xref: /netbsd-src/crypto/external/bsd/openssl/dist/fuzz/fuzz_rand.c (revision b0d1725196a7921d003d2c66a14f186abda4176b)
1*b0d17251Schristos /*
2*b0d17251Schristos  * Copyright 2016-2022 The OpenSSL Project Authors. All Rights Reserved.
3*b0d17251Schristos  *
4*b0d17251Schristos  * Licensed under the Apache License 2.0 (the "License");
5*b0d17251Schristos  * you may not use this file except in compliance with the License.
6*b0d17251Schristos  * You may obtain a copy of the License at
7*b0d17251Schristos  * https://www.openssl.org/source/license.html
8*b0d17251Schristos  * or in the file LICENSE in the source distribution.
9*b0d17251Schristos  */
10*b0d17251Schristos 
11*b0d17251Schristos #include <openssl/core_names.h>
12*b0d17251Schristos #include <openssl/rand.h>
13*b0d17251Schristos #include <openssl/provider.h>
14*b0d17251Schristos #include "fuzzer.h"
15*b0d17251Schristos 
16*b0d17251Schristos static OSSL_FUNC_rand_newctx_fn fuzz_rand_newctx;
17*b0d17251Schristos static OSSL_FUNC_rand_freectx_fn fuzz_rand_freectx;
18*b0d17251Schristos static OSSL_FUNC_rand_instantiate_fn fuzz_rand_instantiate;
19*b0d17251Schristos static OSSL_FUNC_rand_uninstantiate_fn fuzz_rand_uninstantiate;
20*b0d17251Schristos static OSSL_FUNC_rand_generate_fn fuzz_rand_generate;
21*b0d17251Schristos static OSSL_FUNC_rand_gettable_ctx_params_fn fuzz_rand_gettable_ctx_params;
22*b0d17251Schristos static OSSL_FUNC_rand_get_ctx_params_fn fuzz_rand_get_ctx_params;
23*b0d17251Schristos static OSSL_FUNC_rand_enable_locking_fn fuzz_rand_enable_locking;
24*b0d17251Schristos 
fuzz_rand_newctx(void * provctx,void * parent,const OSSL_DISPATCH * parent_dispatch)25*b0d17251Schristos static void *fuzz_rand_newctx(
26*b0d17251Schristos          void *provctx, void *parent, const OSSL_DISPATCH *parent_dispatch)
27*b0d17251Schristos {
28*b0d17251Schristos     int *st = OPENSSL_malloc(sizeof(*st));
29*b0d17251Schristos 
30*b0d17251Schristos     if (st != NULL)
31*b0d17251Schristos         *st = EVP_RAND_STATE_UNINITIALISED;
32*b0d17251Schristos     return st;
33*b0d17251Schristos }
34*b0d17251Schristos 
fuzz_rand_freectx(ossl_unused void * vrng)35*b0d17251Schristos static void fuzz_rand_freectx(ossl_unused void *vrng)
36*b0d17251Schristos {
37*b0d17251Schristos     OPENSSL_free(vrng);
38*b0d17251Schristos }
39*b0d17251Schristos 
fuzz_rand_instantiate(ossl_unused void * vrng,ossl_unused unsigned int strength,ossl_unused int prediction_resistance,ossl_unused const unsigned char * pstr,ossl_unused size_t pstr_len,ossl_unused const OSSL_PARAM params[])40*b0d17251Schristos static int fuzz_rand_instantiate(ossl_unused void *vrng,
41*b0d17251Schristos                                  ossl_unused unsigned int strength,
42*b0d17251Schristos                                  ossl_unused int prediction_resistance,
43*b0d17251Schristos                                  ossl_unused const unsigned char *pstr,
44*b0d17251Schristos                                  ossl_unused size_t pstr_len,
45*b0d17251Schristos                                  ossl_unused const OSSL_PARAM params[])
46*b0d17251Schristos {
47*b0d17251Schristos     *(int *)vrng = EVP_RAND_STATE_READY;
48*b0d17251Schristos     return 1;
49*b0d17251Schristos }
50*b0d17251Schristos 
fuzz_rand_uninstantiate(ossl_unused void * vrng)51*b0d17251Schristos static int fuzz_rand_uninstantiate(ossl_unused void *vrng)
52*b0d17251Schristos {
53*b0d17251Schristos     *(int *)vrng = EVP_RAND_STATE_UNINITIALISED;
54*b0d17251Schristos     return 1;
55*b0d17251Schristos }
56*b0d17251Schristos 
fuzz_rand_generate(ossl_unused void * vdrbg,unsigned char * out,size_t outlen,ossl_unused unsigned int strength,ossl_unused int prediction_resistance,ossl_unused const unsigned char * adin,ossl_unused size_t adinlen)57*b0d17251Schristos static int fuzz_rand_generate(ossl_unused void *vdrbg,
58*b0d17251Schristos                               unsigned char *out, size_t outlen,
59*b0d17251Schristos                               ossl_unused unsigned int strength,
60*b0d17251Schristos                               ossl_unused int prediction_resistance,
61*b0d17251Schristos                               ossl_unused const unsigned char *adin,
62*b0d17251Schristos                               ossl_unused size_t adinlen)
63*b0d17251Schristos {
64*b0d17251Schristos     unsigned char val = 1;
65*b0d17251Schristos     size_t i;
66*b0d17251Schristos 
67*b0d17251Schristos     for (i = 0; i < outlen; i++)
68*b0d17251Schristos         out[i] = val++;
69*b0d17251Schristos     return 1;
70*b0d17251Schristos }
71*b0d17251Schristos 
fuzz_rand_enable_locking(ossl_unused void * vrng)72*b0d17251Schristos static int fuzz_rand_enable_locking(ossl_unused void *vrng)
73*b0d17251Schristos {
74*b0d17251Schristos     return 1;
75*b0d17251Schristos }
76*b0d17251Schristos 
fuzz_rand_get_ctx_params(void * vrng,OSSL_PARAM params[])77*b0d17251Schristos static int fuzz_rand_get_ctx_params(void *vrng, OSSL_PARAM params[])
78*b0d17251Schristos {
79*b0d17251Schristos     OSSL_PARAM *p;
80*b0d17251Schristos 
81*b0d17251Schristos     p = OSSL_PARAM_locate(params, OSSL_RAND_PARAM_STATE);
82*b0d17251Schristos     if (p != NULL && !OSSL_PARAM_set_int(p, *(int *)vrng))
83*b0d17251Schristos         return 0;
84*b0d17251Schristos 
85*b0d17251Schristos     p = OSSL_PARAM_locate(params, OSSL_RAND_PARAM_STRENGTH);
86*b0d17251Schristos     if (p != NULL && !OSSL_PARAM_set_int(p, 500))
87*b0d17251Schristos         return 0;
88*b0d17251Schristos 
89*b0d17251Schristos     p = OSSL_PARAM_locate(params, OSSL_RAND_PARAM_MAX_REQUEST);
90*b0d17251Schristos     if (p != NULL && !OSSL_PARAM_set_size_t(p, INT_MAX))
91*b0d17251Schristos         return 0;
92*b0d17251Schristos     return 1;
93*b0d17251Schristos }
94*b0d17251Schristos 
fuzz_rand_gettable_ctx_params(ossl_unused void * vrng,ossl_unused void * provctx)95*b0d17251Schristos static const OSSL_PARAM *fuzz_rand_gettable_ctx_params(ossl_unused void *vrng,
96*b0d17251Schristos                                                        ossl_unused void *provctx)
97*b0d17251Schristos {
98*b0d17251Schristos     static const OSSL_PARAM known_gettable_ctx_params[] = {
99*b0d17251Schristos         OSSL_PARAM_int(OSSL_RAND_PARAM_STATE, NULL),
100*b0d17251Schristos         OSSL_PARAM_uint(OSSL_RAND_PARAM_STRENGTH, NULL),
101*b0d17251Schristos         OSSL_PARAM_size_t(OSSL_RAND_PARAM_MAX_REQUEST, NULL),
102*b0d17251Schristos         OSSL_PARAM_END
103*b0d17251Schristos     };
104*b0d17251Schristos     return known_gettable_ctx_params;
105*b0d17251Schristos }
106*b0d17251Schristos 
107*b0d17251Schristos static const OSSL_DISPATCH fuzz_rand_functions[] = {
108*b0d17251Schristos     { OSSL_FUNC_RAND_NEWCTX, (void (*)(void))fuzz_rand_newctx },
109*b0d17251Schristos     { OSSL_FUNC_RAND_FREECTX, (void (*)(void))fuzz_rand_freectx },
110*b0d17251Schristos     { OSSL_FUNC_RAND_INSTANTIATE, (void (*)(void))fuzz_rand_instantiate },
111*b0d17251Schristos     { OSSL_FUNC_RAND_UNINSTANTIATE, (void (*)(void))fuzz_rand_uninstantiate },
112*b0d17251Schristos     { OSSL_FUNC_RAND_GENERATE, (void (*)(void))fuzz_rand_generate },
113*b0d17251Schristos     { OSSL_FUNC_RAND_ENABLE_LOCKING, (void (*)(void))fuzz_rand_enable_locking },
114*b0d17251Schristos     { OSSL_FUNC_RAND_GETTABLE_CTX_PARAMS,
115*b0d17251Schristos       (void(*)(void))fuzz_rand_gettable_ctx_params },
116*b0d17251Schristos     { OSSL_FUNC_RAND_GET_CTX_PARAMS, (void(*)(void))fuzz_rand_get_ctx_params },
117*b0d17251Schristos     { 0, NULL }
118*b0d17251Schristos };
119*b0d17251Schristos 
120*b0d17251Schristos static const OSSL_ALGORITHM fuzz_rand_rand[] = {
121*b0d17251Schristos     { "fuzz", "provider=fuzz-rand", fuzz_rand_functions },
122*b0d17251Schristos     { NULL, NULL, NULL }
123*b0d17251Schristos };
124*b0d17251Schristos 
fuzz_rand_query(void * provctx,int operation_id,int * no_cache)125*b0d17251Schristos static const OSSL_ALGORITHM *fuzz_rand_query(void *provctx,
126*b0d17251Schristos                                              int operation_id,
127*b0d17251Schristos                                              int *no_cache)
128*b0d17251Schristos {
129*b0d17251Schristos     *no_cache = 0;
130*b0d17251Schristos     switch (operation_id) {
131*b0d17251Schristos     case OSSL_OP_RAND:
132*b0d17251Schristos         return fuzz_rand_rand;
133*b0d17251Schristos     }
134*b0d17251Schristos     return NULL;
135*b0d17251Schristos }
136*b0d17251Schristos 
137*b0d17251Schristos /* Functions we provide to the core */
138*b0d17251Schristos static const OSSL_DISPATCH fuzz_rand_method[] = {
139*b0d17251Schristos     { OSSL_FUNC_PROVIDER_TEARDOWN, (void (*)(void))OSSL_LIB_CTX_free },
140*b0d17251Schristos     { OSSL_FUNC_PROVIDER_QUERY_OPERATION, (void (*)(void))fuzz_rand_query },
141*b0d17251Schristos     { 0, NULL }
142*b0d17251Schristos };
143*b0d17251Schristos 
fuzz_rand_provider_init(const OSSL_CORE_HANDLE * handle,const OSSL_DISPATCH * in,const OSSL_DISPATCH ** out,void ** provctx)144*b0d17251Schristos static int fuzz_rand_provider_init(const OSSL_CORE_HANDLE *handle,
145*b0d17251Schristos                                    const OSSL_DISPATCH *in,
146*b0d17251Schristos                                    const OSSL_DISPATCH **out, void **provctx)
147*b0d17251Schristos {
148*b0d17251Schristos     *provctx = OSSL_LIB_CTX_new();
149*b0d17251Schristos     if (*provctx == NULL)
150*b0d17251Schristos         return 0;
151*b0d17251Schristos     *out = fuzz_rand_method;
152*b0d17251Schristos     return 1;
153*b0d17251Schristos }
154*b0d17251Schristos 
155*b0d17251Schristos static OSSL_PROVIDER *r_prov;
156*b0d17251Schristos 
FuzzerSetRand(void)157*b0d17251Schristos void FuzzerSetRand(void)
158*b0d17251Schristos {
159*b0d17251Schristos     if (!OSSL_PROVIDER_add_builtin(NULL, "fuzz-rand", fuzz_rand_provider_init)
160*b0d17251Schristos         || !RAND_set_DRBG_type(NULL, "fuzz", NULL, NULL, NULL)
161*b0d17251Schristos         || (r_prov = OSSL_PROVIDER_try_load(NULL, "fuzz-rand", 1)) == NULL)
162*b0d17251Schristos         exit(1);
163*b0d17251Schristos }
164*b0d17251Schristos 
FuzzerClearRand(void)165*b0d17251Schristos void FuzzerClearRand(void)
166*b0d17251Schristos {
167*b0d17251Schristos     OSSL_PROVIDER_unload(r_prov);
168*b0d17251Schristos }
169