Source code

Revision control

Copy as Markdown

Other Tools

/* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
#include <cassert>
#include <cstdint>
#include <iostream>
#include "blapi.h"
#include "seccomon.h"
#include "ssl.h"
#include "sslimpl.h"
#include "base/database.h"
#include "base/mutate.h"
#include "tls/common.h"
#include "tls/mutators.h"
#include "tls/server_certs.h"
#include "tls/server_config.h"
#include "tls/socket.h"
#ifdef IS_DTLS_FUZZ
#define ImportFD DTLS_ImportFD
#else
#define ImportFD SSL_ImportFD
#endif // IS_DTLS_FUZZ
class SSLServerSessionCache {
public:
SSLServerSessionCache() {
assert(SSL_ConfigServerSessionIDCache(1024, 0, 0, ".") == SECSuccess);
}
~SSLServerSessionCache() {
assert(SSL_ShutdownServerSessionIDCache() == SECSuccess);
}
};
static PRStatus InitModelSocket(void* arg) {
PRFileDesc* fd = reinterpret_cast<PRFileDesc*>(arg);
TlsCommon::EnableAllCipherSuites(fd);
TlsServer::InstallServerCertificates(fd);
return PR_SUCCESS;
}
extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) {
static NSSDatabase db = NSSDatabase();
static SSLServerSessionCache cache = SSLServerSessionCache();
static PRDescIdentity id = PR_GetUniqueIdentity("fuzz-server");
// Create model socket.
static ScopedPRFileDesc model(ImportFD(nullptr, PR_NewTCPSocket()));
assert(model);
// Initialize the model socket once.
static PRCallOnceType initModelOnce;
PR_CallOnceWithArg(&initModelOnce, InitModelSocket, model.get());
// Create and import dummy socket.
TlsSocket::DummyPrSocket socket = TlsSocket::DummyPrSocket(data, size);
ScopedPRFileDesc prFd(DummyIOLayerMethods::CreateFD(id, &socket));
PRFileDesc* sslFd = ImportFD(model.get(), prFd.get());
assert(sslFd == prFd.get());
// Derive server config from input data.
TlsServer::Config config = TlsServer::Config(data, size);
if (ssl_trace >= 90) {
std::cerr << config << "\n";
}
// Keeping things determinstic.
assert(RNG_RandomUpdate(NULL, 0) == SECSuccess);
assert(SSL_SetURL(sslFd, "fuzz.server") == SECSuccess);
TlsCommon::EnableAllProtocolVersions();
TlsCommon::EnableAllCipherSuites(sslFd);
TlsCommon::FixTime(sslFd);
// Set socket options from server config.
config.SetCallbacks(sslFd);
config.SetSocketOptions(sslFd);
// Perform the acutal handshake.
TlsCommon::DoHandshake(sslFd, true);
// Clear the cache. We never want to resume as we couldn't reproduce that.
SSL_ClearSessionCache();
return 0;
}
extern "C" size_t LLVMFuzzerCustomMutator(uint8_t* data, size_t size,
size_t maxSize, unsigned int seed) {
return CustomMutate(
{TlsMutators::DropRecord, TlsMutators::ShuffleRecords,
TlsMutators::DuplicateRecord, TlsMutators::TruncateRecord,
TlsMutators::FragmentRecord},
data, size, maxSize, seed);
}
extern "C" size_t LLVMFuzzerCustomCrossOver(const uint8_t* data1, size_t size1,
const uint8_t* data2, size_t size2,
uint8_t* out, size_t maxOutSize,
unsigned int seed) {
return TlsMutators::CrossOver(data1, size1, data2, size2, out, maxOutSize,
seed);
}