summaryrefslogtreecommitdiffstats
path: root/fuzz (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Copyright year updatesTomas Mraz2024-09-057-7/+7
| | | | | Reviewed-by: Neil Horman <nhorman@openssl.org> Release: yes
* fix: alias auditEntity OIDJonathan M. Wilbur2024-08-261-2/+1
| | | | | | | Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Neil Horman <nhorman@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/24754)
* feat: support auditIdentity X.509v3 extensionJonathan M. Wilbur2024-08-261-0/+1
| | | | | | | Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Neil Horman <nhorman@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/24754)
* fix: wrong name for OID -> auditIdentityJonathan M. Wilbur2024-08-261-1/+1
| | | | | | | Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Neil Horman <nhorman@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/24754)
* fuzz/hashtable.c: rc == -1 on insert is OK when fuzzingTomas Mraz2024-08-221-0/+4
| | | | | | Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Neil Horman <nhorman@openssl.org> (Merged from https://github.com/openssl/openssl/pull/25273)
* core_namemap.c: 2048 hashtable buckets should be sufficientTomas Mraz2024-08-211-0/+0
| | | | | | | | | | It is unlikely we would need more than 4000 names and even with more names (up to 8192) it would still work, just the performance fo the namemap would degrade. Reviewed-by: Neil Horman <nhorman@openssl.org> Reviewed-by: Paul Dale <ppzgs1@gmail.com> (Merged from https://github.com/openssl/openssl/pull/24504)
* hashtable: Support lockless readsTomas Mraz2024-08-211-1/+1
| | | | | | | | | Also build it in the FIPS provider too and properly report error on insert when hashtable cannot be grown. Reviewed-by: Neil Horman <nhorman@openssl.org> Reviewed-by: Paul Dale <ppzgs1@gmail.com> (Merged from https://github.com/openssl/openssl/pull/24504)
* alternate collision checking supportNeil Horman2024-08-211-1/+1
| | | | | | | | | | | Add full key matching to hashtable the idea is that on a hash value match we do a full memory comparison of the unhashed key to validate that its actually the key we're looking for Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/24504)
* limit bignums to 128 bytesNeil Horman2024-08-091-3/+4
| | | | | | | | Keep us from spinning forever doing huge amounts of math in the fuzzer Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <ppzgs1@gmail.com> (Merged from https://github.com/openssl/openssl/pull/25013)
* Add OIDs id-kp-wisun-fan-device and id-on-hardwareModuleMathis Marion2024-08-071-0/+2
| | | | | | | | | | | | Sub-OIDs for {iso(1) identified-organization(3) dod(6) internet(1) private(4) enterprise(1) 45605} are recorded in the document "Wi-SUN Assigned Value Registry" (WAVR). OID id-on-hardwareModule is defined in RFC 4108. Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/23428)
* ossl_print_attribute_value(): use a sequence value only if type is a sequenceTomas Mraz2024-08-071-0/+0
| | | | | | | | | | | | Move the switch to print a distinguished name inside the switch by the printed attribute type, otherwise a malformed attribute will cause a crash. Updated the fuzz corpora with the testcase Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> (Merged from https://github.com/openssl/openssl/pull/25087)
* Ensure cmd from fuzz buffer is always validNeil Horman2024-07-231-2/+12
| | | | | | | | | | | | | | | | | | | | | | | | | | | The quic-srtm fuzzer uses a loop in which an integer command is extracted from the fuzzer buffer input to determine the action to take, switching on the values between 0 and 3, and ignoring all other commands. Howver in the failing fuzzer test case here: https://oss-fuzz.com/testcase-detail/5618331942977536 The buffer provided shows a large number of 0 values (indicating an SRTM add command), and almost no 1, 2, or 3 values. As such, the fuzzer only truly exercises the srtm add path, which has the side effect of growing the SRTM hash table unboundedly, leading to a timeout when 10 entries need to be iterated over when the hashtable doall command is executed. Fix this by ensuring that the command is always valid, and reasonably distributed among all the operations with some modulo math. Introducing this change bounds the hash table size in the reproducer test case to less than half of the initially observed size, and avoids the timeout. Fixes openssl/project#679 Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/24827)
* that open brace { should be on the previous lineDimitri Papadopoulos2024-07-221-2/+1
| | | | | | | | | Found by running the checkpatch.pl Linux script to enforce coding style. Reviewed-by: Neil Horman <nhorman@openssl.org> Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22097)
* Change strnlen() to OPENSSL_strnlen() in fuzz/provider.Randall S. Becker2024-07-181-1/+1
| | | | | | | | | | | | | strnlen() is not portable. It is preferable to use the wrapper. Fixes: #24908 Signed-off-by: Randall S. Becker <randall.becker@nexbridge.ca> Reviewed-by: Neil Horman <nhorman@openssl.org> Reviewed-by: Kurt Roeckx <kurt@roeckx.be> Reviewed-by: Paul Dale <ppzgs1@gmail.com> (Merged from https://github.com/openssl/openssl/pull/24912)
* Limit the number of commands that can be used in the quic-lcidm fuzzerMatt Caswell2024-07-111-0/+6
| | | | | | | | | | | The fuzzer was reporting a spurious timeout due to excessive numbers of commands in a single file. We limit the number of commands to avoid this. Found by OSSFuzz Reviewed-by: Neil Horman <nhorman@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/24831)
* fuzz/decoder.c: Lower the limits on key checksTomas Mraz2024-07-051-2/+2
| | | | | | | | | These checks still take too long time on clusterfuzz so they are longer than the timeout limit. Reviewed-by: Neil Horman <nhorman@openssl.org> Reviewed-by: Kurt Roeckx <kurt@roeckx.be> (Merged from https://github.com/openssl/openssl/pull/24781)
* Fix typos found by codespellDimitri Papadopoulos2024-06-241-1/+1
| | | | | | Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Kurt Roeckx <kurt@roeckx.be> (Merged from https://github.com/openssl/openssl/pull/24691)
* Add support for targetingInformation X.509v3 extensionJonathan M. Wilbur2024-06-171-0/+2
| | | | | | | | | | Support for the targetingInformation X.509v3 extension defined in ITU-T Recommendation X.509 (2019), Section 17.1.2.2. This extension is used in attribute certificates. Reviewed-by: Neil Horman <nhorman@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22206)
* Add provider fuzzerMax Ammann2024-05-242-0/+668
| | | | | | | | Test recipe 99-test_fuzz_provider.t added. Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Neil Horman <nhorman@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22964)
* Fix alignment errors in hashtable fuzzerNeil Horman2024-04-301-2/+2
| | | | | | | | | | | | | we extract several values (uint16_t and uint64_t from the fuzzer buff passed in, but they weren't aligned on 2 and 8 byte boundaries. Adjust the fuzzer to memcpy data to the target variables to avoid unalignment issues Fixes #24272 Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> (Merged from https://github.com/openssl/openssl/pull/24276)
* fuzz: Add attribute certificate fuzz testDamian Hobson-Garcia2024-04-243-2/+58
| | | | | | Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Neil Horman <nhorman@openssl.org> (Merged from https://github.com/openssl/openssl/pull/15857)
* updating fuzz-corpora submoduleNeil Horman2024-04-241-0/+0
| | | | | | Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/23671)
* Adding hashtable fuzzerNeil Horman2024-04-242-2/+399
| | | | | | Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/23671)
* fuzz/decoder.c: Limit the EVP_PKEY_param_check on DHX keys as wellTomas Mraz2024-04-171-1/+2
| | | | | | Reviewed-by: Neil Horman <nhorman@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/24126)
* fuzz/decoder.c: Limit the key sizes on which checks are runTomas Mraz2024-04-101-3/+12
| | | | | | | | | | In particular the DH safe prime check will be limited to 8192 bits and the private and pairwise checks are limited to 16384 bits on any key types. Reviewed-by: Neil Horman <nhorman@openssl.org> Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/24049)
* Copyright year updatesRichard Levitte2024-04-094-4/+4
| | | | | | | | | | Reviewed-by: Neil Horman <nhorman@openssl.org> Release: yes (cherry picked from commit 0ce7d1f355c1240653e320a3f6f8109c1f05f8c0) Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/24034)
* Add Content Type OID for id-ct-rpkiSignedPrefixListJob Snijders2024-03-151-1/+2
| | | | | | | | | | | | References: draft-ietf-sidrops-rpki-prefixlist Title: "A profile for Signed Prefix Lists for Use in the Resource Public Key Infrastructure (RPKI)" OID assigned under 'SMI Security for S/MIME CMS Content Type (1.2.840.113549.1.9.16.1)' https://www.iana.org/assignments/smi-numbers/smi-numbers.xhtml#security-smime-1 Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/23426)
* Add fuzzing for DTLSFrederik Wedel-Heinen2024-03-124-0/+858
| | | | | | | | Update the fuzz corpora submodule with the DTLS fuzz corpus. Reviewed-by: Kurt Roeckx <kurt@roeckx.be> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/23585)
* Don't print excessively long ASN1 items in fuzzerMatt Caswell2024-02-211-4/+10
| | | | | | | | | | | Prevent spurious fuzzer timeouts by not printing ASN1 which is excessively long. This fixes a false positive encountered by OSS-Fuzz. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> (Merged from https://github.com/openssl/openssl/pull/23640)
* QUIC RCIDM: Minor updatesHugo Landau2024-01-111-1/+1
| | | | | | Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/23022)
* Update fuzz corporaHugo Landau2024-01-111-0/+0
| | | | | | Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/23022)
* QUIC RCIDM: Update fuzz corporaHugo Landau2024-01-111-0/+0
| | | | | | Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/23022)
* QUIC RCIDM: Add fuzzerHugo Landau2024-01-112-1/+208
| | | | | | Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/23022)
* crypto/cmp/,apps/lib/cmp_mock_srv.c: various improvements on delayed deliveryDr. David von Oheimb2023-12-211-5/+6
| | | | | | | Reviewed-by: Shane Lontis <shane.lontis@oracle.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com> (Merged from https://github.com/openssl/openssl/pull/20727)
* crypto/cmp/,apps/lib/cmp_mock_srv.c: add delayed delivery for all types of ↵Rajeev Ranjan2023-12-211-1/+14
| | | | | | | | | responses Reviewed-by: Shane Lontis <shane.lontis@oracle.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com> (Merged from https://github.com/openssl/openssl/pull/20727)
* QUIC LCIDM: Add fuzzerHugo Landau2023-12-062-2/+190
| | | | | | Reviewed-by: Neil Horman <nhorman@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22673)
* Update fuzz corporaHugo Landau2023-11-231-0/+0
| | | | | | Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22790)
* QUIC SRTM: Update fuzz corporaHugo Landau2023-11-231-0/+0
| | | | | | Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22612)
* Fuzzing: Fix helper shebang on NixOSHugo Landau2023-11-231-1/+1
| | | | | | Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22612)
* QUIC SRTM: Add fuzzer for SRTMHugo Landau2023-11-232-2/+129
| | | | | | Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22612)
* Exclude more in the fuzz introspector reportKurt Roeckx2023-11-141-0/+2
| | | | | | Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22707)
* Add support for streams to the quic-client fuzzerMatt Caswell2023-11-031-14/+87
| | | | | | | | Enable the quic-client fuzzer to accept and create new streams Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22592)
* Call SSL_write() in the quic-client-fuzzerMatt Caswell2023-11-031-6/+26
| | | | | | Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22592)
* Create a fuzz introspector exclude config fileKurt Roeckx2023-10-301-0/+10
| | | | | | Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22532)
* Update to latest fuzz corporaKurt Roeckx2023-10-301-0/+0
| | | | | | Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22531)
* Update the corpora files to include the new quic-client subdirMatt Caswell2023-10-231-0/+0
| | | | | | Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22368)
* Teach the quic-client fuzzer about timeMatt Caswell2023-10-232-20/+65
| | | | | | | | | We allow the fuzzer to influence the time between different packets using the fake time capability. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22368)
* Some cleanups in the quic-client fuzzerMatt Caswell2023-10-231-28/+1
| | | | | | Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22368)
* Update the fuzz README to provide info about the stdc++ requirementsMatt Caswell2023-10-231-0/+28
| | | | | | Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22368)
* Updates to the quic client fuzzerMatt Caswell2023-10-231-4/+23
| | | | | | | | | Handle retryable errors from SSL_read(). Also ensure the underlying BIO handles the destination address capability. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22368)