {
36 	/* Try to read all the data we get to see if allocated properly. */
37         BIO_write(in, name, strlen(name));
38 	BIO_write(in, header, strlen(header));
39 	BIO_write(in, data, outlen);
40     }
41     if (buf[0] & PEM_FLAG_SECURE) {
42         OPENSSL_secure_free(name);
43         OPENSSL_secure_free(header);
44         OPENSSL_secure_free(data);
45     } else {
46         OPENSSL_free(name);
47         OPENSSL_free(header);
48         OPENSSL_free(data);
49     }
50 
51     BIO_free(in);
52     ERR_clear_error();
53 
54     return 0;
55 }
56 
FuzzerCleanup(void)57 void FuzzerCleanup(void)
58 {
59 }
60