blob: efe1362275f39765ac176848ca7bf4250731bbc0 [file] [log] [blame]
Felix Conway998760a2025-03-24 11:37:33 +00001#define MBEDTLS_DECLARE_PRIVATE_IDENTIFIERS
2
Philippe Antoine72333522018-05-03 16:40:24 +02003#include <string.h>
4#include <stdlib.h>
Philippe Antoine72333522018-05-03 16:40:24 +02005#include <stdint.h>
Philippe Antoine08633822019-06-04 14:03:06 +02006#include "common.h"
Philippe Antoine72333522018-05-03 16:40:24 +02007#include "mbedtls/ssl.h"
8#if defined(MBEDTLS_SSL_PROTO_DTLS)
9#include "mbedtls/entropy.h"
10#include "mbedtls/ctr_drbg.h"
Philippe Antoine72333522018-05-03 16:40:24 +020011#include "mbedtls/timing.h"
Mateusz Starzyk1aec6462021-02-08 15:34:42 +010012#include "test/certs.h"
Philippe Antoine72333522018-05-03 16:40:24 +020013
Manuel Pégourié-Gonnarda89040c2020-05-20 10:35:01 +020014#if defined(MBEDTLS_SSL_CLI_C) && \
15 defined(MBEDTLS_ENTROPY_C) && \
16 defined(MBEDTLS_CTR_DRBG_C) && \
17 defined(MBEDTLS_TIMING_C)
Philippe Antoine42a2ce82019-07-10 14:26:31 +020018static int initialized = 0;
Philippe Antoinedaab28a2019-06-28 12:31:23 +020019#if defined(MBEDTLS_X509_CRT_PARSE_C) && defined(MBEDTLS_PEM_PARSE_C)
Philippe Antoine72333522018-05-03 16:40:24 +020020static mbedtls_x509_crt cacert;
21#endif
22
Philippe Antoine72333522018-05-03 16:40:24 +020023const char *pers = "fuzz_dtlsclient";
Manuel Pégourié-Gonnarda89040c2020-05-20 10:35:01 +020024#endif
Philippe Antoineadc23e62019-06-25 21:53:12 +020025#endif // MBEDTLS_SSL_PROTO_DTLS
Philippe Antoine72333522018-05-03 16:40:24 +020026
27
28
Gilles Peskine449bd832023-01-11 14:50:10 +010029int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size)
30{
Manuel Pégourié-Gonnarda89040c2020-05-20 10:35:01 +020031#if defined(MBEDTLS_SSL_PROTO_DTLS) && \
32 defined(MBEDTLS_SSL_CLI_C) && \
33 defined(MBEDTLS_ENTROPY_C) && \
34 defined(MBEDTLS_CTR_DRBG_C) && \
35 defined(MBEDTLS_TIMING_C)
Philippe Antoine72333522018-05-03 16:40:24 +020036 int ret;
37 size_t len;
38 mbedtls_ssl_context ssl;
39 mbedtls_ssl_config conf;
40 mbedtls_ctr_drbg_context ctr_drbg;
41 mbedtls_entropy_context entropy;
42 mbedtls_timing_delay_context timer;
43 unsigned char buf[4096];
44 fuzzBufferOffset_t biomemfuzz;
45
46 if (initialized == 0) {
Philippe Antoinedaab28a2019-06-28 12:31:23 +020047#if defined(MBEDTLS_X509_CRT_PARSE_C) && defined(MBEDTLS_PEM_PARSE_C)
Gilles Peskine449bd832023-01-11 14:50:10 +010048 mbedtls_x509_crt_init(&cacert);
49 if (mbedtls_x509_crt_parse(&cacert, (const unsigned char *) mbedtls_test_cas_pem,
50 mbedtls_test_cas_pem_len) != 0) {
Philippe Antoine72333522018-05-03 16:40:24 +020051 return 1;
Gilles Peskine449bd832023-01-11 14:50:10 +010052 }
Philippe Antoine72333522018-05-03 16:40:24 +020053#endif
Philippe Antoine08633822019-06-04 14:03:06 +020054 dummy_init();
55
Philippe Antoine72333522018-05-03 16:40:24 +020056 initialized = 1;
57 }
58
Gilles Peskine449bd832023-01-11 14:50:10 +010059 mbedtls_ssl_init(&ssl);
60 mbedtls_ssl_config_init(&conf);
61 mbedtls_ctr_drbg_init(&ctr_drbg);
62 mbedtls_entropy_init(&entropy);
Philippe Antoine72333522018-05-03 16:40:24 +020063
Przemek Stekiel774f9de2023-04-19 11:47:01 +020064#if defined(MBEDTLS_USE_PSA_CRYPTO)
65 psa_status_t status = psa_crypto_init();
66 if (status != PSA_SUCCESS) {
67 goto exit;
68 }
69#endif /* MBEDTLS_USE_PSA_CRYPTO */
70
Gilles Peskine449bd832023-01-11 14:50:10 +010071 if (mbedtls_ctr_drbg_seed(&ctr_drbg, dummy_entropy, &entropy,
72 (const unsigned char *) pers, strlen(pers)) != 0) {
Philippe Antoine72333522018-05-03 16:40:24 +020073 goto exit;
Gilles Peskine449bd832023-01-11 14:50:10 +010074 }
Philippe Antoine72333522018-05-03 16:40:24 +020075
Gilles Peskine449bd832023-01-11 14:50:10 +010076 if (mbedtls_ssl_config_defaults(&conf,
Philippe Antoine72333522018-05-03 16:40:24 +020077 MBEDTLS_SSL_IS_CLIENT,
78 MBEDTLS_SSL_TRANSPORT_DATAGRAM,
Gilles Peskine449bd832023-01-11 14:50:10 +010079 MBEDTLS_SSL_PRESET_DEFAULT) != 0) {
Philippe Antoine72333522018-05-03 16:40:24 +020080 goto exit;
Gilles Peskine449bd832023-01-11 14:50:10 +010081 }
Philippe Antoine72333522018-05-03 16:40:24 +020082
Philippe Antoinedaab28a2019-06-28 12:31:23 +020083#if defined(MBEDTLS_X509_CRT_PARSE_C) && defined(MBEDTLS_PEM_PARSE_C)
Gilles Peskine449bd832023-01-11 14:50:10 +010084 mbedtls_ssl_conf_ca_chain(&conf, &cacert, NULL);
Philippe Antoine72333522018-05-03 16:40:24 +020085#endif
Gilles Peskine449bd832023-01-11 14:50:10 +010086 mbedtls_ssl_conf_authmode(&conf, MBEDTLS_SSL_VERIFY_NONE);
Philippe Antoine72333522018-05-03 16:40:24 +020087
Gilles Peskine449bd832023-01-11 14:50:10 +010088 if (mbedtls_ssl_setup(&ssl, &conf) != 0) {
Philippe Antoine72333522018-05-03 16:40:24 +020089 goto exit;
Gilles Peskine449bd832023-01-11 14:50:10 +010090 }
Philippe Antoine72333522018-05-03 16:40:24 +020091
Gilles Peskine449bd832023-01-11 14:50:10 +010092 mbedtls_ssl_set_timer_cb(&ssl, &timer, mbedtls_timing_set_delay,
93 mbedtls_timing_get_delay);
Philippe Antoine72333522018-05-03 16:40:24 +020094
Philippe Antoinedaab28a2019-06-28 12:31:23 +020095#if defined(MBEDTLS_X509_CRT_PARSE_C) && defined(MBEDTLS_PEM_PARSE_C)
Gilles Peskine449bd832023-01-11 14:50:10 +010096 if (mbedtls_ssl_set_hostname(&ssl, "localhost") != 0) {
Philippe Antoine72333522018-05-03 16:40:24 +020097 goto exit;
Gilles Peskine449bd832023-01-11 14:50:10 +010098 }
Philippe Antoine72333522018-05-03 16:40:24 +020099#endif
100
101 biomemfuzz.Data = Data;
102 biomemfuzz.Size = Size;
103 biomemfuzz.Offset = 0;
Gilles Peskine449bd832023-01-11 14:50:10 +0100104 mbedtls_ssl_set_bio(&ssl, &biomemfuzz, dummy_send, fuzz_recv, fuzz_recv_timeout);
Philippe Antoine72333522018-05-03 16:40:24 +0200105
Gilles Peskine449bd832023-01-11 14:50:10 +0100106 ret = mbedtls_ssl_handshake(&ssl);
107 if (ret == 0) {
Philippe Antoine72333522018-05-03 16:40:24 +0200108 //keep reading data from server until the end
Gilles Peskine449bd832023-01-11 14:50:10 +0100109 do {
110 len = sizeof(buf) - 1;
111 ret = mbedtls_ssl_read(&ssl, buf, len);
Philippe Antoine72333522018-05-03 16:40:24 +0200112
Gilles Peskine449bd832023-01-11 14:50:10 +0100113 if (ret == MBEDTLS_ERR_SSL_WANT_READ) {
Philippe Antoine72333522018-05-03 16:40:24 +0200114 continue;
Gilles Peskine449bd832023-01-11 14:50:10 +0100115 } else if (ret <= 0) {
Philippe Antoine72333522018-05-03 16:40:24 +0200116 //EOF or error
117 break;
Gilles Peskine449bd832023-01-11 14:50:10 +0100118 }
119 } while (1);
Philippe Antoine72333522018-05-03 16:40:24 +0200120 }
121
122exit:
Gilles Peskine449bd832023-01-11 14:50:10 +0100123 mbedtls_entropy_free(&entropy);
124 mbedtls_ctr_drbg_free(&ctr_drbg);
125 mbedtls_ssl_config_free(&conf);
126 mbedtls_ssl_free(&ssl);
Przemek Stekiel758aef62023-04-19 13:47:43 +0200127#if defined(MBEDTLS_USE_PSA_CRYPTO)
Przemek Stekiel774f9de2023-04-19 11:47:01 +0200128 mbedtls_psa_crypto_free();
Przemek Stekiel758aef62023-04-19 13:47:43 +0200129#endif /* MBEDTLS_USE_PSA_CRYPTO */
Philippe Antoine72333522018-05-03 16:40:24 +0200130
131#else
132 (void) Data;
133 (void) Size;
134#endif
135 return 0;
136}