fuzz/mpi_addmod_target.cc
author Daiki Ueno <dueno@redhat.com>
Thu, 01 Jun 2017 15:08:29 +0200
changeset 13435 8445f247021a7cb13c08046698730aec77069b9f
parent 13132 3cd42b902761a49d30b5648b00e477fadfe9bd53
permissions -rw-r--r--
Bug 1280846 - taskcluster: build gtests even under modular builds, r=franziskus

/* This Source Code Form is subject to the terms of the Mozilla Public
 * License, v. 2.0. If a copy of the MPL was not distributed with this
 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */

/*
 * This target fuzzes NSS mpi against openssl bignum.
 * It therefore requires openssl to be installed.
 */

#include "mpi_helper.h"

extern "C" int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) {
  // We require at least size 3 to get two integers from Data.
  if (size < 3) {
    return 0;
  }
  INIT_FOUR_NUMBERS

  auto modulus = get_modulus(data, size, ctx);
  // Compare with OpenSSL add mod
  m1 = &std::get<1>(modulus);
  assert(mp_addmod(&a, &b, m1, &c) == MP_OKAY);
  (void)BN_mod_add(C, A, B, std::get<0>(modulus), ctx);
  check_equal(C, &c, max_size);

  CLEANUP_AND_RETURN
}