blob: a58f6f45bb8f83b39ed65be76b85f404953350b9 [file] [log] [blame]
Mateusz Starzyk6c2e9b62021-05-19 17:54:54 +02001#define MBEDTLS_ALLOW_PRIVATE_ACCESS
2
Philippe Antoine72333522018-05-03 16:40:24 +02003#include <string.h>
4#include <stdlib.h>
Philippe Antoine72333522018-05-03 16:40:24 +02005#include <stdint.h>
Philippe Antoine08633822019-06-04 14:03:06 +02006#include "common.h"
Philippe Antoine72333522018-05-03 16:40:24 +02007#include "mbedtls/ssl.h"
8#if defined(MBEDTLS_SSL_PROTO_DTLS)
9#include "mbedtls/entropy.h"
10#include "mbedtls/ctr_drbg.h"
Philippe Antoine72333522018-05-03 16:40:24 +020011#include "mbedtls/timing.h"
Mateusz Starzyk1aec6462021-02-08 15:34:42 +010012#include "test/certs.h"
Philippe Antoine72333522018-05-03 16:40:24 +020013
Manuel Pégourié-Gonnarda89040c2020-05-20 10:35:01 +020014#if defined(MBEDTLS_SSL_CLI_C) && \
15 defined(MBEDTLS_ENTROPY_C) && \
16 defined(MBEDTLS_CTR_DRBG_C) && \
17 defined(MBEDTLS_TIMING_C)
Philippe Antoine42a2ce82019-07-10 14:26:31 +020018static int initialized = 0;
Philippe Antoinedaab28a2019-06-28 12:31:23 +020019#if defined(MBEDTLS_X509_CRT_PARSE_C) && defined(MBEDTLS_PEM_PARSE_C)
Philippe Antoine72333522018-05-03 16:40:24 +020020static mbedtls_x509_crt cacert;
21#endif
22
Philippe Antoine72333522018-05-03 16:40:24 +020023const char *pers = "fuzz_dtlsclient";
Manuel Pégourié-Gonnarda89040c2020-05-20 10:35:01 +020024#endif
Philippe Antoineadc23e62019-06-25 21:53:12 +020025#endif // MBEDTLS_SSL_PROTO_DTLS
Philippe Antoine72333522018-05-03 16:40:24 +020026
27
28
Gilles Peskine449bd832023-01-11 14:50:10 +010029int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size)
30{
Manuel Pégourié-Gonnarda89040c2020-05-20 10:35:01 +020031#if defined(MBEDTLS_SSL_PROTO_DTLS) && \
32 defined(MBEDTLS_SSL_CLI_C) && \
33 defined(MBEDTLS_ENTROPY_C) && \
34 defined(MBEDTLS_CTR_DRBG_C) && \
35 defined(MBEDTLS_TIMING_C)
Philippe Antoine72333522018-05-03 16:40:24 +020036 int ret;
37 size_t len;
38 mbedtls_ssl_context ssl;
39 mbedtls_ssl_config conf;
40 mbedtls_ctr_drbg_context ctr_drbg;
41 mbedtls_entropy_context entropy;
42 mbedtls_timing_delay_context timer;
43 unsigned char buf[4096];
44 fuzzBufferOffset_t biomemfuzz;
45
46 if (initialized == 0) {
Philippe Antoinedaab28a2019-06-28 12:31:23 +020047#if defined(MBEDTLS_X509_CRT_PARSE_C) && defined(MBEDTLS_PEM_PARSE_C)
Gilles Peskine449bd832023-01-11 14:50:10 +010048 mbedtls_x509_crt_init(&cacert);
49 if (mbedtls_x509_crt_parse(&cacert, (const unsigned char *) mbedtls_test_cas_pem,
50 mbedtls_test_cas_pem_len) != 0) {
Philippe Antoine72333522018-05-03 16:40:24 +020051 return 1;
Gilles Peskine449bd832023-01-11 14:50:10 +010052 }
Philippe Antoine72333522018-05-03 16:40:24 +020053#endif
Philippe Antoine08633822019-06-04 14:03:06 +020054 dummy_init();
55
Philippe Antoine72333522018-05-03 16:40:24 +020056 initialized = 1;
57 }
58
Gilles Peskine449bd832023-01-11 14:50:10 +010059 mbedtls_ssl_init(&ssl);
60 mbedtls_ssl_config_init(&conf);
61 mbedtls_ctr_drbg_init(&ctr_drbg);
62 mbedtls_entropy_init(&entropy);
Philippe Antoine72333522018-05-03 16:40:24 +020063
Philippe Antoine2b7c9a22019-06-04 12:05:36 +020064 srand(1);
Gilles Peskine449bd832023-01-11 14:50:10 +010065 if (mbedtls_ctr_drbg_seed(&ctr_drbg, dummy_entropy, &entropy,
66 (const unsigned char *) pers, strlen(pers)) != 0) {
Philippe Antoine72333522018-05-03 16:40:24 +020067 goto exit;
Gilles Peskine449bd832023-01-11 14:50:10 +010068 }
Philippe Antoine72333522018-05-03 16:40:24 +020069
Gilles Peskine449bd832023-01-11 14:50:10 +010070 if (mbedtls_ssl_config_defaults(&conf,
Philippe Antoine72333522018-05-03 16:40:24 +020071 MBEDTLS_SSL_IS_CLIENT,
72 MBEDTLS_SSL_TRANSPORT_DATAGRAM,
Gilles Peskine449bd832023-01-11 14:50:10 +010073 MBEDTLS_SSL_PRESET_DEFAULT) != 0) {
Philippe Antoine72333522018-05-03 16:40:24 +020074 goto exit;
Gilles Peskine449bd832023-01-11 14:50:10 +010075 }
Philippe Antoine72333522018-05-03 16:40:24 +020076
Philippe Antoinedaab28a2019-06-28 12:31:23 +020077#if defined(MBEDTLS_X509_CRT_PARSE_C) && defined(MBEDTLS_PEM_PARSE_C)
Gilles Peskine449bd832023-01-11 14:50:10 +010078 mbedtls_ssl_conf_ca_chain(&conf, &cacert, NULL);
Philippe Antoine72333522018-05-03 16:40:24 +020079#endif
Gilles Peskine449bd832023-01-11 14:50:10 +010080 mbedtls_ssl_conf_authmode(&conf, MBEDTLS_SSL_VERIFY_NONE);
81 mbedtls_ssl_conf_rng(&conf, dummy_random, &ctr_drbg);
Philippe Antoine72333522018-05-03 16:40:24 +020082
Gilles Peskine449bd832023-01-11 14:50:10 +010083 if (mbedtls_ssl_setup(&ssl, &conf) != 0) {
Philippe Antoine72333522018-05-03 16:40:24 +020084 goto exit;
Gilles Peskine449bd832023-01-11 14:50:10 +010085 }
Philippe Antoine72333522018-05-03 16:40:24 +020086
Gilles Peskine449bd832023-01-11 14:50:10 +010087 mbedtls_ssl_set_timer_cb(&ssl, &timer, mbedtls_timing_set_delay,
88 mbedtls_timing_get_delay);
Philippe Antoine72333522018-05-03 16:40:24 +020089
Philippe Antoinedaab28a2019-06-28 12:31:23 +020090#if defined(MBEDTLS_X509_CRT_PARSE_C) && defined(MBEDTLS_PEM_PARSE_C)
Gilles Peskine449bd832023-01-11 14:50:10 +010091 if (mbedtls_ssl_set_hostname(&ssl, "localhost") != 0) {
Philippe Antoine72333522018-05-03 16:40:24 +020092 goto exit;
Gilles Peskine449bd832023-01-11 14:50:10 +010093 }
Philippe Antoine72333522018-05-03 16:40:24 +020094#endif
95
96 biomemfuzz.Data = Data;
97 biomemfuzz.Size = Size;
98 biomemfuzz.Offset = 0;
Gilles Peskine449bd832023-01-11 14:50:10 +010099 mbedtls_ssl_set_bio(&ssl, &biomemfuzz, dummy_send, fuzz_recv, fuzz_recv_timeout);
Philippe Antoine72333522018-05-03 16:40:24 +0200100
Gilles Peskine449bd832023-01-11 14:50:10 +0100101 ret = mbedtls_ssl_handshake(&ssl);
102 if (ret == 0) {
Philippe Antoine72333522018-05-03 16:40:24 +0200103 //keep reading data from server until the end
Gilles Peskine449bd832023-01-11 14:50:10 +0100104 do {
105 len = sizeof(buf) - 1;
106 ret = mbedtls_ssl_read(&ssl, buf, len);
Philippe Antoine72333522018-05-03 16:40:24 +0200107
Gilles Peskine449bd832023-01-11 14:50:10 +0100108 if (ret == MBEDTLS_ERR_SSL_WANT_READ) {
Philippe Antoine72333522018-05-03 16:40:24 +0200109 continue;
Gilles Peskine449bd832023-01-11 14:50:10 +0100110 } else if (ret <= 0) {
Philippe Antoine72333522018-05-03 16:40:24 +0200111 //EOF or error
112 break;
Gilles Peskine449bd832023-01-11 14:50:10 +0100113 }
114 } while (1);
Philippe Antoine72333522018-05-03 16:40:24 +0200115 }
116
117exit:
Gilles Peskine449bd832023-01-11 14:50:10 +0100118 mbedtls_entropy_free(&entropy);
119 mbedtls_ctr_drbg_free(&ctr_drbg);
120 mbedtls_ssl_config_free(&conf);
121 mbedtls_ssl_free(&ssl);
Philippe Antoine72333522018-05-03 16:40:24 +0200122
123#else
124 (void) Data;
125 (void) Size;
126#endif
127 return 0;
128}