blob: 29c8672f75ff378d6208f608ab3f52cbb05b48ce [file] [log] [blame]
Philippe Antoine72333522018-05-03 16:40:24 +02001#include <string.h>
2#include <stdlib.h>
Philippe Antoine72333522018-05-03 16:40:24 +02003#include <stdint.h>
Philippe Antoine08633822019-06-04 14:03:06 +02004#include "common.h"
Philippe Antoine72333522018-05-03 16:40:24 +02005#include "mbedtls/ssl.h"
6#if defined(MBEDTLS_SSL_PROTO_DTLS)
7#include "mbedtls/entropy.h"
8#include "mbedtls/ctr_drbg.h"
Philippe Antoine72333522018-05-03 16:40:24 +02009#include "mbedtls/timing.h"
Mateusz Starzyk1aec6462021-02-08 15:34:42 +010010#include "test/certs.h"
Philippe Antoine72333522018-05-03 16:40:24 +020011
Manuel Pégourié-Gonnarda89040c2020-05-20 10:35:01 +020012#if defined(MBEDTLS_SSL_CLI_C) && \
13 defined(MBEDTLS_ENTROPY_C) && \
14 defined(MBEDTLS_CTR_DRBG_C) && \
15 defined(MBEDTLS_TIMING_C)
Philippe Antoine42a2ce82019-07-10 14:26:31 +020016static int initialized = 0;
Philippe Antoinedaab28a2019-06-28 12:31:23 +020017#if defined(MBEDTLS_X509_CRT_PARSE_C) && defined(MBEDTLS_PEM_PARSE_C)
Philippe Antoine72333522018-05-03 16:40:24 +020018static mbedtls_x509_crt cacert;
19#endif
20
Philippe Antoine72333522018-05-03 16:40:24 +020021const char *pers = "fuzz_dtlsclient";
Manuel Pégourié-Gonnarda89040c2020-05-20 10:35:01 +020022#endif
Philippe Antoineadc23e62019-06-25 21:53:12 +020023#endif // MBEDTLS_SSL_PROTO_DTLS
Philippe Antoine72333522018-05-03 16:40:24 +020024
25
26
27int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) {
Manuel Pégourié-Gonnarda89040c2020-05-20 10:35:01 +020028#if defined(MBEDTLS_SSL_PROTO_DTLS) && \
29 defined(MBEDTLS_SSL_CLI_C) && \
30 defined(MBEDTLS_ENTROPY_C) && \
31 defined(MBEDTLS_CTR_DRBG_C) && \
32 defined(MBEDTLS_TIMING_C)
Philippe Antoine72333522018-05-03 16:40:24 +020033 int ret;
34 size_t len;
35 mbedtls_ssl_context ssl;
36 mbedtls_ssl_config conf;
37 mbedtls_ctr_drbg_context ctr_drbg;
38 mbedtls_entropy_context entropy;
39 mbedtls_timing_delay_context timer;
40 unsigned char buf[4096];
41 fuzzBufferOffset_t biomemfuzz;
42
43 if (initialized == 0) {
Philippe Antoinedaab28a2019-06-28 12:31:23 +020044#if defined(MBEDTLS_X509_CRT_PARSE_C) && defined(MBEDTLS_PEM_PARSE_C)
Philippe Antoine72333522018-05-03 16:40:24 +020045 mbedtls_x509_crt_init( &cacert );
46 if (mbedtls_x509_crt_parse( &cacert, (const unsigned char *) mbedtls_test_cas_pem,
47 mbedtls_test_cas_pem_len ) != 0)
48 return 1;
49#endif
Philippe Antoine08633822019-06-04 14:03:06 +020050 dummy_init();
51
Philippe Antoine72333522018-05-03 16:40:24 +020052 initialized = 1;
53 }
54
55 mbedtls_ssl_init( &ssl );
56 mbedtls_ssl_config_init( &conf );
57 mbedtls_ctr_drbg_init( &ctr_drbg );
58 mbedtls_entropy_init( &entropy );
59
Philippe Antoine2b7c9a22019-06-04 12:05:36 +020060 srand(1);
Philippe Antoine72333522018-05-03 16:40:24 +020061 if( mbedtls_ctr_drbg_seed( &ctr_drbg, dummy_entropy, &entropy,
62 (const unsigned char *) pers, strlen( pers ) ) != 0 )
63 goto exit;
64
65 if( mbedtls_ssl_config_defaults( &conf,
66 MBEDTLS_SSL_IS_CLIENT,
67 MBEDTLS_SSL_TRANSPORT_DATAGRAM,
68 MBEDTLS_SSL_PRESET_DEFAULT ) != 0 )
69 goto exit;
70
Philippe Antoinedaab28a2019-06-28 12:31:23 +020071#if defined(MBEDTLS_X509_CRT_PARSE_C) && defined(MBEDTLS_PEM_PARSE_C)
Philippe Antoine72333522018-05-03 16:40:24 +020072 mbedtls_ssl_conf_ca_chain( &conf, &cacert, NULL );
73#endif
74 mbedtls_ssl_conf_authmode( &conf, MBEDTLS_SSL_VERIFY_NONE );
75 mbedtls_ssl_conf_rng( &conf, dummy_random, &ctr_drbg );
76
77 if( mbedtls_ssl_setup( &ssl, &conf ) != 0 )
78 goto exit;
79
80 mbedtls_ssl_set_timer_cb( &ssl, &timer, mbedtls_timing_set_delay,
81 mbedtls_timing_get_delay );
82
Philippe Antoinedaab28a2019-06-28 12:31:23 +020083#if defined(MBEDTLS_X509_CRT_PARSE_C) && defined(MBEDTLS_PEM_PARSE_C)
Philippe Antoine72333522018-05-03 16:40:24 +020084 if( mbedtls_ssl_set_hostname( &ssl, "localhost" ) != 0 )
85 goto exit;
86#endif
87
88 biomemfuzz.Data = Data;
89 biomemfuzz.Size = Size;
90 biomemfuzz.Offset = 0;
91 mbedtls_ssl_set_bio( &ssl, &biomemfuzz, dummy_send, fuzz_recv, fuzz_recv_timeout );
92
93 ret = mbedtls_ssl_handshake( &ssl );
94 if( ret == 0 )
95 {
96 //keep reading data from server until the end
97 do
98 {
99 len = sizeof( buf ) - 1;
100 ret = mbedtls_ssl_read( &ssl, buf, len );
101
102 if( ret == MBEDTLS_ERR_SSL_WANT_READ )
103 continue;
104 else if( ret <= 0 )
105 //EOF or error
106 break;
107 }
108 while( 1 );
109 }
110
111exit:
112 mbedtls_entropy_free( &entropy );
113 mbedtls_ctr_drbg_free( &ctr_drbg );
114 mbedtls_ssl_config_free( &conf );
115 mbedtls_ssl_free( &ssl );
116
117#else
118 (void) Data;
119 (void) Size;
120#endif
121 return 0;
122}