blob: 5f970e92ad87a393cbf8f1994d8718504528fa84 [file] [log] [blame]
Philippe Antoine72333522018-05-03 16:40:24 +02001#include "mbedtls/ssl.h"
2#include "mbedtls/entropy.h"
3#include "mbedtls/ctr_drbg.h"
4#include "mbedtls/certs.h"
5#include "mbedtls/ssl_ticket.h"
Philippe Antoine08633822019-06-04 14:03:06 +02006#include "common.h"
Philippe Antoine72333522018-05-03 16:40:24 +02007#include <string.h>
8#include <stdlib.h>
Philippe Antoine72333522018-05-03 16:40:24 +02009#include <stdint.h>
10
11
Manuel Pégourié-Gonnarda89040c2020-05-20 10:35:01 +020012#if defined(MBEDTLS_SSL_SRV_C) && \
13 defined(MBEDTLS_ENTROPY_C) && \
14 defined(MBEDTLS_CTR_DRBG_C)
Philippe Antoine72333522018-05-03 16:40:24 +020015const char *pers = "fuzz_server";
Philippe Antoine42a2ce82019-07-10 14:26:31 +020016static int initialized = 0;
Philippe Antoinedaab28a2019-06-28 12:31:23 +020017#if defined(MBEDTLS_X509_CRT_PARSE_C) && defined(MBEDTLS_PEM_PARSE_C)
Philippe Antoine72333522018-05-03 16:40:24 +020018static mbedtls_x509_crt srvcert;
19static mbedtls_pk_context pkey;
20#endif
21const char *alpn_list[3];
22
Gilles Peskineeccd8882020-03-10 12:19:08 +010023#if defined(MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED)
Philippe Antoine72333522018-05-03 16:40:24 +020024const unsigned char psk[] = {
25 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
26 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f
27};
28const char psk_id[] = "Client_identity";
29#endif
Manuel Pégourié-Gonnarda89040c2020-05-20 10:35:01 +020030#endif // MBEDTLS_SSL_SRV_C && MBEDTLS_ENTROPY_C && MBEDTLS_CTR_DRBG_C
Philippe Antoine72333522018-05-03 16:40:24 +020031
32
Gilles Peskine1b6c09a2023-01-11 14:52:35 +010033int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size)
34{
Manuel Pégourié-Gonnarda89040c2020-05-20 10:35:01 +020035#if defined(MBEDTLS_SSL_SRV_C) && \
36 defined(MBEDTLS_ENTROPY_C) && \
37 defined(MBEDTLS_CTR_DRBG_C)
Philippe Antoine72333522018-05-03 16:40:24 +020038 int ret;
39 size_t len;
40 mbedtls_ssl_context ssl;
41 mbedtls_ssl_config conf;
42 mbedtls_ctr_drbg_context ctr_drbg;
43 mbedtls_entropy_context entropy;
Przemek Stekiel7aca4e42022-10-10 14:14:13 +020044#if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_TICKET_C)
Philippe Antoine72333522018-05-03 16:40:24 +020045 mbedtls_ssl_ticket_context ticket_ctx;
46#endif
47 unsigned char buf[4096];
48 fuzzBufferOffset_t biomemfuzz;
49 uint8_t options;
50
51 //we take 1 byte as options input
52 if (Size < 1) {
53 return 0;
54 }
55 options = Data[Size - 1];
56
57 if (initialized == 0) {
Philippe Antoinedaab28a2019-06-28 12:31:23 +020058#if defined(MBEDTLS_X509_CRT_PARSE_C) && defined(MBEDTLS_PEM_PARSE_C)
Gilles Peskine1b6c09a2023-01-11 14:52:35 +010059 mbedtls_x509_crt_init(&srvcert);
60 mbedtls_pk_init(&pkey);
61 if (mbedtls_x509_crt_parse(&srvcert, (const unsigned char *) mbedtls_test_srv_crt,
62 mbedtls_test_srv_crt_len) != 0) {
Philippe Antoine72333522018-05-03 16:40:24 +020063 return 1;
Gilles Peskine1b6c09a2023-01-11 14:52:35 +010064 }
65 if (mbedtls_x509_crt_parse(&srvcert, (const unsigned char *) mbedtls_test_cas_pem,
66 mbedtls_test_cas_pem_len) != 0) {
Philippe Antoine72333522018-05-03 16:40:24 +020067 return 1;
Gilles Peskine1b6c09a2023-01-11 14:52:35 +010068 }
69 if (mbedtls_pk_parse_key(&pkey, (const unsigned char *) mbedtls_test_srv_key,
70 mbedtls_test_srv_key_len, NULL, 0) != 0) {
Philippe Antoine72333522018-05-03 16:40:24 +020071 return 1;
Gilles Peskine1b6c09a2023-01-11 14:52:35 +010072 }
Philippe Antoine72333522018-05-03 16:40:24 +020073#endif
74
75 alpn_list[0] = "HTTP";
76 alpn_list[1] = "fuzzalpn";
77 alpn_list[2] = NULL;
78
Philippe Antoine08633822019-06-04 14:03:06 +020079 dummy_init();
80
Philippe Antoine72333522018-05-03 16:40:24 +020081 initialized = 1;
82 }
Gilles Peskine1b6c09a2023-01-11 14:52:35 +010083 mbedtls_ssl_init(&ssl);
84 mbedtls_ssl_config_init(&conf);
85 mbedtls_ctr_drbg_init(&ctr_drbg);
86 mbedtls_entropy_init(&entropy);
Przemek Stekiel7aca4e42022-10-10 14:14:13 +020087#if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_TICKET_C)
Gilles Peskine1b6c09a2023-01-11 14:52:35 +010088 mbedtls_ssl_ticket_init(&ticket_ctx);
Philippe Antoine72333522018-05-03 16:40:24 +020089#endif
90
Gilles Peskine1b6c09a2023-01-11 14:52:35 +010091 if (mbedtls_ctr_drbg_seed(&ctr_drbg, dummy_entropy, &entropy,
92 (const unsigned char *) pers, strlen(pers)) != 0) {
Philippe Antoine72333522018-05-03 16:40:24 +020093 goto exit;
Gilles Peskine1b6c09a2023-01-11 14:52:35 +010094 }
Philippe Antoine72333522018-05-03 16:40:24 +020095
96
Gilles Peskine1b6c09a2023-01-11 14:52:35 +010097 if (mbedtls_ssl_config_defaults(&conf,
Philippe Antoine72333522018-05-03 16:40:24 +020098 MBEDTLS_SSL_IS_SERVER,
99 MBEDTLS_SSL_TRANSPORT_STREAM,
Gilles Peskine1b6c09a2023-01-11 14:52:35 +0100100 MBEDTLS_SSL_PRESET_DEFAULT) != 0) {
Philippe Antoine72333522018-05-03 16:40:24 +0200101 goto exit;
Gilles Peskine1b6c09a2023-01-11 14:52:35 +0100102 }
Philippe Antoine72333522018-05-03 16:40:24 +0200103
Philippe Antoine2b7c9a22019-06-04 12:05:36 +0200104 srand(1);
Gilles Peskine1b6c09a2023-01-11 14:52:35 +0100105 mbedtls_ssl_conf_rng(&conf, dummy_random, &ctr_drbg);
Philippe Antoine72333522018-05-03 16:40:24 +0200106
Philippe Antoinedaab28a2019-06-28 12:31:23 +0200107#if defined(MBEDTLS_X509_CRT_PARSE_C) && defined(MBEDTLS_PEM_PARSE_C)
Gilles Peskine1b6c09a2023-01-11 14:52:35 +0100108 mbedtls_ssl_conf_ca_chain(&conf, srvcert.next, NULL);
109 if (mbedtls_ssl_conf_own_cert(&conf, &srvcert, &pkey) != 0) {
Philippe Antoine72333522018-05-03 16:40:24 +0200110 goto exit;
Gilles Peskine1b6c09a2023-01-11 14:52:35 +0100111 }
Philippe Antoine72333522018-05-03 16:40:24 +0200112#endif
113
Gilles Peskine1b6c09a2023-01-11 14:52:35 +0100114 mbedtls_ssl_conf_cert_req_ca_list(&conf,
115 (options &
116 0x1) ? MBEDTLS_SSL_CERT_REQ_CA_LIST_ENABLED : MBEDTLS_SSL_CERT_REQ_CA_LIST_DISABLED);
Philippe Antoine72333522018-05-03 16:40:24 +0200117#if defined(MBEDTLS_SSL_ALPN)
118 if (options & 0x2) {
Gilles Peskine1b6c09a2023-01-11 14:52:35 +0100119 mbedtls_ssl_conf_alpn_protocols(&conf, alpn_list);
Philippe Antoine72333522018-05-03 16:40:24 +0200120 }
121#endif
Przemek Stekiel7aca4e42022-10-10 14:14:13 +0200122#if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_TICKET_C)
Gilles Peskine1b6c09a2023-01-11 14:52:35 +0100123 if (options & 0x4) {
124 if (mbedtls_ssl_ticket_setup(&ticket_ctx,
Philippe Antoine72333522018-05-03 16:40:24 +0200125 dummy_random, &ctr_drbg,
126 MBEDTLS_CIPHER_AES_256_GCM,
Gilles Peskine1b6c09a2023-01-11 14:52:35 +0100127 86400) != 0) {
Philippe Antoine72333522018-05-03 16:40:24 +0200128 goto exit;
Gilles Peskine1b6c09a2023-01-11 14:52:35 +0100129 }
Philippe Antoine72333522018-05-03 16:40:24 +0200130
Gilles Peskine1b6c09a2023-01-11 14:52:35 +0100131 mbedtls_ssl_conf_session_tickets_cb(&conf,
Philippe Antoine72333522018-05-03 16:40:24 +0200132 mbedtls_ssl_ticket_write,
133 mbedtls_ssl_ticket_parse,
Gilles Peskine1b6c09a2023-01-11 14:52:35 +0100134 &ticket_ctx);
Philippe Antoine72333522018-05-03 16:40:24 +0200135 }
136#endif
137#if defined(MBEDTLS_SSL_TRUNCATED_HMAC)
Gilles Peskine1b6c09a2023-01-11 14:52:35 +0100138 mbedtls_ssl_conf_truncated_hmac(&conf,
139 (options &
140 0x8) ? MBEDTLS_SSL_TRUNC_HMAC_ENABLED : MBEDTLS_SSL_TRUNC_HMAC_DISABLED);
Philippe Antoine72333522018-05-03 16:40:24 +0200141#endif
142#if defined(MBEDTLS_SSL_EXTENDED_MASTER_SECRET)
Gilles Peskine1b6c09a2023-01-11 14:52:35 +0100143 mbedtls_ssl_conf_extended_master_secret(&conf,
144 (options &
145 0x10) ? MBEDTLS_SSL_EXTENDED_MS_DISABLED : MBEDTLS_SSL_EXTENDED_MS_ENABLED);
Philippe Antoine72333522018-05-03 16:40:24 +0200146#endif
147#if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC)
Gilles Peskine1b6c09a2023-01-11 14:52:35 +0100148 mbedtls_ssl_conf_encrypt_then_mac(&conf,
149 (options &
150 0x20) ? MBEDTLS_SSL_ETM_ENABLED : MBEDTLS_SSL_ETM_DISABLED);
Philippe Antoine72333522018-05-03 16:40:24 +0200151#endif
Gilles Peskineeccd8882020-03-10 12:19:08 +0100152#if defined(MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED)
Philippe Antoine72333522018-05-03 16:40:24 +0200153 if (options & 0x40) {
Gilles Peskine1b6c09a2023-01-11 14:52:35 +0100154 mbedtls_ssl_conf_psk(&conf, psk, sizeof(psk),
155 (const unsigned char *) psk_id, sizeof(psk_id) - 1);
Philippe Antoine72333522018-05-03 16:40:24 +0200156 }
157#endif
158#if defined(MBEDTLS_SSL_RENEGOTIATION)
Gilles Peskine1b6c09a2023-01-11 14:52:35 +0100159 mbedtls_ssl_conf_renegotiation(&conf,
160 (options &
161 0x80) ? MBEDTLS_SSL_RENEGOTIATION_ENABLED : MBEDTLS_SSL_RENEGOTIATION_DISABLED);
Philippe Antoine72333522018-05-03 16:40:24 +0200162#endif
163
Gilles Peskine1b6c09a2023-01-11 14:52:35 +0100164 if (mbedtls_ssl_setup(&ssl, &conf) != 0) {
Philippe Antoine72333522018-05-03 16:40:24 +0200165 goto exit;
Gilles Peskine1b6c09a2023-01-11 14:52:35 +0100166 }
Philippe Antoine72333522018-05-03 16:40:24 +0200167
168 biomemfuzz.Data = Data;
169 biomemfuzz.Size = Size-1;
170 biomemfuzz.Offset = 0;
Gilles Peskine1b6c09a2023-01-11 14:52:35 +0100171 mbedtls_ssl_set_bio(&ssl, &biomemfuzz, dummy_send, fuzz_recv, NULL);
Philippe Antoine72333522018-05-03 16:40:24 +0200172
Gilles Peskine1b6c09a2023-01-11 14:52:35 +0100173 mbedtls_ssl_session_reset(&ssl);
174 ret = mbedtls_ssl_handshake(&ssl);
175 if (ret == 0) {
Philippe Antoine72333522018-05-03 16:40:24 +0200176 //keep reading data from server until the end
Gilles Peskine1b6c09a2023-01-11 14:52:35 +0100177 do {
178 len = sizeof(buf) - 1;
179 ret = mbedtls_ssl_read(&ssl, buf, len);
Philippe Antoine72333522018-05-03 16:40:24 +0200180
Gilles Peskine1b6c09a2023-01-11 14:52:35 +0100181 if (ret == MBEDTLS_ERR_SSL_WANT_READ) {
Philippe Antoine72333522018-05-03 16:40:24 +0200182 continue;
Gilles Peskine1b6c09a2023-01-11 14:52:35 +0100183 } else if (ret <= 0) {
Philippe Antoine72333522018-05-03 16:40:24 +0200184 //EOF or error
185 break;
Gilles Peskine1b6c09a2023-01-11 14:52:35 +0100186 }
187 } while (1);
Philippe Antoine72333522018-05-03 16:40:24 +0200188 }
189
190exit:
Przemek Stekiel7aca4e42022-10-10 14:14:13 +0200191#if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_TICKET_C)
Gilles Peskine1b6c09a2023-01-11 14:52:35 +0100192 mbedtls_ssl_ticket_free(&ticket_ctx);
Philippe Antoine72333522018-05-03 16:40:24 +0200193#endif
Gilles Peskine1b6c09a2023-01-11 14:52:35 +0100194 mbedtls_entropy_free(&entropy);
195 mbedtls_ctr_drbg_free(&ctr_drbg);
196 mbedtls_ssl_config_free(&conf);
197 mbedtls_ssl_free(&ssl);
Philippe Antoine72333522018-05-03 16:40:24 +0200198
Philippe Antoinec32fd242019-06-06 09:12:53 +0200199#else
200 (void) Data;
201 (void) Size;
Manuel Pégourié-Gonnarda89040c2020-05-20 10:35:01 +0200202#endif /* MBEDTLS_SSL_SRV_C && MBEDTLS_ENTROPY_C && MBEDTLS_CTR_DRBG_C */
Philippe Antoinec32fd242019-06-06 09:12:53 +0200203
Philippe Antoine72333522018-05-03 16:40:24 +0200204 return 0;
205}