1 | /*
|
---|
2 | * Copyright 2016-2018 The OpenSSL Project Authors. All Rights Reserved.
|
---|
3 | *
|
---|
4 | * Licensed under the OpenSSL licenses, (the "License");
|
---|
5 | * you may not use this file except in compliance with the License.
|
---|
6 | * You may obtain a copy of the License at
|
---|
7 | * https://www.openssl.org/source/license.html
|
---|
8 | * or in the file LICENSE in the source distribution.
|
---|
9 | */
|
---|
10 |
|
---|
11 | #include <time.h>
|
---|
12 | #include <openssl/rand.h>
|
---|
13 | #include <openssl/ssl.h>
|
---|
14 | #include <openssl/rsa.h>
|
---|
15 | #include <openssl/dsa.h>
|
---|
16 | #include <openssl/ec.h>
|
---|
17 | #include <openssl/dh.h>
|
---|
18 | #include <openssl/err.h>
|
---|
19 | #include "fuzzer.h"
|
---|
20 |
|
---|
21 | #include "rand.inc"
|
---|
22 |
|
---|
23 | /* unused, to avoid warning. */
|
---|
24 | static int idx;
|
---|
25 |
|
---|
26 | #define FUZZTIME 1485898104
|
---|
27 |
|
---|
28 | #define TIME_IMPL(t) { if (t != NULL) *t = FUZZTIME; return FUZZTIME; }
|
---|
29 |
|
---|
30 | /*
|
---|
31 | * This might not work in all cases (and definitely not on Windows
|
---|
32 | * because of the way linkers are) and callees can still get the
|
---|
33 | * current time instead of the fixed time. This will just result
|
---|
34 | * in things not being fully reproducible and have a slightly
|
---|
35 | * different coverage.
|
---|
36 | */
|
---|
37 | #if !defined(_WIN32)
|
---|
38 | time_t time(time_t *t) TIME_IMPL(t)
|
---|
39 | #endif
|
---|
40 |
|
---|
41 | int FuzzerInitialize(int *argc, char ***argv)
|
---|
42 | {
|
---|
43 | STACK_OF(SSL_COMP) *comp_methods;
|
---|
44 |
|
---|
45 | OPENSSL_init_crypto(OPENSSL_INIT_LOAD_CRYPTO_STRINGS | OPENSSL_INIT_ASYNC, NULL);
|
---|
46 | OPENSSL_init_ssl(OPENSSL_INIT_LOAD_SSL_STRINGS, NULL);
|
---|
47 | ERR_get_state();
|
---|
48 | CRYPTO_free_ex_index(0, -1);
|
---|
49 | idx = SSL_get_ex_data_X509_STORE_CTX_idx();
|
---|
50 | FuzzerSetRand();
|
---|
51 | comp_methods = SSL_COMP_get_compression_methods();
|
---|
52 | if (comp_methods != NULL)
|
---|
53 | sk_SSL_COMP_sort(comp_methods);
|
---|
54 |
|
---|
55 | return 1;
|
---|
56 | }
|
---|
57 |
|
---|
58 | int FuzzerTestOneInput(const uint8_t *buf, size_t len)
|
---|
59 | {
|
---|
60 | SSL *client;
|
---|
61 | BIO *in;
|
---|
62 | BIO *out;
|
---|
63 | SSL_CTX *ctx;
|
---|
64 |
|
---|
65 | if (len == 0)
|
---|
66 | return 0;
|
---|
67 |
|
---|
68 | /*
|
---|
69 | * TODO: use the ossltest engine (optionally?) to disable crypto checks.
|
---|
70 | */
|
---|
71 |
|
---|
72 | /* This only fuzzes the initial flow from the client so far. */
|
---|
73 | ctx = SSL_CTX_new(SSLv23_method());
|
---|
74 |
|
---|
75 | client = SSL_new(ctx);
|
---|
76 | OPENSSL_assert(SSL_set_min_proto_version(client, 0) == 1);
|
---|
77 | OPENSSL_assert(SSL_set_cipher_list(client, "ALL:eNULL:@SECLEVEL=0") == 1);
|
---|
78 | SSL_set_tlsext_host_name(client, "localhost");
|
---|
79 | in = BIO_new(BIO_s_mem());
|
---|
80 | out = BIO_new(BIO_s_mem());
|
---|
81 | SSL_set_bio(client, in, out);
|
---|
82 | SSL_set_connect_state(client);
|
---|
83 | OPENSSL_assert((size_t)BIO_write(in, buf, len) == len);
|
---|
84 | if (SSL_do_handshake(client) == 1) {
|
---|
85 | /* Keep reading application data until error or EOF. */
|
---|
86 | uint8_t tmp[1024];
|
---|
87 | for (;;) {
|
---|
88 | if (SSL_read(client, tmp, sizeof(tmp)) <= 0) {
|
---|
89 | break;
|
---|
90 | }
|
---|
91 | }
|
---|
92 | }
|
---|
93 | SSL_free(client);
|
---|
94 | ERR_clear_error();
|
---|
95 | SSL_CTX_free(ctx);
|
---|
96 |
|
---|
97 | return 0;
|
---|
98 | }
|
---|
99 |
|
---|
100 | void FuzzerCleanup(void)
|
---|
101 | {
|
---|
102 | }
|
---|