gecko-dev/security/nss/fuzz/tls_client_target.cc

114 строки
3.2 KiB
C++
Исходник Обычный вид История

/* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
#include <assert.h>
#include <stdint.h>
#include <memory>
#include "blapi.h"
#include "prinit.h"
#include "ssl.h"
#include "shared.h"
#include "tls_client_socket.h"
static PRStatus EnableAllProtocolVersions() {
SSLVersionRange supported;
SECStatus rv = SSL_VersionRangeGetSupported(ssl_variant_stream, &supported);
assert(rv == SECSuccess);
rv = SSL_VersionRangeSetDefault(ssl_variant_stream, &supported);
assert(rv == SECSuccess);
return PR_SUCCESS;
}
static SECStatus AuthCertificateHook(void* arg, PRFileDesc* fd, PRBool checksig,
PRBool isServer) {
return SECSuccess;
}
static void SetSocketOptions(PRFileDesc* fd) {
// Disable session cache for now.
SECStatus rv = SSL_OptionSet(fd, SSL_NO_CACHE, true);
assert(rv == SECSuccess);
rv = SSL_OptionSet(fd, SSL_ENABLE_EXTENDED_MASTER_SECRET, true);
assert(rv == SECSuccess);
rv = SSL_OptionSet(fd, SSL_ENABLE_SIGNED_CERT_TIMESTAMPS, true);
assert(rv == SECSuccess);
rv = SSL_OptionSet(fd, SSL_ENABLE_FALLBACK_SCSV, true);
assert(rv == SECSuccess);
rv = SSL_OptionSet(fd, SSL_ENABLE_ALPN, true);
assert(rv == SECSuccess);
rv =
SSL_OptionSet(fd, SSL_ENABLE_RENEGOTIATION, SSL_RENEGOTIATE_UNRESTRICTED);
assert(rv == SECSuccess);
}
static void EnableAllCipherSuites(PRFileDesc* fd) {
for (uint16_t i = 0; i < SSL_NumImplementedCiphers; ++i) {
SECStatus rv = SSL_CipherPrefSet(fd, SSL_ImplementedCiphers[i], true);
assert(rv == SECSuccess);
}
}
static void SetupAuthCertificateHook(PRFileDesc* fd) {
SECStatus rv = SSL_AuthCertificateHook(fd, AuthCertificateHook, nullptr);
assert(rv == SECSuccess);
}
static void DoHandshake(PRFileDesc* fd) {
SECStatus rv = SSL_ResetHandshake(fd, false /* asServer */);
assert(rv == SECSuccess);
do {
rv = SSL_ForceHandshake(fd);
} while (rv != SECSuccess && PR_GetError() == PR_WOULD_BLOCK_ERROR);
// If the handshake succeeds, let's read some data from the server, if any.
if (rv == SECSuccess) {
uint8_t block[1024];
int32_t nb;
// Read application data and echo it back.
while ((nb = PR_Read(fd, block, sizeof(block))) > 0) {
PR_Write(fd, block, nb);
}
}
}
extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t len) {
static std::unique_ptr<NSSDatabase> db(new NSSDatabase());
assert(db != nullptr);
EnableAllProtocolVersions();
// Reset the RNG state.
SECStatus rv = RNG_ResetForFuzzing();
assert(rv == SECSuccess);
// Create and import dummy socket.
std::unique_ptr<DummyPrSocket> socket(new DummyPrSocket(data, len));
static PRDescIdentity id = PR_GetUniqueIdentity("fuzz-client");
ScopedPRFileDesc fd(DummyIOLayerMethods::CreateFD(id, socket.get()));
PRFileDesc* ssl_fd = SSL_ImportFD(nullptr, fd.get());
assert(ssl_fd == fd.get());
// Probably not too important for clients.
SSL_SetURL(ssl_fd, "server");
SetSocketOptions(ssl_fd);
EnableAllCipherSuites(ssl_fd);
SetupAuthCertificateHook(ssl_fd);
DoHandshake(ssl_fd);
return 0;
}