blob: 3659026840a2a40c2d341c925ac2a6335ddbfe3f [file] [log] [blame]
Mateusz Starzyk6c2e9b62021-05-19 17:54:54 +02001#define MBEDTLS_ALLOW_PRIVATE_ACCESS
2
Philippe Antoine72333522018-05-03 16:40:24 +02003#include <string.h>
4#include <stdlib.h>
Philippe Antoine72333522018-05-03 16:40:24 +02005#include <stdint.h>
Philippe Antoine08633822019-06-04 14:03:06 +02006#include "common.h"
Philippe Antoine72333522018-05-03 16:40:24 +02007#include "mbedtls/ssl.h"
8#if defined(MBEDTLS_SSL_PROTO_DTLS)
9#include "mbedtls/entropy.h"
10#include "mbedtls/ctr_drbg.h"
Philippe Antoine72333522018-05-03 16:40:24 +020011#include "mbedtls/timing.h"
Mateusz Starzyk1aec6462021-02-08 15:34:42 +010012#include "test/certs.h"
Philippe Antoine72333522018-05-03 16:40:24 +020013
Manuel Pégourié-Gonnarda89040c2020-05-20 10:35:01 +020014#if defined(MBEDTLS_SSL_CLI_C) && \
15 defined(MBEDTLS_ENTROPY_C) && \
16 defined(MBEDTLS_CTR_DRBG_C) && \
17 defined(MBEDTLS_TIMING_C)
Philippe Antoine42a2ce82019-07-10 14:26:31 +020018static int initialized = 0;
Philippe Antoinedaab28a2019-06-28 12:31:23 +020019#if defined(MBEDTLS_X509_CRT_PARSE_C) && defined(MBEDTLS_PEM_PARSE_C)
Philippe Antoine72333522018-05-03 16:40:24 +020020static mbedtls_x509_crt cacert;
21#endif
22
Philippe Antoine72333522018-05-03 16:40:24 +020023const char *pers = "fuzz_dtlsclient";
Manuel Pégourié-Gonnarda89040c2020-05-20 10:35:01 +020024#endif
Philippe Antoineadc23e62019-06-25 21:53:12 +020025#endif // MBEDTLS_SSL_PROTO_DTLS
Philippe Antoine72333522018-05-03 16:40:24 +020026
27
28
Gilles Peskine449bd832023-01-11 14:50:10 +010029int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size)
30{
Manuel Pégourié-Gonnarda89040c2020-05-20 10:35:01 +020031#if defined(MBEDTLS_SSL_PROTO_DTLS) && \
32 defined(MBEDTLS_SSL_CLI_C) && \
33 defined(MBEDTLS_ENTROPY_C) && \
34 defined(MBEDTLS_CTR_DRBG_C) && \
35 defined(MBEDTLS_TIMING_C)
Philippe Antoine72333522018-05-03 16:40:24 +020036 int ret;
37 size_t len;
38 mbedtls_ssl_context ssl;
39 mbedtls_ssl_config conf;
40 mbedtls_ctr_drbg_context ctr_drbg;
41 mbedtls_entropy_context entropy;
42 mbedtls_timing_delay_context timer;
43 unsigned char buf[4096];
44 fuzzBufferOffset_t biomemfuzz;
45
46 if (initialized == 0) {
Philippe Antoinedaab28a2019-06-28 12:31:23 +020047#if defined(MBEDTLS_X509_CRT_PARSE_C) && defined(MBEDTLS_PEM_PARSE_C)
Gilles Peskine449bd832023-01-11 14:50:10 +010048 mbedtls_x509_crt_init(&cacert);
49 if (mbedtls_x509_crt_parse(&cacert, (const unsigned char *) mbedtls_test_cas_pem,
50 mbedtls_test_cas_pem_len) != 0) {
Philippe Antoine72333522018-05-03 16:40:24 +020051 return 1;
Gilles Peskine449bd832023-01-11 14:50:10 +010052 }
Philippe Antoine72333522018-05-03 16:40:24 +020053#endif
Philippe Antoine08633822019-06-04 14:03:06 +020054 dummy_init();
55
Philippe Antoine72333522018-05-03 16:40:24 +020056 initialized = 1;
57 }
58
Gilles Peskine449bd832023-01-11 14:50:10 +010059 mbedtls_ssl_init(&ssl);
60 mbedtls_ssl_config_init(&conf);
61 mbedtls_ctr_drbg_init(&ctr_drbg);
62 mbedtls_entropy_init(&entropy);
Philippe Antoine72333522018-05-03 16:40:24 +020063
Przemek Stekiel774f9de2023-04-19 11:47:01 +020064#if defined(MBEDTLS_USE_PSA_CRYPTO)
65 psa_status_t status = psa_crypto_init();
66 if (status != PSA_SUCCESS) {
67 goto exit;
68 }
69#endif /* MBEDTLS_USE_PSA_CRYPTO */
70
Philippe Antoine2b7c9a22019-06-04 12:05:36 +020071 srand(1);
Gilles Peskine449bd832023-01-11 14:50:10 +010072 if (mbedtls_ctr_drbg_seed(&ctr_drbg, dummy_entropy, &entropy,
73 (const unsigned char *) pers, strlen(pers)) != 0) {
Philippe Antoine72333522018-05-03 16:40:24 +020074 goto exit;
Gilles Peskine449bd832023-01-11 14:50:10 +010075 }
Philippe Antoine72333522018-05-03 16:40:24 +020076
Gilles Peskine449bd832023-01-11 14:50:10 +010077 if (mbedtls_ssl_config_defaults(&conf,
Philippe Antoine72333522018-05-03 16:40:24 +020078 MBEDTLS_SSL_IS_CLIENT,
79 MBEDTLS_SSL_TRANSPORT_DATAGRAM,
Gilles Peskine449bd832023-01-11 14:50:10 +010080 MBEDTLS_SSL_PRESET_DEFAULT) != 0) {
Philippe Antoine72333522018-05-03 16:40:24 +020081 goto exit;
Gilles Peskine449bd832023-01-11 14:50:10 +010082 }
Philippe Antoine72333522018-05-03 16:40:24 +020083
Philippe Antoinedaab28a2019-06-28 12:31:23 +020084#if defined(MBEDTLS_X509_CRT_PARSE_C) && defined(MBEDTLS_PEM_PARSE_C)
Gilles Peskine449bd832023-01-11 14:50:10 +010085 mbedtls_ssl_conf_ca_chain(&conf, &cacert, NULL);
Philippe Antoine72333522018-05-03 16:40:24 +020086#endif
Gilles Peskine449bd832023-01-11 14:50:10 +010087 mbedtls_ssl_conf_authmode(&conf, MBEDTLS_SSL_VERIFY_NONE);
88 mbedtls_ssl_conf_rng(&conf, dummy_random, &ctr_drbg);
Philippe Antoine72333522018-05-03 16:40:24 +020089
Gilles Peskine449bd832023-01-11 14:50:10 +010090 if (mbedtls_ssl_setup(&ssl, &conf) != 0) {
Philippe Antoine72333522018-05-03 16:40:24 +020091 goto exit;
Gilles Peskine449bd832023-01-11 14:50:10 +010092 }
Philippe Antoine72333522018-05-03 16:40:24 +020093
Gilles Peskine449bd832023-01-11 14:50:10 +010094 mbedtls_ssl_set_timer_cb(&ssl, &timer, mbedtls_timing_set_delay,
95 mbedtls_timing_get_delay);
Philippe Antoine72333522018-05-03 16:40:24 +020096
Philippe Antoinedaab28a2019-06-28 12:31:23 +020097#if defined(MBEDTLS_X509_CRT_PARSE_C) && defined(MBEDTLS_PEM_PARSE_C)
Gilles Peskine449bd832023-01-11 14:50:10 +010098 if (mbedtls_ssl_set_hostname(&ssl, "localhost") != 0) {
Philippe Antoine72333522018-05-03 16:40:24 +020099 goto exit;
Gilles Peskine449bd832023-01-11 14:50:10 +0100100 }
Philippe Antoine72333522018-05-03 16:40:24 +0200101#endif
102
103 biomemfuzz.Data = Data;
104 biomemfuzz.Size = Size;
105 biomemfuzz.Offset = 0;
Gilles Peskine449bd832023-01-11 14:50:10 +0100106 mbedtls_ssl_set_bio(&ssl, &biomemfuzz, dummy_send, fuzz_recv, fuzz_recv_timeout);
Philippe Antoine72333522018-05-03 16:40:24 +0200107
Gilles Peskine449bd832023-01-11 14:50:10 +0100108 ret = mbedtls_ssl_handshake(&ssl);
109 if (ret == 0) {
Philippe Antoine72333522018-05-03 16:40:24 +0200110 //keep reading data from server until the end
Gilles Peskine449bd832023-01-11 14:50:10 +0100111 do {
112 len = sizeof(buf) - 1;
113 ret = mbedtls_ssl_read(&ssl, buf, len);
Philippe Antoine72333522018-05-03 16:40:24 +0200114
Gilles Peskine449bd832023-01-11 14:50:10 +0100115 if (ret == MBEDTLS_ERR_SSL_WANT_READ) {
Philippe Antoine72333522018-05-03 16:40:24 +0200116 continue;
Gilles Peskine449bd832023-01-11 14:50:10 +0100117 } else if (ret <= 0) {
Philippe Antoine72333522018-05-03 16:40:24 +0200118 //EOF or error
119 break;
Gilles Peskine449bd832023-01-11 14:50:10 +0100120 }
121 } while (1);
Philippe Antoine72333522018-05-03 16:40:24 +0200122 }
123
124exit:
Gilles Peskine449bd832023-01-11 14:50:10 +0100125 mbedtls_entropy_free(&entropy);
126 mbedtls_ctr_drbg_free(&ctr_drbg);
127 mbedtls_ssl_config_free(&conf);
128 mbedtls_ssl_free(&ssl);
Przemek Stekiel758aef62023-04-19 13:47:43 +0200129#if defined(MBEDTLS_USE_PSA_CRYPTO)
Przemek Stekiel774f9de2023-04-19 11:47:01 +0200130 mbedtls_psa_crypto_free();
Przemek Stekiel758aef62023-04-19 13:47:43 +0200131#endif /* MBEDTLS_USE_PSA_CRYPTO */
Philippe Antoine72333522018-05-03 16:40:24 +0200132
133#else
134 (void) Data;
135 (void) Size;
136#endif
137 return 0;
138}