mirror of
https://github.com/Mbed-TLS/mbedtls.git
synced 2025-08-08 17:42:09 +03:00
Switch to the new code style
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
This commit is contained in:
@@ -6,7 +6,7 @@
|
||||
#include "mbedtls/ctr_drbg.h"
|
||||
|
||||
#if defined(MBEDTLS_PLATFORM_TIME_ALT)
|
||||
mbedtls_time_t dummy_constant_time( mbedtls_time_t* time )
|
||||
mbedtls_time_t dummy_constant_time(mbedtls_time_t *time)
|
||||
{
|
||||
(void) time;
|
||||
return 0x5af2a056;
|
||||
@@ -16,47 +16,47 @@ mbedtls_time_t dummy_constant_time( mbedtls_time_t* time )
|
||||
void dummy_init()
|
||||
{
|
||||
#if defined(MBEDTLS_PLATFORM_TIME_ALT)
|
||||
mbedtls_platform_set_time( dummy_constant_time );
|
||||
mbedtls_platform_set_time(dummy_constant_time);
|
||||
#else
|
||||
fprintf(stderr, "Warning: fuzzing without constant time\n");
|
||||
#endif
|
||||
}
|
||||
|
||||
int dummy_send( void *ctx, const unsigned char *buf, size_t len )
|
||||
int dummy_send(void *ctx, const unsigned char *buf, size_t len)
|
||||
{
|
||||
//silence warning about unused parameter
|
||||
(void) ctx;
|
||||
(void) buf;
|
||||
|
||||
//pretends we wrote everything ok
|
||||
if( len > INT_MAX ) {
|
||||
return( -1 );
|
||||
if (len > INT_MAX) {
|
||||
return -1;
|
||||
}
|
||||
return( (int) len );
|
||||
return (int) len;
|
||||
}
|
||||
|
||||
int fuzz_recv( void *ctx, unsigned char *buf, size_t len )
|
||||
int fuzz_recv(void *ctx, unsigned char *buf, size_t len)
|
||||
{
|
||||
//reads from the buffer from fuzzer
|
||||
fuzzBufferOffset_t * biomemfuzz = (fuzzBufferOffset_t *) ctx;
|
||||
fuzzBufferOffset_t *biomemfuzz = (fuzzBufferOffset_t *) ctx;
|
||||
|
||||
if(biomemfuzz->Offset == biomemfuzz->Size) {
|
||||
if (biomemfuzz->Offset == biomemfuzz->Size) {
|
||||
//EOF
|
||||
return( 0 );
|
||||
return 0;
|
||||
}
|
||||
if( len > INT_MAX ) {
|
||||
return( -1 );
|
||||
if (len > INT_MAX) {
|
||||
return -1;
|
||||
}
|
||||
if( len + biomemfuzz->Offset > biomemfuzz->Size ) {
|
||||
if (len + biomemfuzz->Offset > biomemfuzz->Size) {
|
||||
//do not overflow
|
||||
len = biomemfuzz->Size - biomemfuzz->Offset;
|
||||
}
|
||||
memcpy(buf, biomemfuzz->Data + biomemfuzz->Offset, len);
|
||||
biomemfuzz->Offset += len;
|
||||
return( (int) len );
|
||||
return (int) len;
|
||||
}
|
||||
|
||||
int dummy_random( void *p_rng, unsigned char *output, size_t output_len )
|
||||
int dummy_random(void *p_rng, unsigned char *output, size_t output_len)
|
||||
{
|
||||
int ret;
|
||||
size_t i;
|
||||
@@ -68,14 +68,14 @@ int dummy_random( void *p_rng, unsigned char *output, size_t output_len )
|
||||
(void) p_rng;
|
||||
ret = 0;
|
||||
#endif
|
||||
for (i=0; i<output_len; i++) {
|
||||
for (i = 0; i < output_len; i++) {
|
||||
//replace result with pseudo random
|
||||
output[i] = (unsigned char) rand();
|
||||
}
|
||||
return( ret );
|
||||
return ret;
|
||||
}
|
||||
|
||||
int dummy_entropy( void *data, unsigned char *output, size_t len )
|
||||
int dummy_entropy(void *data, unsigned char *output, size_t len)
|
||||
{
|
||||
size_t i;
|
||||
(void) data;
|
||||
@@ -83,15 +83,15 @@ int dummy_entropy( void *data, unsigned char *output, size_t len )
|
||||
//use mbedtls_entropy_func to find bugs in it
|
||||
//test performance impact of entropy
|
||||
//ret = mbedtls_entropy_func(data, output, len);
|
||||
for (i=0; i<len; i++) {
|
||||
for (i = 0; i < len; i++) {
|
||||
//replace result with pseudo random
|
||||
output[i] = (unsigned char) rand();
|
||||
}
|
||||
return( 0 );
|
||||
return 0;
|
||||
}
|
||||
|
||||
int fuzz_recv_timeout( void *ctx, unsigned char *buf, size_t len,
|
||||
uint32_t timeout )
|
||||
int fuzz_recv_timeout(void *ctx, unsigned char *buf, size_t len,
|
||||
uint32_t timeout)
|
||||
{
|
||||
(void) timeout;
|
||||
|
||||
|
@@ -10,21 +10,20 @@
|
||||
#include <stddef.h>
|
||||
#include <stdint.h>
|
||||
|
||||
typedef struct fuzzBufferOffset
|
||||
{
|
||||
typedef struct fuzzBufferOffset {
|
||||
const uint8_t *Data;
|
||||
size_t Size;
|
||||
size_t Offset;
|
||||
} fuzzBufferOffset_t;
|
||||
|
||||
#if defined(MBEDTLS_HAVE_TIME)
|
||||
mbedtls_time_t dummy_constant_time( mbedtls_time_t* time );
|
||||
mbedtls_time_t dummy_constant_time(mbedtls_time_t *time);
|
||||
#endif
|
||||
void dummy_init();
|
||||
|
||||
int dummy_send( void *ctx, const unsigned char *buf, size_t len );
|
||||
int fuzz_recv( void *ctx, unsigned char *buf, size_t len );
|
||||
int dummy_random( void *p_rng, unsigned char *output, size_t output_len );
|
||||
int dummy_entropy( void *data, unsigned char *output, size_t len );
|
||||
int fuzz_recv_timeout( void *ctx, unsigned char *buf, size_t len,
|
||||
uint32_t timeout );
|
||||
int dummy_send(void *ctx, const unsigned char *buf, size_t len);
|
||||
int fuzz_recv(void *ctx, unsigned char *buf, size_t len);
|
||||
int dummy_random(void *p_rng, unsigned char *output, size_t output_len);
|
||||
int dummy_entropy(void *data, unsigned char *output, size_t len);
|
||||
int fuzz_recv_timeout(void *ctx, unsigned char *buf, size_t len,
|
||||
uint32_t timeout);
|
||||
|
@@ -30,7 +30,8 @@ const char *pers = "fuzz_client";
|
||||
#endif /* MBEDTLS_SSL_CLI_C && MBEDTLS_ENTROPY_C && MBEDTLS_CTR_DRBG_C */
|
||||
|
||||
|
||||
int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) {
|
||||
int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size)
|
||||
{
|
||||
#if defined(MBEDTLS_SSL_CLI_C) && \
|
||||
defined(MBEDTLS_ENTROPY_C) && \
|
||||
defined(MBEDTLS_CTR_DRBG_C)
|
||||
@@ -46,10 +47,11 @@ int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) {
|
||||
|
||||
if (initialized == 0) {
|
||||
#if defined(MBEDTLS_X509_CRT_PARSE_C) && defined(MBEDTLS_PEM_PARSE_C)
|
||||
mbedtls_x509_crt_init( &cacert );
|
||||
if (mbedtls_x509_crt_parse( &cacert, (const unsigned char *) mbedtls_test_cas_pem,
|
||||
mbedtls_test_cas_pem_len ) != 0)
|
||||
mbedtls_x509_crt_init(&cacert);
|
||||
if (mbedtls_x509_crt_parse(&cacert, (const unsigned char *) mbedtls_test_cas_pem,
|
||||
mbedtls_test_cas_pem_len) != 0) {
|
||||
return 1;
|
||||
}
|
||||
#endif
|
||||
|
||||
alpn_list[0] = "HTTP";
|
||||
@@ -69,104 +71,118 @@ int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) {
|
||||
//Avoid warnings if compile options imply no options
|
||||
(void) options;
|
||||
|
||||
mbedtls_ssl_init( &ssl );
|
||||
mbedtls_ssl_config_init( &conf );
|
||||
mbedtls_ctr_drbg_init( &ctr_drbg );
|
||||
mbedtls_entropy_init( &entropy );
|
||||
mbedtls_ssl_init(&ssl);
|
||||
mbedtls_ssl_config_init(&conf);
|
||||
mbedtls_ctr_drbg_init(&ctr_drbg);
|
||||
mbedtls_entropy_init(&entropy);
|
||||
|
||||
if( mbedtls_ctr_drbg_seed( &ctr_drbg, dummy_entropy, &entropy,
|
||||
(const unsigned char *) pers, strlen( pers ) ) != 0 )
|
||||
if (mbedtls_ctr_drbg_seed(&ctr_drbg, dummy_entropy, &entropy,
|
||||
(const unsigned char *) pers, strlen(pers)) != 0) {
|
||||
goto exit;
|
||||
}
|
||||
|
||||
if( mbedtls_ssl_config_defaults( &conf,
|
||||
if (mbedtls_ssl_config_defaults(&conf,
|
||||
MBEDTLS_SSL_IS_CLIENT,
|
||||
MBEDTLS_SSL_TRANSPORT_STREAM,
|
||||
MBEDTLS_SSL_PRESET_DEFAULT ) != 0 )
|
||||
MBEDTLS_SSL_PRESET_DEFAULT) != 0) {
|
||||
goto exit;
|
||||
}
|
||||
|
||||
#if defined(MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED)
|
||||
if (options & 2) {
|
||||
mbedtls_ssl_conf_psk( &conf, psk, sizeof( psk ),
|
||||
(const unsigned char *) psk_id, sizeof( psk_id ) - 1 );
|
||||
mbedtls_ssl_conf_psk(&conf, psk, sizeof(psk),
|
||||
(const unsigned char *) psk_id, sizeof(psk_id) - 1);
|
||||
}
|
||||
#endif
|
||||
|
||||
#if defined(MBEDTLS_X509_CRT_PARSE_C) && defined(MBEDTLS_PEM_PARSE_C)
|
||||
if (options & 4) {
|
||||
mbedtls_ssl_conf_ca_chain( &conf, &cacert, NULL );
|
||||
mbedtls_ssl_conf_authmode( &conf, MBEDTLS_SSL_VERIFY_REQUIRED );
|
||||
mbedtls_ssl_conf_ca_chain(&conf, &cacert, NULL);
|
||||
mbedtls_ssl_conf_authmode(&conf, MBEDTLS_SSL_VERIFY_REQUIRED);
|
||||
} else
|
||||
#endif
|
||||
{
|
||||
mbedtls_ssl_conf_authmode( &conf, MBEDTLS_SSL_VERIFY_NONE );
|
||||
mbedtls_ssl_conf_authmode(&conf, MBEDTLS_SSL_VERIFY_NONE);
|
||||
}
|
||||
#if defined(MBEDTLS_SSL_TRUNCATED_HMAC)
|
||||
mbedtls_ssl_conf_truncated_hmac( &conf, (options & 8) ? MBEDTLS_SSL_TRUNC_HMAC_ENABLED : MBEDTLS_SSL_TRUNC_HMAC_DISABLED);
|
||||
mbedtls_ssl_conf_truncated_hmac(&conf,
|
||||
(options &
|
||||
8) ? MBEDTLS_SSL_TRUNC_HMAC_ENABLED : MBEDTLS_SSL_TRUNC_HMAC_DISABLED);
|
||||
#endif
|
||||
#if defined(MBEDTLS_SSL_EXTENDED_MASTER_SECRET)
|
||||
mbedtls_ssl_conf_extended_master_secret( &conf, (options & 0x10) ? MBEDTLS_SSL_EXTENDED_MS_DISABLED : MBEDTLS_SSL_EXTENDED_MS_ENABLED);
|
||||
mbedtls_ssl_conf_extended_master_secret(&conf,
|
||||
(options &
|
||||
0x10) ? MBEDTLS_SSL_EXTENDED_MS_DISABLED : MBEDTLS_SSL_EXTENDED_MS_ENABLED);
|
||||
#endif
|
||||
#if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC)
|
||||
mbedtls_ssl_conf_encrypt_then_mac( &conf, (options & 0x20) ? MBEDTLS_SSL_ETM_DISABLED : MBEDTLS_SSL_ETM_ENABLED);
|
||||
mbedtls_ssl_conf_encrypt_then_mac(&conf,
|
||||
(options &
|
||||
0x20) ? MBEDTLS_SSL_ETM_DISABLED : MBEDTLS_SSL_ETM_ENABLED);
|
||||
#endif
|
||||
#if defined(MBEDTLS_SSL_CBC_RECORD_SPLITTING)
|
||||
mbedtls_ssl_conf_cbc_record_splitting( &conf, (options & 0x40) ? MBEDTLS_SSL_CBC_RECORD_SPLITTING_ENABLED : MBEDTLS_SSL_CBC_RECORD_SPLITTING_DISABLED );
|
||||
mbedtls_ssl_conf_cbc_record_splitting(&conf,
|
||||
(options &
|
||||
0x40) ? MBEDTLS_SSL_CBC_RECORD_SPLITTING_ENABLED : MBEDTLS_SSL_CBC_RECORD_SPLITTING_DISABLED);
|
||||
#endif
|
||||
#if defined(MBEDTLS_SSL_RENEGOTIATION)
|
||||
mbedtls_ssl_conf_renegotiation( &conf, (options & 0x80) ? MBEDTLS_SSL_RENEGOTIATION_ENABLED : MBEDTLS_SSL_RENEGOTIATION_DISABLED );
|
||||
mbedtls_ssl_conf_renegotiation(&conf,
|
||||
(options &
|
||||
0x80) ? MBEDTLS_SSL_RENEGOTIATION_ENABLED : MBEDTLS_SSL_RENEGOTIATION_DISABLED);
|
||||
#endif
|
||||
#if defined(MBEDTLS_SSL_SESSION_TICKETS)
|
||||
mbedtls_ssl_conf_session_tickets( &conf, (options & 0x100) ? MBEDTLS_SSL_SESSION_TICKETS_DISABLED : MBEDTLS_SSL_SESSION_TICKETS_ENABLED );
|
||||
mbedtls_ssl_conf_session_tickets(&conf,
|
||||
(options &
|
||||
0x100) ? MBEDTLS_SSL_SESSION_TICKETS_DISABLED : MBEDTLS_SSL_SESSION_TICKETS_ENABLED);
|
||||
#endif
|
||||
#if defined(MBEDTLS_SSL_ALPN)
|
||||
if (options & 0x200) {
|
||||
mbedtls_ssl_conf_alpn_protocols( &conf, alpn_list );
|
||||
mbedtls_ssl_conf_alpn_protocols(&conf, alpn_list);
|
||||
}
|
||||
#endif
|
||||
//There may be other options to add :
|
||||
// mbedtls_ssl_conf_cert_profile, mbedtls_ssl_conf_sig_hashes
|
||||
|
||||
srand(1);
|
||||
mbedtls_ssl_conf_rng( &conf, dummy_random, &ctr_drbg );
|
||||
mbedtls_ssl_conf_rng(&conf, dummy_random, &ctr_drbg);
|
||||
|
||||
if( mbedtls_ssl_setup( &ssl, &conf ) != 0 )
|
||||
if (mbedtls_ssl_setup(&ssl, &conf) != 0) {
|
||||
goto exit;
|
||||
}
|
||||
|
||||
#if defined(MBEDTLS_X509_CRT_PARSE_C) && defined(MBEDTLS_PEM_PARSE_C)
|
||||
if ((options & 1) == 0) {
|
||||
if( mbedtls_ssl_set_hostname( &ssl, "localhost" ) != 0 )
|
||||
if (mbedtls_ssl_set_hostname(&ssl, "localhost") != 0) {
|
||||
goto exit;
|
||||
}
|
||||
}
|
||||
#endif
|
||||
|
||||
biomemfuzz.Data = Data;
|
||||
biomemfuzz.Size = Size-2;
|
||||
biomemfuzz.Offset = 0;
|
||||
mbedtls_ssl_set_bio( &ssl, &biomemfuzz, dummy_send, fuzz_recv, NULL );
|
||||
mbedtls_ssl_set_bio(&ssl, &biomemfuzz, dummy_send, fuzz_recv, NULL);
|
||||
|
||||
ret = mbedtls_ssl_handshake( &ssl );
|
||||
if( ret == 0 )
|
||||
{
|
||||
ret = mbedtls_ssl_handshake(&ssl);
|
||||
if (ret == 0) {
|
||||
//keep reading data from server until the end
|
||||
do
|
||||
{
|
||||
len = sizeof( buf ) - 1;
|
||||
ret = mbedtls_ssl_read( &ssl, buf, len );
|
||||
do {
|
||||
len = sizeof(buf) - 1;
|
||||
ret = mbedtls_ssl_read(&ssl, buf, len);
|
||||
|
||||
if( ret == MBEDTLS_ERR_SSL_WANT_READ )
|
||||
if (ret == MBEDTLS_ERR_SSL_WANT_READ) {
|
||||
continue;
|
||||
else if( ret <= 0 )
|
||||
} else if (ret <= 0) {
|
||||
//EOF or error
|
||||
break;
|
||||
}
|
||||
while( 1 );
|
||||
}
|
||||
} while (1);
|
||||
}
|
||||
|
||||
exit:
|
||||
mbedtls_entropy_free( &entropy );
|
||||
mbedtls_ctr_drbg_free( &ctr_drbg );
|
||||
mbedtls_ssl_config_free( &conf );
|
||||
mbedtls_ssl_free( &ssl );
|
||||
mbedtls_entropy_free(&entropy);
|
||||
mbedtls_ctr_drbg_free(&ctr_drbg);
|
||||
mbedtls_ssl_config_free(&conf);
|
||||
mbedtls_ssl_free(&ssl);
|
||||
|
||||
#else
|
||||
(void) Data;
|
||||
|
@@ -25,7 +25,8 @@ const char *pers = "fuzz_dtlsclient";
|
||||
|
||||
|
||||
|
||||
int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) {
|
||||
int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size)
|
||||
{
|
||||
#if defined(MBEDTLS_SSL_PROTO_DTLS) && \
|
||||
defined(MBEDTLS_SSL_CLI_C) && \
|
||||
defined(MBEDTLS_ENTROPY_C) && \
|
||||
@@ -43,77 +44,80 @@ int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) {
|
||||
|
||||
if (initialized == 0) {
|
||||
#if defined(MBEDTLS_X509_CRT_PARSE_C) && defined(MBEDTLS_PEM_PARSE_C)
|
||||
mbedtls_x509_crt_init( &cacert );
|
||||
if (mbedtls_x509_crt_parse( &cacert, (const unsigned char *) mbedtls_test_cas_pem,
|
||||
mbedtls_test_cas_pem_len ) != 0)
|
||||
mbedtls_x509_crt_init(&cacert);
|
||||
if (mbedtls_x509_crt_parse(&cacert, (const unsigned char *) mbedtls_test_cas_pem,
|
||||
mbedtls_test_cas_pem_len) != 0) {
|
||||
return 1;
|
||||
}
|
||||
#endif
|
||||
dummy_init();
|
||||
|
||||
initialized = 1;
|
||||
}
|
||||
|
||||
mbedtls_ssl_init( &ssl );
|
||||
mbedtls_ssl_config_init( &conf );
|
||||
mbedtls_ctr_drbg_init( &ctr_drbg );
|
||||
mbedtls_entropy_init( &entropy );
|
||||
mbedtls_ssl_init(&ssl);
|
||||
mbedtls_ssl_config_init(&conf);
|
||||
mbedtls_ctr_drbg_init(&ctr_drbg);
|
||||
mbedtls_entropy_init(&entropy);
|
||||
|
||||
srand(1);
|
||||
if( mbedtls_ctr_drbg_seed( &ctr_drbg, dummy_entropy, &entropy,
|
||||
(const unsigned char *) pers, strlen( pers ) ) != 0 )
|
||||
if (mbedtls_ctr_drbg_seed(&ctr_drbg, dummy_entropy, &entropy,
|
||||
(const unsigned char *) pers, strlen(pers)) != 0) {
|
||||
goto exit;
|
||||
}
|
||||
|
||||
if( mbedtls_ssl_config_defaults( &conf,
|
||||
if (mbedtls_ssl_config_defaults(&conf,
|
||||
MBEDTLS_SSL_IS_CLIENT,
|
||||
MBEDTLS_SSL_TRANSPORT_DATAGRAM,
|
||||
MBEDTLS_SSL_PRESET_DEFAULT ) != 0 )
|
||||
MBEDTLS_SSL_PRESET_DEFAULT) != 0) {
|
||||
goto exit;
|
||||
}
|
||||
|
||||
#if defined(MBEDTLS_X509_CRT_PARSE_C) && defined(MBEDTLS_PEM_PARSE_C)
|
||||
mbedtls_ssl_conf_ca_chain( &conf, &cacert, NULL );
|
||||
mbedtls_ssl_conf_ca_chain(&conf, &cacert, NULL);
|
||||
#endif
|
||||
mbedtls_ssl_conf_authmode( &conf, MBEDTLS_SSL_VERIFY_NONE );
|
||||
mbedtls_ssl_conf_rng( &conf, dummy_random, &ctr_drbg );
|
||||
mbedtls_ssl_conf_authmode(&conf, MBEDTLS_SSL_VERIFY_NONE);
|
||||
mbedtls_ssl_conf_rng(&conf, dummy_random, &ctr_drbg);
|
||||
|
||||
if( mbedtls_ssl_setup( &ssl, &conf ) != 0 )
|
||||
if (mbedtls_ssl_setup(&ssl, &conf) != 0) {
|
||||
goto exit;
|
||||
}
|
||||
|
||||
mbedtls_ssl_set_timer_cb( &ssl, &timer, mbedtls_timing_set_delay,
|
||||
mbedtls_timing_get_delay );
|
||||
mbedtls_ssl_set_timer_cb(&ssl, &timer, mbedtls_timing_set_delay,
|
||||
mbedtls_timing_get_delay);
|
||||
|
||||
#if defined(MBEDTLS_X509_CRT_PARSE_C) && defined(MBEDTLS_PEM_PARSE_C)
|
||||
if( mbedtls_ssl_set_hostname( &ssl, "localhost" ) != 0 )
|
||||
if (mbedtls_ssl_set_hostname(&ssl, "localhost") != 0) {
|
||||
goto exit;
|
||||
}
|
||||
#endif
|
||||
|
||||
biomemfuzz.Data = Data;
|
||||
biomemfuzz.Size = Size;
|
||||
biomemfuzz.Offset = 0;
|
||||
mbedtls_ssl_set_bio( &ssl, &biomemfuzz, dummy_send, fuzz_recv, fuzz_recv_timeout );
|
||||
mbedtls_ssl_set_bio(&ssl, &biomemfuzz, dummy_send, fuzz_recv, fuzz_recv_timeout);
|
||||
|
||||
ret = mbedtls_ssl_handshake( &ssl );
|
||||
if( ret == 0 )
|
||||
{
|
||||
ret = mbedtls_ssl_handshake(&ssl);
|
||||
if (ret == 0) {
|
||||
//keep reading data from server until the end
|
||||
do
|
||||
{
|
||||
len = sizeof( buf ) - 1;
|
||||
ret = mbedtls_ssl_read( &ssl, buf, len );
|
||||
do {
|
||||
len = sizeof(buf) - 1;
|
||||
ret = mbedtls_ssl_read(&ssl, buf, len);
|
||||
|
||||
if( ret == MBEDTLS_ERR_SSL_WANT_READ )
|
||||
if (ret == MBEDTLS_ERR_SSL_WANT_READ) {
|
||||
continue;
|
||||
else if( ret <= 0 )
|
||||
} else if (ret <= 0) {
|
||||
//EOF or error
|
||||
break;
|
||||
}
|
||||
while( 1 );
|
||||
}
|
||||
} while (1);
|
||||
}
|
||||
|
||||
exit:
|
||||
mbedtls_entropy_free( &entropy );
|
||||
mbedtls_ctr_drbg_free( &ctr_drbg );
|
||||
mbedtls_ssl_config_free( &conf );
|
||||
mbedtls_ssl_free( &ssl );
|
||||
mbedtls_entropy_free(&entropy);
|
||||
mbedtls_ctr_drbg_free(&ctr_drbg);
|
||||
mbedtls_ssl_config_free(&conf);
|
||||
mbedtls_ssl_free(&ssl);
|
||||
|
||||
#else
|
||||
(void) Data;
|
||||
|
@@ -14,10 +14,10 @@
|
||||
defined(MBEDTLS_ENTROPY_C) && \
|
||||
defined(MBEDTLS_CTR_DRBG_C) && \
|
||||
defined(MBEDTLS_TIMING_C) && \
|
||||
( defined(MBEDTLS_SHA256_C) || \
|
||||
( defined(MBEDTLS_SHA512_C) && !defined(MBEDTLS_SHA512_NO_SHA384) ) )
|
||||
(defined(MBEDTLS_SHA256_C) || \
|
||||
(defined(MBEDTLS_SHA512_C) && !defined(MBEDTLS_SHA512_NO_SHA384)))
|
||||
const char *pers = "fuzz_dtlsserver";
|
||||
const unsigned char client_ip[4] = {0x7F, 0, 0, 1};
|
||||
const unsigned char client_ip[4] = { 0x7F, 0, 0, 1 };
|
||||
static int initialized = 0;
|
||||
#if defined(MBEDTLS_X509_CRT_PARSE_C) && defined(MBEDTLS_PEM_PARSE_C)
|
||||
static mbedtls_x509_crt srvcert;
|
||||
@@ -26,14 +26,15 @@ static mbedtls_pk_context pkey;
|
||||
#endif
|
||||
#endif // MBEDTLS_SSL_PROTO_DTLS
|
||||
|
||||
int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) {
|
||||
int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size)
|
||||
{
|
||||
#if defined(MBEDTLS_SSL_PROTO_DTLS) && \
|
||||
defined(MBEDTLS_SSL_SRV_C) && \
|
||||
defined(MBEDTLS_ENTROPY_C) && \
|
||||
defined(MBEDTLS_CTR_DRBG_C) && \
|
||||
defined(MBEDTLS_TIMING_C) && \
|
||||
( defined(MBEDTLS_SHA256_C) || \
|
||||
( defined(MBEDTLS_SHA512_C) && !defined(MBEDTLS_SHA512_NO_SHA384) ) )
|
||||
(defined(MBEDTLS_SHA256_C) || \
|
||||
(defined(MBEDTLS_SHA512_C) && !defined(MBEDTLS_SHA512_NO_SHA384)))
|
||||
int ret;
|
||||
size_t len;
|
||||
mbedtls_ssl_context ssl;
|
||||
@@ -47,101 +48,112 @@ int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) {
|
||||
|
||||
if (initialized == 0) {
|
||||
#if defined(MBEDTLS_X509_CRT_PARSE_C) && defined(MBEDTLS_PEM_PARSE_C)
|
||||
mbedtls_x509_crt_init( &srvcert );
|
||||
mbedtls_pk_init( &pkey );
|
||||
if (mbedtls_x509_crt_parse( &srvcert, (const unsigned char *) mbedtls_test_srv_crt,
|
||||
mbedtls_test_srv_crt_len ) != 0)
|
||||
mbedtls_x509_crt_init(&srvcert);
|
||||
mbedtls_pk_init(&pkey);
|
||||
if (mbedtls_x509_crt_parse(&srvcert, (const unsigned char *) mbedtls_test_srv_crt,
|
||||
mbedtls_test_srv_crt_len) != 0) {
|
||||
return 1;
|
||||
if (mbedtls_x509_crt_parse( &srvcert, (const unsigned char *) mbedtls_test_cas_pem,
|
||||
mbedtls_test_cas_pem_len ) != 0)
|
||||
}
|
||||
if (mbedtls_x509_crt_parse(&srvcert, (const unsigned char *) mbedtls_test_cas_pem,
|
||||
mbedtls_test_cas_pem_len) != 0) {
|
||||
return 1;
|
||||
if (mbedtls_pk_parse_key( &pkey, (const unsigned char *) mbedtls_test_srv_key,
|
||||
mbedtls_test_srv_key_len, NULL, 0 ) != 0)
|
||||
}
|
||||
if (mbedtls_pk_parse_key(&pkey, (const unsigned char *) mbedtls_test_srv_key,
|
||||
mbedtls_test_srv_key_len, NULL, 0) != 0) {
|
||||
return 1;
|
||||
}
|
||||
#endif
|
||||
dummy_init();
|
||||
|
||||
initialized = 1;
|
||||
}
|
||||
mbedtls_ssl_init( &ssl );
|
||||
mbedtls_ssl_config_init( &conf );
|
||||
mbedtls_ctr_drbg_init( &ctr_drbg );
|
||||
mbedtls_entropy_init( &entropy );
|
||||
mbedtls_ssl_cookie_init( &cookie_ctx );
|
||||
mbedtls_ssl_init(&ssl);
|
||||
mbedtls_ssl_config_init(&conf);
|
||||
mbedtls_ctr_drbg_init(&ctr_drbg);
|
||||
mbedtls_entropy_init(&entropy);
|
||||
mbedtls_ssl_cookie_init(&cookie_ctx);
|
||||
|
||||
if( mbedtls_ctr_drbg_seed( &ctr_drbg, dummy_entropy, &entropy,
|
||||
(const unsigned char *) pers, strlen( pers ) ) != 0 )
|
||||
if (mbedtls_ctr_drbg_seed(&ctr_drbg, dummy_entropy, &entropy,
|
||||
(const unsigned char *) pers, strlen(pers)) != 0) {
|
||||
goto exit;
|
||||
}
|
||||
|
||||
|
||||
if( mbedtls_ssl_config_defaults( &conf,
|
||||
if (mbedtls_ssl_config_defaults(&conf,
|
||||
MBEDTLS_SSL_IS_SERVER,
|
||||
MBEDTLS_SSL_TRANSPORT_DATAGRAM,
|
||||
MBEDTLS_SSL_PRESET_DEFAULT ) != 0 )
|
||||
MBEDTLS_SSL_PRESET_DEFAULT) != 0) {
|
||||
goto exit;
|
||||
}
|
||||
|
||||
|
||||
srand(1);
|
||||
mbedtls_ssl_conf_rng( &conf, dummy_random, &ctr_drbg );
|
||||
mbedtls_ssl_conf_rng(&conf, dummy_random, &ctr_drbg);
|
||||
|
||||
#if defined(MBEDTLS_X509_CRT_PARSE_C) && defined(MBEDTLS_PEM_PARSE_C)
|
||||
mbedtls_ssl_conf_ca_chain( &conf, srvcert.next, NULL );
|
||||
if( mbedtls_ssl_conf_own_cert( &conf, &srvcert, &pkey ) != 0 )
|
||||
mbedtls_ssl_conf_ca_chain(&conf, srvcert.next, NULL);
|
||||
if (mbedtls_ssl_conf_own_cert(&conf, &srvcert, &pkey) != 0) {
|
||||
goto exit;
|
||||
}
|
||||
#endif
|
||||
|
||||
if( mbedtls_ssl_cookie_setup( &cookie_ctx, dummy_random, &ctr_drbg ) != 0 )
|
||||
if (mbedtls_ssl_cookie_setup(&cookie_ctx, dummy_random, &ctr_drbg) != 0) {
|
||||
goto exit;
|
||||
}
|
||||
|
||||
mbedtls_ssl_conf_dtls_cookies( &conf, mbedtls_ssl_cookie_write, mbedtls_ssl_cookie_check, &cookie_ctx );
|
||||
mbedtls_ssl_conf_dtls_cookies(&conf,
|
||||
mbedtls_ssl_cookie_write,
|
||||
mbedtls_ssl_cookie_check,
|
||||
&cookie_ctx);
|
||||
|
||||
if( mbedtls_ssl_setup( &ssl, &conf ) != 0 )
|
||||
if (mbedtls_ssl_setup(&ssl, &conf) != 0) {
|
||||
goto exit;
|
||||
}
|
||||
|
||||
mbedtls_ssl_set_timer_cb( &ssl, &timer, mbedtls_timing_set_delay,
|
||||
mbedtls_timing_get_delay );
|
||||
mbedtls_ssl_set_timer_cb(&ssl, &timer, mbedtls_timing_set_delay,
|
||||
mbedtls_timing_get_delay);
|
||||
|
||||
biomemfuzz.Data = Data;
|
||||
biomemfuzz.Size = Size;
|
||||
biomemfuzz.Offset = 0;
|
||||
mbedtls_ssl_set_bio( &ssl, &biomemfuzz, dummy_send, fuzz_recv, fuzz_recv_timeout );
|
||||
if( mbedtls_ssl_set_client_transport_id( &ssl, client_ip, sizeof(client_ip) ) != 0 )
|
||||
mbedtls_ssl_set_bio(&ssl, &biomemfuzz, dummy_send, fuzz_recv, fuzz_recv_timeout);
|
||||
if (mbedtls_ssl_set_client_transport_id(&ssl, client_ip, sizeof(client_ip)) != 0) {
|
||||
goto exit;
|
||||
}
|
||||
|
||||
ret = mbedtls_ssl_handshake( &ssl );
|
||||
ret = mbedtls_ssl_handshake(&ssl);
|
||||
|
||||
if (ret == MBEDTLS_ERR_SSL_HELLO_VERIFY_REQUIRED) {
|
||||
biomemfuzz.Offset = ssl.next_record_offset;
|
||||
mbedtls_ssl_session_reset( &ssl );
|
||||
mbedtls_ssl_set_bio( &ssl, &biomemfuzz, dummy_send, fuzz_recv, fuzz_recv_timeout );
|
||||
if( mbedtls_ssl_set_client_transport_id( &ssl, client_ip, sizeof(client_ip) ) != 0 )
|
||||
mbedtls_ssl_session_reset(&ssl);
|
||||
mbedtls_ssl_set_bio(&ssl, &biomemfuzz, dummy_send, fuzz_recv, fuzz_recv_timeout);
|
||||
if (mbedtls_ssl_set_client_transport_id(&ssl, client_ip, sizeof(client_ip)) != 0) {
|
||||
goto exit;
|
||||
}
|
||||
|
||||
ret = mbedtls_ssl_handshake( &ssl );
|
||||
ret = mbedtls_ssl_handshake(&ssl);
|
||||
|
||||
if( ret == 0 )
|
||||
{
|
||||
if (ret == 0) {
|
||||
//keep reading data from server until the end
|
||||
do
|
||||
{
|
||||
len = sizeof( buf ) - 1;
|
||||
ret = mbedtls_ssl_read( &ssl, buf, len );
|
||||
if( ret == MBEDTLS_ERR_SSL_WANT_READ )
|
||||
do {
|
||||
len = sizeof(buf) - 1;
|
||||
ret = mbedtls_ssl_read(&ssl, buf, len);
|
||||
if (ret == MBEDTLS_ERR_SSL_WANT_READ) {
|
||||
continue;
|
||||
else if( ret <= 0 )
|
||||
} else if (ret <= 0) {
|
||||
//EOF or error
|
||||
break;
|
||||
}
|
||||
while( 1 );
|
||||
}
|
||||
} while (1);
|
||||
}
|
||||
}
|
||||
|
||||
exit:
|
||||
mbedtls_ssl_cookie_free( &cookie_ctx );
|
||||
mbedtls_entropy_free( &entropy );
|
||||
mbedtls_ctr_drbg_free( &ctr_drbg );
|
||||
mbedtls_ssl_config_free( &conf );
|
||||
mbedtls_ssl_free( &ssl );
|
||||
mbedtls_ssl_cookie_free(&cookie_ctx);
|
||||
mbedtls_entropy_free(&entropy);
|
||||
mbedtls_ctr_drbg_free(&ctr_drbg);
|
||||
mbedtls_ssl_config_free(&conf);
|
||||
mbedtls_ssl_free(&ssl);
|
||||
|
||||
#else
|
||||
(void) Data;
|
||||
|
@@ -6,7 +6,8 @@
|
||||
#define MAX_LEN 0x1000
|
||||
|
||||
|
||||
int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) {
|
||||
int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size)
|
||||
{
|
||||
#ifdef MBEDTLS_PK_PARSE_C
|
||||
int ret;
|
||||
mbedtls_pk_context pk;
|
||||
@@ -16,56 +17,53 @@ int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) {
|
||||
Size = MAX_LEN;
|
||||
}
|
||||
|
||||
mbedtls_pk_init( &pk );
|
||||
ret = mbedtls_pk_parse_key( &pk, Data, Size, NULL, 0 );
|
||||
mbedtls_pk_init(&pk);
|
||||
ret = mbedtls_pk_parse_key(&pk, Data, Size, NULL, 0);
|
||||
if (ret == 0) {
|
||||
#if defined(MBEDTLS_RSA_C)
|
||||
if( mbedtls_pk_get_type( &pk ) == MBEDTLS_PK_RSA )
|
||||
{
|
||||
if (mbedtls_pk_get_type(&pk) == MBEDTLS_PK_RSA) {
|
||||
mbedtls_mpi N, P, Q, D, E, DP, DQ, QP;
|
||||
mbedtls_rsa_context *rsa;
|
||||
|
||||
mbedtls_mpi_init( &N ); mbedtls_mpi_init( &P ); mbedtls_mpi_init( &Q );
|
||||
mbedtls_mpi_init( &D ); mbedtls_mpi_init( &E ); mbedtls_mpi_init( &DP );
|
||||
mbedtls_mpi_init( &DQ ); mbedtls_mpi_init( &QP );
|
||||
mbedtls_mpi_init(&N); mbedtls_mpi_init(&P); mbedtls_mpi_init(&Q);
|
||||
mbedtls_mpi_init(&D); mbedtls_mpi_init(&E); mbedtls_mpi_init(&DP);
|
||||
mbedtls_mpi_init(&DQ); mbedtls_mpi_init(&QP);
|
||||
|
||||
rsa = mbedtls_pk_rsa( pk );
|
||||
if ( mbedtls_rsa_export( rsa, &N, &P, &Q, &D, &E ) != 0 ) {
|
||||
rsa = mbedtls_pk_rsa(pk);
|
||||
if (mbedtls_rsa_export(rsa, &N, &P, &Q, &D, &E) != 0) {
|
||||
abort();
|
||||
}
|
||||
if ( mbedtls_rsa_export_crt( rsa, &DP, &DQ, &QP ) != 0 ) {
|
||||
if (mbedtls_rsa_export_crt(rsa, &DP, &DQ, &QP) != 0) {
|
||||
abort();
|
||||
}
|
||||
|
||||
mbedtls_mpi_free( &N ); mbedtls_mpi_free( &P ); mbedtls_mpi_free( &Q );
|
||||
mbedtls_mpi_free( &D ); mbedtls_mpi_free( &E ); mbedtls_mpi_free( &DP );
|
||||
mbedtls_mpi_free( &DQ ); mbedtls_mpi_free( &QP );
|
||||
}
|
||||
else
|
||||
mbedtls_mpi_free(&N); mbedtls_mpi_free(&P); mbedtls_mpi_free(&Q);
|
||||
mbedtls_mpi_free(&D); mbedtls_mpi_free(&E); mbedtls_mpi_free(&DP);
|
||||
mbedtls_mpi_free(&DQ); mbedtls_mpi_free(&QP);
|
||||
} else
|
||||
#endif
|
||||
#if defined(MBEDTLS_ECP_C)
|
||||
if( mbedtls_pk_get_type( &pk ) == MBEDTLS_PK_ECKEY ||
|
||||
mbedtls_pk_get_type( &pk ) == MBEDTLS_PK_ECKEY_DH )
|
||||
{
|
||||
mbedtls_ecp_keypair *ecp = mbedtls_pk_ec( pk );
|
||||
if (mbedtls_pk_get_type(&pk) == MBEDTLS_PK_ECKEY ||
|
||||
mbedtls_pk_get_type(&pk) == MBEDTLS_PK_ECKEY_DH) {
|
||||
mbedtls_ecp_keypair *ecp = mbedtls_pk_ec(pk);
|
||||
mbedtls_ecp_group_id grp_id = ecp->grp.id;
|
||||
const mbedtls_ecp_curve_info *curve_info =
|
||||
mbedtls_ecp_curve_info_from_grp_id( grp_id );
|
||||
mbedtls_ecp_curve_info_from_grp_id(grp_id);
|
||||
|
||||
/* If the curve is not supported, the key should not have been
|
||||
* accepted. */
|
||||
if( curve_info == NULL )
|
||||
abort( );
|
||||
}
|
||||
else
|
||||
if (curve_info == NULL) {
|
||||
abort();
|
||||
}
|
||||
} else
|
||||
#endif
|
||||
{
|
||||
/* The key is valid but is not of a supported type.
|
||||
* This should not happen. */
|
||||
abort( );
|
||||
abort();
|
||||
}
|
||||
}
|
||||
mbedtls_pk_free( &pk );
|
||||
mbedtls_pk_free(&pk);
|
||||
#else
|
||||
(void) Data;
|
||||
(void) Size;
|
||||
|
@@ -2,70 +2,69 @@
|
||||
#include <stdlib.h>
|
||||
#include "mbedtls/pk.h"
|
||||
|
||||
int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) {
|
||||
int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size)
|
||||
{
|
||||
#ifdef MBEDTLS_PK_PARSE_C
|
||||
int ret;
|
||||
mbedtls_pk_context pk;
|
||||
|
||||
mbedtls_pk_init( &pk );
|
||||
ret = mbedtls_pk_parse_public_key( &pk, Data, Size );
|
||||
mbedtls_pk_init(&pk);
|
||||
ret = mbedtls_pk_parse_public_key(&pk, Data, Size);
|
||||
if (ret == 0) {
|
||||
#if defined(MBEDTLS_RSA_C)
|
||||
if( mbedtls_pk_get_type( &pk ) == MBEDTLS_PK_RSA )
|
||||
{
|
||||
if (mbedtls_pk_get_type(&pk) == MBEDTLS_PK_RSA) {
|
||||
mbedtls_mpi N, P, Q, D, E, DP, DQ, QP;
|
||||
mbedtls_rsa_context *rsa;
|
||||
|
||||
mbedtls_mpi_init( &N ); mbedtls_mpi_init( &P ); mbedtls_mpi_init( &Q );
|
||||
mbedtls_mpi_init( &D ); mbedtls_mpi_init( &E ); mbedtls_mpi_init( &DP );
|
||||
mbedtls_mpi_init( &DQ ); mbedtls_mpi_init( &QP );
|
||||
mbedtls_mpi_init(&N); mbedtls_mpi_init(&P); mbedtls_mpi_init(&Q);
|
||||
mbedtls_mpi_init(&D); mbedtls_mpi_init(&E); mbedtls_mpi_init(&DP);
|
||||
mbedtls_mpi_init(&DQ); mbedtls_mpi_init(&QP);
|
||||
|
||||
rsa = mbedtls_pk_rsa( pk );
|
||||
if ( mbedtls_rsa_export( rsa, &N, NULL, NULL, NULL, &E ) != 0 ) {
|
||||
rsa = mbedtls_pk_rsa(pk);
|
||||
if (mbedtls_rsa_export(rsa, &N, NULL, NULL, NULL, &E) != 0) {
|
||||
abort();
|
||||
}
|
||||
if ( mbedtls_rsa_export( rsa, &N, &P, &Q, &D, &E ) != MBEDTLS_ERR_RSA_BAD_INPUT_DATA ) {
|
||||
if (mbedtls_rsa_export(rsa, &N, &P, &Q, &D, &E) != MBEDTLS_ERR_RSA_BAD_INPUT_DATA) {
|
||||
abort();
|
||||
}
|
||||
if ( mbedtls_rsa_export_crt( rsa, &DP, &DQ, &QP ) != MBEDTLS_ERR_RSA_BAD_INPUT_DATA ) {
|
||||
if (mbedtls_rsa_export_crt(rsa, &DP, &DQ, &QP) != MBEDTLS_ERR_RSA_BAD_INPUT_DATA) {
|
||||
abort();
|
||||
}
|
||||
|
||||
mbedtls_mpi_free( &N ); mbedtls_mpi_free( &P ); mbedtls_mpi_free( &Q );
|
||||
mbedtls_mpi_free( &D ); mbedtls_mpi_free( &E ); mbedtls_mpi_free( &DP );
|
||||
mbedtls_mpi_free( &DQ ); mbedtls_mpi_free( &QP );
|
||||
mbedtls_mpi_free(&N); mbedtls_mpi_free(&P); mbedtls_mpi_free(&Q);
|
||||
mbedtls_mpi_free(&D); mbedtls_mpi_free(&E); mbedtls_mpi_free(&DP);
|
||||
mbedtls_mpi_free(&DQ); mbedtls_mpi_free(&QP);
|
||||
|
||||
}
|
||||
else
|
||||
} else
|
||||
#endif
|
||||
#if defined(MBEDTLS_ECP_C)
|
||||
if( mbedtls_pk_get_type( &pk ) == MBEDTLS_PK_ECKEY ||
|
||||
mbedtls_pk_get_type( &pk ) == MBEDTLS_PK_ECKEY_DH )
|
||||
{
|
||||
mbedtls_ecp_keypair *ecp = mbedtls_pk_ec( pk );
|
||||
if (mbedtls_pk_get_type(&pk) == MBEDTLS_PK_ECKEY ||
|
||||
mbedtls_pk_get_type(&pk) == MBEDTLS_PK_ECKEY_DH) {
|
||||
mbedtls_ecp_keypair *ecp = mbedtls_pk_ec(pk);
|
||||
mbedtls_ecp_group_id grp_id = ecp->grp.id;
|
||||
const mbedtls_ecp_curve_info *curve_info =
|
||||
mbedtls_ecp_curve_info_from_grp_id( grp_id );
|
||||
mbedtls_ecp_curve_info_from_grp_id(grp_id);
|
||||
|
||||
/* If the curve is not supported, the key should not have been
|
||||
* accepted. */
|
||||
if( curve_info == NULL )
|
||||
abort( );
|
||||
if (curve_info == NULL) {
|
||||
abort();
|
||||
}
|
||||
|
||||
/* It's a public key, so the private value should not have
|
||||
* been changed from its initialization to 0. */
|
||||
if( mbedtls_mpi_cmp_int( &ecp->d, 0 ) != 0 )
|
||||
abort( );
|
||||
}
|
||||
else
|
||||
if (mbedtls_mpi_cmp_int(&ecp->d, 0) != 0) {
|
||||
abort();
|
||||
}
|
||||
} else
|
||||
#endif
|
||||
{
|
||||
/* The key is valid but is not of a supported type.
|
||||
* This should not happen. */
|
||||
abort( );
|
||||
abort();
|
||||
}
|
||||
}
|
||||
mbedtls_pk_free( &pk );
|
||||
mbedtls_pk_free(&pk);
|
||||
#else
|
||||
(void) Data;
|
||||
(void) Size;
|
||||
|
@@ -30,7 +30,8 @@ const char psk_id[] = "Client_identity";
|
||||
#endif // MBEDTLS_SSL_SRV_C && MBEDTLS_ENTROPY_C && MBEDTLS_CTR_DRBG_C
|
||||
|
||||
|
||||
int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) {
|
||||
int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size)
|
||||
{
|
||||
#if defined(MBEDTLS_SSL_SRV_C) && \
|
||||
defined(MBEDTLS_ENTROPY_C) && \
|
||||
defined(MBEDTLS_CTR_DRBG_C)
|
||||
@@ -55,17 +56,20 @@ int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) {
|
||||
|
||||
if (initialized == 0) {
|
||||
#if defined(MBEDTLS_X509_CRT_PARSE_C) && defined(MBEDTLS_PEM_PARSE_C)
|
||||
mbedtls_x509_crt_init( &srvcert );
|
||||
mbedtls_pk_init( &pkey );
|
||||
if (mbedtls_x509_crt_parse( &srvcert, (const unsigned char *) mbedtls_test_srv_crt,
|
||||
mbedtls_test_srv_crt_len ) != 0)
|
||||
mbedtls_x509_crt_init(&srvcert);
|
||||
mbedtls_pk_init(&pkey);
|
||||
if (mbedtls_x509_crt_parse(&srvcert, (const unsigned char *) mbedtls_test_srv_crt,
|
||||
mbedtls_test_srv_crt_len) != 0) {
|
||||
return 1;
|
||||
if (mbedtls_x509_crt_parse( &srvcert, (const unsigned char *) mbedtls_test_cas_pem,
|
||||
mbedtls_test_cas_pem_len ) != 0)
|
||||
}
|
||||
if (mbedtls_x509_crt_parse(&srvcert, (const unsigned char *) mbedtls_test_cas_pem,
|
||||
mbedtls_test_cas_pem_len) != 0) {
|
||||
return 1;
|
||||
if (mbedtls_pk_parse_key( &pkey, (const unsigned char *) mbedtls_test_srv_key,
|
||||
mbedtls_test_srv_key_len, NULL, 0 ) != 0)
|
||||
}
|
||||
if (mbedtls_pk_parse_key(&pkey, (const unsigned char *) mbedtls_test_srv_key,
|
||||
mbedtls_test_srv_key_len, NULL, 0) != 0) {
|
||||
return 1;
|
||||
}
|
||||
#endif
|
||||
|
||||
alpn_list[0] = "HTTP";
|
||||
@@ -76,109 +80,121 @@ int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) {
|
||||
|
||||
initialized = 1;
|
||||
}
|
||||
mbedtls_ssl_init( &ssl );
|
||||
mbedtls_ssl_config_init( &conf );
|
||||
mbedtls_ctr_drbg_init( &ctr_drbg );
|
||||
mbedtls_entropy_init( &entropy );
|
||||
mbedtls_ssl_init(&ssl);
|
||||
mbedtls_ssl_config_init(&conf);
|
||||
mbedtls_ctr_drbg_init(&ctr_drbg);
|
||||
mbedtls_entropy_init(&entropy);
|
||||
#if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_TICKET_C)
|
||||
mbedtls_ssl_ticket_init( &ticket_ctx );
|
||||
mbedtls_ssl_ticket_init(&ticket_ctx);
|
||||
#endif
|
||||
|
||||
if( mbedtls_ctr_drbg_seed( &ctr_drbg, dummy_entropy, &entropy,
|
||||
(const unsigned char *) pers, strlen( pers ) ) != 0 )
|
||||
if (mbedtls_ctr_drbg_seed(&ctr_drbg, dummy_entropy, &entropy,
|
||||
(const unsigned char *) pers, strlen(pers)) != 0) {
|
||||
goto exit;
|
||||
}
|
||||
|
||||
|
||||
if( mbedtls_ssl_config_defaults( &conf,
|
||||
if (mbedtls_ssl_config_defaults(&conf,
|
||||
MBEDTLS_SSL_IS_SERVER,
|
||||
MBEDTLS_SSL_TRANSPORT_STREAM,
|
||||
MBEDTLS_SSL_PRESET_DEFAULT ) != 0 )
|
||||
MBEDTLS_SSL_PRESET_DEFAULT) != 0) {
|
||||
goto exit;
|
||||
}
|
||||
|
||||
srand(1);
|
||||
mbedtls_ssl_conf_rng( &conf, dummy_random, &ctr_drbg );
|
||||
mbedtls_ssl_conf_rng(&conf, dummy_random, &ctr_drbg);
|
||||
|
||||
#if defined(MBEDTLS_X509_CRT_PARSE_C) && defined(MBEDTLS_PEM_PARSE_C)
|
||||
mbedtls_ssl_conf_ca_chain( &conf, srvcert.next, NULL );
|
||||
if( mbedtls_ssl_conf_own_cert( &conf, &srvcert, &pkey ) != 0 )
|
||||
mbedtls_ssl_conf_ca_chain(&conf, srvcert.next, NULL);
|
||||
if (mbedtls_ssl_conf_own_cert(&conf, &srvcert, &pkey) != 0) {
|
||||
goto exit;
|
||||
}
|
||||
#endif
|
||||
|
||||
mbedtls_ssl_conf_cert_req_ca_list( &conf, (options & 0x1) ? MBEDTLS_SSL_CERT_REQ_CA_LIST_ENABLED : MBEDTLS_SSL_CERT_REQ_CA_LIST_DISABLED );
|
||||
mbedtls_ssl_conf_cert_req_ca_list(&conf,
|
||||
(options &
|
||||
0x1) ? MBEDTLS_SSL_CERT_REQ_CA_LIST_ENABLED : MBEDTLS_SSL_CERT_REQ_CA_LIST_DISABLED);
|
||||
#if defined(MBEDTLS_SSL_ALPN)
|
||||
if (options & 0x2) {
|
||||
mbedtls_ssl_conf_alpn_protocols( &conf, alpn_list );
|
||||
mbedtls_ssl_conf_alpn_protocols(&conf, alpn_list);
|
||||
}
|
||||
#endif
|
||||
#if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_TICKET_C)
|
||||
if( options & 0x4 )
|
||||
{
|
||||
if( mbedtls_ssl_ticket_setup( &ticket_ctx,
|
||||
if (options & 0x4) {
|
||||
if (mbedtls_ssl_ticket_setup(&ticket_ctx,
|
||||
dummy_random, &ctr_drbg,
|
||||
MBEDTLS_CIPHER_AES_256_GCM,
|
||||
86400 ) != 0 )
|
||||
86400) != 0) {
|
||||
goto exit;
|
||||
}
|
||||
|
||||
mbedtls_ssl_conf_session_tickets_cb( &conf,
|
||||
mbedtls_ssl_conf_session_tickets_cb(&conf,
|
||||
mbedtls_ssl_ticket_write,
|
||||
mbedtls_ssl_ticket_parse,
|
||||
&ticket_ctx );
|
||||
&ticket_ctx);
|
||||
}
|
||||
#endif
|
||||
#if defined(MBEDTLS_SSL_TRUNCATED_HMAC)
|
||||
mbedtls_ssl_conf_truncated_hmac( &conf, (options & 0x8) ? MBEDTLS_SSL_TRUNC_HMAC_ENABLED : MBEDTLS_SSL_TRUNC_HMAC_DISABLED);
|
||||
mbedtls_ssl_conf_truncated_hmac(&conf,
|
||||
(options &
|
||||
0x8) ? MBEDTLS_SSL_TRUNC_HMAC_ENABLED : MBEDTLS_SSL_TRUNC_HMAC_DISABLED);
|
||||
#endif
|
||||
#if defined(MBEDTLS_SSL_EXTENDED_MASTER_SECRET)
|
||||
mbedtls_ssl_conf_extended_master_secret( &conf, (options & 0x10) ? MBEDTLS_SSL_EXTENDED_MS_DISABLED : MBEDTLS_SSL_EXTENDED_MS_ENABLED);
|
||||
mbedtls_ssl_conf_extended_master_secret(&conf,
|
||||
(options &
|
||||
0x10) ? MBEDTLS_SSL_EXTENDED_MS_DISABLED : MBEDTLS_SSL_EXTENDED_MS_ENABLED);
|
||||
#endif
|
||||
#if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC)
|
||||
mbedtls_ssl_conf_encrypt_then_mac( &conf, (options & 0x20) ? MBEDTLS_SSL_ETM_ENABLED : MBEDTLS_SSL_ETM_DISABLED);
|
||||
mbedtls_ssl_conf_encrypt_then_mac(&conf,
|
||||
(options &
|
||||
0x20) ? MBEDTLS_SSL_ETM_ENABLED : MBEDTLS_SSL_ETM_DISABLED);
|
||||
#endif
|
||||
#if defined(MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED)
|
||||
if (options & 0x40) {
|
||||
mbedtls_ssl_conf_psk( &conf, psk, sizeof( psk ),
|
||||
(const unsigned char *) psk_id, sizeof( psk_id ) - 1 );
|
||||
mbedtls_ssl_conf_psk(&conf, psk, sizeof(psk),
|
||||
(const unsigned char *) psk_id, sizeof(psk_id) - 1);
|
||||
}
|
||||
#endif
|
||||
#if defined(MBEDTLS_SSL_RENEGOTIATION)
|
||||
mbedtls_ssl_conf_renegotiation( &conf, (options & 0x80) ? MBEDTLS_SSL_RENEGOTIATION_ENABLED : MBEDTLS_SSL_RENEGOTIATION_DISABLED );
|
||||
mbedtls_ssl_conf_renegotiation(&conf,
|
||||
(options &
|
||||
0x80) ? MBEDTLS_SSL_RENEGOTIATION_ENABLED : MBEDTLS_SSL_RENEGOTIATION_DISABLED);
|
||||
#endif
|
||||
|
||||
if( mbedtls_ssl_setup( &ssl, &conf ) != 0 )
|
||||
if (mbedtls_ssl_setup(&ssl, &conf) != 0) {
|
||||
goto exit;
|
||||
}
|
||||
|
||||
biomemfuzz.Data = Data;
|
||||
biomemfuzz.Size = Size-1;
|
||||
biomemfuzz.Offset = 0;
|
||||
mbedtls_ssl_set_bio( &ssl, &biomemfuzz, dummy_send, fuzz_recv, NULL );
|
||||
mbedtls_ssl_set_bio(&ssl, &biomemfuzz, dummy_send, fuzz_recv, NULL);
|
||||
|
||||
mbedtls_ssl_session_reset( &ssl );
|
||||
ret = mbedtls_ssl_handshake( &ssl );
|
||||
if( ret == 0 )
|
||||
{
|
||||
mbedtls_ssl_session_reset(&ssl);
|
||||
ret = mbedtls_ssl_handshake(&ssl);
|
||||
if (ret == 0) {
|
||||
//keep reading data from server until the end
|
||||
do
|
||||
{
|
||||
len = sizeof( buf ) - 1;
|
||||
ret = mbedtls_ssl_read( &ssl, buf, len );
|
||||
do {
|
||||
len = sizeof(buf) - 1;
|
||||
ret = mbedtls_ssl_read(&ssl, buf, len);
|
||||
|
||||
if( ret == MBEDTLS_ERR_SSL_WANT_READ )
|
||||
if (ret == MBEDTLS_ERR_SSL_WANT_READ) {
|
||||
continue;
|
||||
else if( ret <= 0 )
|
||||
} else if (ret <= 0) {
|
||||
//EOF or error
|
||||
break;
|
||||
}
|
||||
while( 1 );
|
||||
}
|
||||
} while (1);
|
||||
}
|
||||
|
||||
exit:
|
||||
#if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_TICKET_C)
|
||||
mbedtls_ssl_ticket_free( &ticket_ctx );
|
||||
mbedtls_ssl_ticket_free(&ticket_ctx);
|
||||
#endif
|
||||
mbedtls_entropy_free( &entropy );
|
||||
mbedtls_ctr_drbg_free( &ctr_drbg );
|
||||
mbedtls_ssl_config_free( &conf );
|
||||
mbedtls_ssl_free( &ssl );
|
||||
mbedtls_entropy_free(&entropy);
|
||||
mbedtls_ctr_drbg_free(&ctr_drbg);
|
||||
mbedtls_ssl_config_free(&conf);
|
||||
mbedtls_ssl_free(&ssl);
|
||||
|
||||
#else
|
||||
(void) Data;
|
||||
|
@@ -1,18 +1,19 @@
|
||||
#include <stdint.h>
|
||||
#include "mbedtls/x509_crl.h"
|
||||
|
||||
int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) {
|
||||
int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size)
|
||||
{
|
||||
#ifdef MBEDTLS_X509_CRL_PARSE_C
|
||||
int ret;
|
||||
mbedtls_x509_crl crl;
|
||||
unsigned char buf[4096];
|
||||
|
||||
mbedtls_x509_crl_init( &crl );
|
||||
ret = mbedtls_x509_crl_parse( &crl, Data, Size );
|
||||
mbedtls_x509_crl_init(&crl);
|
||||
ret = mbedtls_x509_crl_parse(&crl, Data, Size);
|
||||
if (ret == 0) {
|
||||
ret = mbedtls_x509_crl_info( (char *) buf, sizeof( buf ) - 1, " ", &crl );
|
||||
ret = mbedtls_x509_crl_info((char *) buf, sizeof(buf) - 1, " ", &crl);
|
||||
}
|
||||
mbedtls_x509_crl_free( &crl );
|
||||
mbedtls_x509_crl_free(&crl);
|
||||
#else
|
||||
(void) Data;
|
||||
(void) Size;
|
||||
|
@@ -1,18 +1,19 @@
|
||||
#include <stdint.h>
|
||||
#include "mbedtls/x509_crt.h"
|
||||
|
||||
int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) {
|
||||
int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size)
|
||||
{
|
||||
#ifdef MBEDTLS_X509_CRT_PARSE_C
|
||||
int ret;
|
||||
mbedtls_x509_crt crt;
|
||||
unsigned char buf[4096];
|
||||
|
||||
mbedtls_x509_crt_init( &crt );
|
||||
ret = mbedtls_x509_crt_parse( &crt, Data, Size );
|
||||
mbedtls_x509_crt_init(&crt);
|
||||
ret = mbedtls_x509_crt_parse(&crt, Data, Size);
|
||||
if (ret == 0) {
|
||||
ret = mbedtls_x509_crt_info( (char *) buf, sizeof( buf ) - 1, " ", &crt );
|
||||
ret = mbedtls_x509_crt_info((char *) buf, sizeof(buf) - 1, " ", &crt);
|
||||
}
|
||||
mbedtls_x509_crt_free( &crt );
|
||||
mbedtls_x509_crt_free(&crt);
|
||||
#else
|
||||
(void) Data;
|
||||
(void) Size;
|
||||
|
@@ -1,18 +1,19 @@
|
||||
#include <stdint.h>
|
||||
#include "mbedtls/x509_csr.h"
|
||||
|
||||
int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) {
|
||||
int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size)
|
||||
{
|
||||
#ifdef MBEDTLS_X509_CSR_PARSE_C
|
||||
int ret;
|
||||
mbedtls_x509_csr csr;
|
||||
unsigned char buf[4096];
|
||||
|
||||
mbedtls_x509_csr_init( &csr );
|
||||
ret = mbedtls_x509_csr_parse( &csr, Data, Size );
|
||||
mbedtls_x509_csr_init(&csr);
|
||||
ret = mbedtls_x509_csr_parse(&csr, Data, Size);
|
||||
if (ret == 0) {
|
||||
ret = mbedtls_x509_csr_info( (char *) buf, sizeof( buf ) - 1, " ", &csr );
|
||||
ret = mbedtls_x509_csr_info((char *) buf, sizeof(buf) - 1, " ", &csr);
|
||||
}
|
||||
mbedtls_x509_csr_free( &csr );
|
||||
mbedtls_x509_csr_free(&csr);
|
||||
#else
|
||||
(void) Data;
|
||||
(void) Size;
|
||||
|
@@ -13,9 +13,9 @@
|
||||
|
||||
int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size);
|
||||
|
||||
int main(int argc, char** argv)
|
||||
int main(int argc, char **argv)
|
||||
{
|
||||
FILE * fp;
|
||||
FILE *fp;
|
||||
uint8_t *Data;
|
||||
size_t Size;
|
||||
|
||||
@@ -57,4 +57,3 @@ int main(int argc, char** argv)
|
||||
fclose(fp);
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
Reference in New Issue
Block a user