/src/openssl/fuzz/quic-client.c
Line | Count | Source (jump to first uncovered line) |
1 | | /* |
2 | | * Copyright 2016-2022 The OpenSSL Project Authors. All Rights Reserved. |
3 | | * |
4 | | * Licensed under the Apache License 2.0 (the "License"); |
5 | | * you may not use this file except in compliance with the License. |
6 | | * You may obtain a copy of the License at |
7 | | * https://www.openssl.org/source/license.html |
8 | | * or in the file LICENSE in the source distribution. |
9 | | */ |
10 | | |
11 | | #include <openssl/ssl.h> |
12 | | #include <openssl/err.h> |
13 | | #include <openssl/bio.h> |
14 | | #include "fuzzer.h" |
15 | | #include "internal/sockets.h" |
16 | | #include "internal/time.h" |
17 | | #include "internal/quic_ssl.h" |
18 | | |
19 | | /* unused, to avoid warning. */ |
20 | | static int idx; |
21 | | |
22 | | static OSSL_TIME fake_now; |
23 | | |
24 | | static OSSL_TIME fake_now_cb(void *arg) |
25 | 50.3M | { |
26 | 50.3M | return fake_now; |
27 | 50.3M | } |
28 | | |
29 | | int FuzzerInitialize(int *argc, char ***argv) |
30 | 2 | { |
31 | 2 | STACK_OF(SSL_COMP) *comp_methods; |
32 | | |
33 | 2 | FuzzerSetRand(); |
34 | 2 | OPENSSL_init_crypto(OPENSSL_INIT_LOAD_CRYPTO_STRINGS | OPENSSL_INIT_ASYNC, NULL); |
35 | 2 | OPENSSL_init_ssl(OPENSSL_INIT_LOAD_SSL_STRINGS, NULL); |
36 | 2 | ERR_clear_error(); |
37 | 2 | CRYPTO_free_ex_index(0, -1); |
38 | 2 | idx = SSL_get_ex_data_X509_STORE_CTX_idx(); |
39 | 2 | comp_methods = SSL_COMP_get_compression_methods(); |
40 | 2 | if (comp_methods != NULL) |
41 | 2 | sk_SSL_COMP_sort(comp_methods); |
42 | | |
43 | 2 | return 1; |
44 | 2 | } |
45 | | |
46 | 9.64M | #define HANDSHAKING 0 |
47 | 5.20M | #define READING 1 |
48 | 3.12k | #define WRITING 2 |
49 | 1.19M | #define ACCEPTING_STREAM 3 |
50 | 647k | #define CREATING_STREAM 4 |
51 | 876 | #define SWAPPING_STREAM 5 |
52 | | |
53 | | int FuzzerTestOneInput(const uint8_t *buf, size_t len) |
54 | 9.88k | { |
55 | 9.88k | SSL *client = NULL, *stream = NULL; |
56 | 9.88k | SSL *allstreams[] = {NULL, NULL, NULL, NULL}; |
57 | 9.88k | size_t i, thisstream = 0, numstreams = 1; |
58 | 9.88k | BIO *in; |
59 | 9.88k | BIO *out; |
60 | 9.88k | SSL_CTX *ctx; |
61 | 9.88k | BIO_ADDR *peer_addr = NULL; |
62 | 9.88k | struct in_addr ina = {0}; |
63 | 9.88k | struct timeval tv; |
64 | 9.88k | int state = HANDSHAKING; |
65 | 9.88k | uint8_t tmp[1024]; |
66 | 9.88k | int writelen = 0; |
67 | | |
68 | 9.88k | if (len == 0) |
69 | 0 | return 0; |
70 | | |
71 | | /* This only fuzzes the initial flow from the client so far. */ |
72 | 9.88k | ctx = SSL_CTX_new(OSSL_QUIC_client_method()); |
73 | 9.88k | if (ctx == NULL) |
74 | 0 | goto end; |
75 | | |
76 | 9.88k | client = SSL_new(ctx); |
77 | 9.88k | if (client == NULL) |
78 | 0 | goto end; |
79 | | |
80 | 9.88k | fake_now = ossl_ms2time(1); |
81 | 9.88k | if (!ossl_quic_conn_set_override_now_cb(client, fake_now_cb, NULL)) |
82 | 0 | goto end; |
83 | | |
84 | 9.88k | peer_addr = BIO_ADDR_new(); |
85 | 9.88k | if (peer_addr == NULL) |
86 | 0 | goto end; |
87 | | |
88 | 9.88k | ina.s_addr = htonl(0x7f000001UL); |
89 | | |
90 | 9.88k | if (!BIO_ADDR_rawmake(peer_addr, AF_INET, &ina, sizeof(ina), htons(4433))) |
91 | 0 | goto end; |
92 | | |
93 | 9.88k | SSL_set_tlsext_host_name(client, "localhost"); |
94 | 9.88k | in = BIO_new(BIO_s_dgram_mem()); |
95 | 9.88k | if (in == NULL) |
96 | 0 | goto end; |
97 | 9.88k | out = BIO_new(BIO_s_dgram_mem()); |
98 | 9.88k | if (out == NULL) { |
99 | 0 | BIO_free(in); |
100 | 0 | goto end; |
101 | 0 | } |
102 | 9.88k | if (!BIO_dgram_set_caps(out, BIO_DGRAM_CAP_HANDLES_DST_ADDR)) { |
103 | 0 | BIO_free(in); |
104 | 0 | BIO_free(out); |
105 | 0 | goto end; |
106 | 0 | } |
107 | 9.88k | SSL_set_bio(client, in, out); |
108 | 9.88k | if (SSL_set_alpn_protos(client, (const unsigned char *)"\x08ossltest", 9) != 0) |
109 | 0 | goto end; |
110 | 9.88k | if (SSL_set1_initial_peer_addr(client, peer_addr) != 1) |
111 | 0 | goto end; |
112 | 9.88k | SSL_set_connect_state(client); |
113 | | |
114 | 9.88k | if (!SSL_set_incoming_stream_policy(client, |
115 | 9.88k | SSL_INCOMING_STREAM_POLICY_ACCEPT, |
116 | 9.88k | 0)) |
117 | 0 | goto end; |
118 | | |
119 | 9.88k | allstreams[0] = stream = client; |
120 | 8.39M | for (;;) { |
121 | 8.39M | size_t size; |
122 | 8.39M | uint64_t nxtpktms = 0; |
123 | 8.39M | OSSL_TIME nxtpkt = ossl_time_zero(), nxttimeout; |
124 | 8.39M | int isinf, ret = 0; |
125 | | |
126 | 8.39M | if (len >= 2) { |
127 | 8.39M | if (len >= 5 && buf[0] == 0xff && buf[1] == 0xff) { |
128 | 937k | switch (buf[2]) { |
129 | 607k | case 0x00: |
130 | 607k | if (state == READING) |
131 | 599k | state = ACCEPTING_STREAM; |
132 | 607k | break; |
133 | 328k | case 0x01: |
134 | 328k | if (state == READING) |
135 | 323k | state = CREATING_STREAM; |
136 | 328k | break; |
137 | 737 | case 0x02: |
138 | 737 | if (state == READING) |
139 | 438 | state = SWAPPING_STREAM; |
140 | 737 | break; |
141 | 716 | default: |
142 | | /*ignore*/ |
143 | 716 | break; |
144 | 937k | } |
145 | 937k | len -= 3; |
146 | 937k | buf += 3; |
147 | 937k | } |
148 | 8.39M | nxtpktms = buf[0] + (buf[1] << 8); |
149 | 8.39M | nxtpkt = ossl_time_add(fake_now, ossl_ms2time(nxtpktms)); |
150 | 8.39M | len -= 2; |
151 | 8.39M | buf += 2; |
152 | 8.39M | } |
153 | | |
154 | 13.9M | for (;;) { |
155 | 13.9M | switch (state) { |
156 | 9.63M | case HANDSHAKING: |
157 | 9.63M | ret = SSL_do_handshake(stream); |
158 | 9.63M | if (ret == 1) |
159 | 2.48k | state = READING; |
160 | 9.63M | break; |
161 | | |
162 | 3.34M | case READING: |
163 | 3.34M | ret = SSL_read(stream, tmp, sizeof(tmp)); |
164 | 3.34M | if (ret > 0) { |
165 | 696 | state = WRITING; |
166 | 696 | writelen = ret; |
167 | 696 | assert(writelen <= (int)sizeof(tmp)); |
168 | 696 | } |
169 | 3.34M | break; |
170 | | |
171 | 3.34M | case WRITING: |
172 | 2.42k | ret = SSL_write(stream, tmp, writelen); |
173 | 2.42k | if (ret > 0) |
174 | 548 | state = READING; |
175 | 2.42k | break; |
176 | | |
177 | 599k | case ACCEPTING_STREAM: |
178 | 599k | state = READING; |
179 | 599k | ret = 1; |
180 | 599k | if (numstreams == OSSL_NELEM(allstreams) |
181 | 599k | || SSL_get_accept_stream_queue_len(client) == 0) |
182 | 599k | break; |
183 | 83 | thisstream = numstreams; |
184 | 83 | stream = allstreams[numstreams++] |
185 | 83 | = SSL_accept_stream(client, 0); |
186 | 83 | if (stream == NULL) |
187 | 0 | goto end; |
188 | 83 | break; |
189 | | |
190 | 323k | case CREATING_STREAM: |
191 | 323k | state = READING; |
192 | 323k | ret = 1; |
193 | 323k | if (numstreams == OSSL_NELEM(allstreams)) |
194 | 321k | break; |
195 | 2.40k | stream = SSL_new_stream(client, 0); |
196 | 2.40k | if (stream == NULL) { |
197 | | /* Ignore, and go back to the previous stream */ |
198 | 1.64k | stream = allstreams[thisstream]; |
199 | 1.64k | break; |
200 | 1.64k | } |
201 | 760 | thisstream = numstreams; |
202 | 760 | allstreams[numstreams++] = stream; |
203 | 760 | break; |
204 | | |
205 | 438 | case SWAPPING_STREAM: |
206 | 438 | state = READING; |
207 | 438 | ret = 1; |
208 | 438 | if (numstreams == 1) |
209 | 241 | break; |
210 | 197 | if (++thisstream == numstreams) |
211 | 102 | thisstream = 0; |
212 | 197 | stream = allstreams[thisstream]; |
213 | 197 | break; |
214 | 13.9M | } |
215 | 13.9M | assert(stream != NULL); |
216 | 13.9M | assert(thisstream < numstreams); |
217 | 13.9M | if (ret <= 0) { |
218 | 12.9M | switch (SSL_get_error(stream, ret)) { |
219 | 12.9M | case SSL_ERROR_WANT_READ: |
220 | 12.9M | case SSL_ERROR_WANT_WRITE: |
221 | 12.9M | break; |
222 | 7.97k | default: |
223 | 7.97k | goto end; |
224 | 12.9M | } |
225 | 12.9M | } |
226 | | |
227 | 13.8M | if (!SSL_get_event_timeout(client, &tv, &isinf)) |
228 | 0 | goto end; |
229 | | |
230 | 13.8M | if (isinf) { |
231 | 3.84k | fake_now = nxtpkt; |
232 | 3.84k | break; |
233 | 13.8M | } else { |
234 | 13.8M | nxttimeout = ossl_time_add(fake_now, |
235 | 13.8M | ossl_time_from_timeval(tv)); |
236 | 13.8M | if (len > 3 && ossl_time_compare(nxttimeout, nxtpkt) >= 0) { |
237 | 8.38M | fake_now = nxtpkt; |
238 | 8.38M | break; |
239 | 8.38M | } |
240 | 5.50M | fake_now = nxttimeout; |
241 | 5.50M | } |
242 | 13.8M | } |
243 | | |
244 | 8.38M | if (len <= 3) |
245 | 447 | break; |
246 | | |
247 | 8.38M | size = buf[0] + (buf[1] << 8); |
248 | 8.38M | if (size > len - 2) |
249 | 1.46k | break; |
250 | | |
251 | 8.38M | if (size > 0) |
252 | 2.71M | BIO_write(in, buf+2, size); |
253 | 8.38M | len -= size + 2; |
254 | 8.38M | buf += size + 2; |
255 | 8.38M | } |
256 | 9.88k | end: |
257 | 20.6k | for (i = 0; i < numstreams; i++) |
258 | 10.7k | SSL_free(allstreams[i]); |
259 | 9.88k | ERR_clear_error(); |
260 | 9.88k | SSL_CTX_free(ctx); |
261 | 9.88k | BIO_ADDR_free(peer_addr); |
262 | | |
263 | 9.88k | return 0; |
264 | 9.88k | } |
265 | | |
266 | | void FuzzerCleanup(void) |
267 | 0 | { |
268 | 0 | FuzzerClearRand(); |
269 | 0 | } |