]> git.ipfire.org Git - thirdparty/openssl.git/commit
fix slh-dsa incorrect prediction of result code
authorNeil Horman <nhorman@openssl.org>
Mon, 24 Feb 2025 12:55:33 +0000 (07:55 -0500)
committerNeil Horman <nhorman@openssl.org>
Tue, 25 Feb 2025 21:04:02 +0000 (16:04 -0500)
commitc0eb5c57f77c5a158b989285b1344297e0186235
tree1e280a463e5bbf1c81577e909ad0e73bc3539e80
parent83dbfde6aaf7a384cfc7bab6608943a56ac4ebed
fix slh-dsa incorrect prediction of result code

The slh_dsa fuzzer predicts failure in EVP_message_sign_init in the
event we pass a context_string param of more than 255 bytes.  That makes
for an accurate prediction, but only if we actually create  the param.

augment the setting of exepct_rc_init to be determined not only by our
allocation of a > 255 byte message, but also on selector bit 1, which
determines if we create the parameter at all.

Fixes https://oss-fuzz.com/testcase-detail/4807793999937536

Reviewed-by: Saša Nedvědický <sashan@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Paul Dale <ppzgs1@gmail.com>
(Merged from https://github.com/openssl/openssl/pull/26884)
fuzz/slh-dsa.c