aboutsummaryrefslogtreecommitdiffstats
path: root/fuzz/x509.c
Commit message (Collapse)AuthorAgeFilesLines
* Copyright year updatesMatt Caswell2023-09-071-1/+1
| | | | | Reviewed-by: Richard Levitte <levitte@openssl.org> Release: yes
* Update X509 fuzzer to verify a chainKurt Roeckx2023-09-011-11/+112
| | | | | | | | | | | | | It add supports for verifying that it's been signed by a CA, and checks the CRL and OCSP status Can find CVE-2022-4203 and CVE-2023-0286 Reviewed-by: Bernd Edlinger <bernd.edlinger@hotmail.de> Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/20243)
* RAND_METHOD deprecation: fuzzerPauli2021-02-231-3/+2
| | | | | Reviewed-by: Tim Hudson <tjh@openssl.org> (Merged from https://github.com/openssl/openssl/pull/13652)
* Update copyright yearMatt Caswell2021-02-181-1/+1
| | | | | Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14235)
* Test that X509_issuer_and_serial_hash doesn't crashMatt Caswell2021-02-161-0/+2
| | | | | | | | Provide a certificate with a bad issuer and check that X509_issuer_and_serial_hash doesn't crash. Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org>
* Deprecate ERR_get_state()Richard Levitte2019-09-121-1/+1
| | | | | | | | | Internally, we still need this function, so we make it internal and then add a new ERR_get_state() that simply calls the internal variant, unless it's "removed" by configuration. Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/9462)
* Following the license change, modify the boilerplates in fuzz/Richard Levitte2018-12-061-1/+1
| | | | | | | [skip ci] Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/7833)
* Move FuzzerSetRand to separate file.Rich Salz2017-08-111-0/+2
| | | | | | | Use an inline rand.inc; this fixes Google's OSS-Fuzz builds. Reviewed-by: Paul Dale <paul.dale@oracle.com> (Merged from https://github.com/openssl/openssl/pull/4141)
* Install custom RAND_METHOD for fuzzingRich Salz2017-07-261-11/+1
| | | | | | | | | | | | Instead of setting a "magic" global variable to force RAND to keep consistent state and always generate the same bytestream, have the fuzzing code install its own RAND_METHOD that does this. For BN_RAND_DEBUG, we just don't do it; that debugging was about mucking with BN's internal representation, not requiring predictable rand bytes. Reviewed-by: Paul Dale <paul.dale@oracle.com> (Merged from https://github.com/openssl/openssl/pull/4025)
* Make x509 and asn1 fuzzer reproducibleKurt Roeckx2017-04-161-0/+12
| | | | | | Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Andy Polyakov <appro@openssl.org> GH: #2683
* Make the fuzzers more reproducibleKurt Roeckx2016-12-031-0/+5
| | | | | | | | | | | | | | | | | We want to be in the same global state each time we come in FuzzerTestOneInput(). There are various reasons why we might not be that include: - Initialization that happens on first use. This is mostly the RUN_ONCE() things, or loading of error strings. - Results that get cached. For instance a stack that is sorted, RSA blinding that has been set up, ... So I try to trigger as much as possible in FuzzerInitialize(), and for things I didn't find out how to trigger this it needs to happen in FuzzerTestOneInput(). Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #2023
* Add a FuzzerClean() functionKurt Roeckx2016-12-031-0/+4
| | | | | | | | This allows to free everything we allocated, so we can detect memory leaks. Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #2023
* Fix formatting of fuzzersKurt Roeckx2016-12-031-2/+4
| | | | | Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #2023
* Re-add x509 and crl fuzzerKurt Roeckx2016-07-011-0/+4
| | | | | | Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #1276
* Add comment about X509_printAlex Gaynor2016-06-281-0/+1
| | | | | | | Signed-off-by: Kurt Roeckx <kurt@roeckx.be> Reviewed-by: Emilia Kasper <emilia@openssl.org> GH: #1255
* Add X509 and CRL fuzzerKurt Roeckx2016-06-251-0/+31
Reviewed-by: Rich Salz <rsalz@openssl.org> GH: #1229