mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2024-11-29 02:38:22 -05:00
98612544b1
These are newer versions of tests/test-tls tool. Signed-off-by: Jouni Malinen <j@w1.fi>
158 lines
3.2 KiB
C
158 lines
3.2 KiB
C
/*
|
|
* Testing tool for TLSv1 server routines
|
|
* Copyright (c) 2019, Jouni Malinen <j@w1.fi>
|
|
*
|
|
* This software may be distributed under the terms of the BSD license.
|
|
* See README for more details.
|
|
*/
|
|
|
|
#include "includes.h"
|
|
|
|
#include "common.h"
|
|
#include "crypto/tls.h"
|
|
#include "../fuzzer-common.h"
|
|
|
|
#ifndef CERTDIR
|
|
#define CERTDIR "../../hwsim/auth_serv/"
|
|
#endif
|
|
|
|
struct context {
|
|
const u8 *data;
|
|
size_t data_len;
|
|
size_t data_offset;
|
|
};
|
|
|
|
|
|
static struct wpabuf * read_msg(struct context *ctx)
|
|
{
|
|
u16 msg_len;
|
|
struct wpabuf *msg;
|
|
|
|
if (ctx->data_len - ctx->data_offset < 2) {
|
|
wpa_printf(MSG_ERROR, "TEST-ERROR: Could not read msg len");
|
|
return NULL;
|
|
}
|
|
msg_len = WPA_GET_BE16(&ctx->data[ctx->data_offset]);
|
|
ctx->data_offset += 2;
|
|
|
|
msg = wpabuf_alloc(msg_len);
|
|
if (!msg)
|
|
return NULL;
|
|
if (msg_len > 0 && ctx->data_len - ctx->data_offset < msg_len) {
|
|
wpa_printf(MSG_ERROR, "TEST-ERROR: Truncated msg (msg_len=%u)",
|
|
msg_len);
|
|
wpabuf_free(msg);
|
|
return NULL;
|
|
}
|
|
wpabuf_put_data(msg, &ctx->data[ctx->data_offset], msg_len);
|
|
ctx->data_offset += msg_len;
|
|
wpa_hexdump_buf(MSG_DEBUG, "TEST: Read message from file", msg);
|
|
|
|
return msg;
|
|
}
|
|
|
|
|
|
int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size)
|
|
{
|
|
struct context ctx;
|
|
struct tls_config conf;
|
|
void *tls_server;
|
|
struct tls_connection_params params;
|
|
struct tls_connection *conn_server = NULL;
|
|
int ret = -1;
|
|
struct wpabuf *in = NULL, *out = NULL, *appl;
|
|
|
|
wpa_fuzzer_set_debug_level();
|
|
|
|
os_memset(&ctx, 0, sizeof(ctx));
|
|
ctx.data = data;
|
|
ctx.data_len = size;
|
|
|
|
os_memset(&conf, 0, sizeof(conf));
|
|
tls_server = tls_init(&conf);
|
|
if (!tls_server)
|
|
goto fail;
|
|
|
|
os_memset(¶ms, 0, sizeof(params));
|
|
params.ca_cert = CERTDIR "ca.pem";
|
|
params.client_cert = CERTDIR "server.pem";
|
|
params.private_key = CERTDIR "server.key";
|
|
params.dh_file = CERTDIR "dh.conf";
|
|
|
|
if (tls_global_set_params(tls_server, ¶ms)) {
|
|
wpa_printf(MSG_ERROR, "Failed to set TLS parameters");
|
|
goto fail;
|
|
}
|
|
|
|
conn_server = tls_connection_init(tls_server);
|
|
if (!conn_server)
|
|
goto fail;
|
|
|
|
in = NULL;
|
|
for (;;) {
|
|
appl = NULL;
|
|
out = read_msg(&ctx);
|
|
wpabuf_free(in);
|
|
in = NULL;
|
|
if (!out)
|
|
goto fail;
|
|
|
|
appl = NULL;
|
|
in = tls_connection_server_handshake(tls_server, conn_server,
|
|
out, &appl);
|
|
wpabuf_free(out);
|
|
out = NULL;
|
|
if (!in)
|
|
goto fail;
|
|
if (tls_connection_get_failed(tls_server, conn_server)) {
|
|
wpa_printf(MSG_ERROR, "TLS handshake failed");
|
|
goto fail;
|
|
}
|
|
if (tls_connection_established(tls_server, conn_server))
|
|
break;
|
|
}
|
|
|
|
wpabuf_free(in);
|
|
in = wpabuf_alloc(100);
|
|
if (!in)
|
|
goto fail;
|
|
wpabuf_put_str(in, "PING");
|
|
wpabuf_free(out);
|
|
out = read_msg(&ctx);
|
|
wpabuf_free(in);
|
|
in = NULL;
|
|
if (!out)
|
|
goto fail;
|
|
|
|
in = tls_connection_decrypt(tls_server, conn_server, out);
|
|
wpabuf_free(out);
|
|
out = NULL;
|
|
if (!in)
|
|
goto fail;
|
|
wpa_hexdump_buf(MSG_DEBUG, "Server decrypted ApplData", in);
|
|
|
|
wpabuf_free(in);
|
|
in = wpabuf_alloc(100);
|
|
if (!in)
|
|
goto fail;
|
|
wpabuf_put_str(in, "PONG");
|
|
wpabuf_free(out);
|
|
out = tls_connection_encrypt(tls_server, conn_server, in);
|
|
wpabuf_free(in);
|
|
in = NULL;
|
|
if (!out)
|
|
goto fail;
|
|
|
|
ret = 0;
|
|
fail:
|
|
if (tls_server) {
|
|
if (conn_server)
|
|
tls_connection_deinit(tls_server, conn_server);
|
|
tls_deinit(tls_server);
|
|
}
|
|
wpabuf_free(in);
|
|
wpabuf_free(out);
|
|
|
|
return ret;
|
|
}
|