Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
OpenHarmony
Third Party Openssl
提交
4410f9d7
T
Third Party Openssl
项目概览
OpenHarmony
/
Third Party Openssl
1 年多 前同步成功
通知
10
Star
18
Fork
1
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
T
Third Party Openssl
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
提交
Issue看板
提交
4410f9d7
编写于
12月 07, 2016
作者:
K
Kurt Roeckx
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
And client fuzzer
Reviewed-by:
N
Rich Salz
<
rsalz@openssl.org
>
GH: #2041
上级
e512840d
变更
3
隐藏空白更改
内联
并排
Showing
3 changed file
with
100 addition
and
3 deletion
+100
-3
fuzz/build.info
fuzz/build.info
+10
-2
fuzz/client.c
fuzz/client.c
+89
-0
test/recipes/90-test_fuzz.t
test/recipes/90-test_fuzz.t
+1
-1
未找到文件。
fuzz/build.info
浏览文件 @
4410f9d7
...
...
@@ -9,7 +9,7 @@
-}
IF[{- !$disabled{"fuzz-afl"} || !$disabled{"fuzz-libfuzzer"} -}]
PROGRAMS_NO_INST=asn1 asn1parse bignum bndiv conf crl server x509
PROGRAMS_NO_INST=asn1 asn1parse bignum bndiv c
lient c
onf crl server x509
IF[{- !$disabled{"cms"} -}]
PROGRAMS_NO_INST=cms
...
...
@@ -35,6 +35,10 @@ IF[{- !$disabled{"fuzz-afl"} || !$disabled{"fuzz-libfuzzer"} -}]
INCLUDE[bndiv]=../include {- $ex_inc -}
DEPEND[bndiv]=../libcrypto {- $ex_lib -}
SOURCE[client]=client.c driver.c
INCLUDE[client]=../include {- $ex_inc -}
DEPEND[client]=../libcrypto ../libssl {- $ex_lib -}
SOURCE[cms]=cms.c driver.c
INCLUDE[cms]=../include {- $ex_inc -}
DEPEND[cms]=../libcrypto {- $ex_lib -}
...
...
@@ -61,7 +65,7 @@ IF[{- !$disabled{"fuzz-afl"} || !$disabled{"fuzz-libfuzzer"} -}]
ENDIF
IF[{- !$disabled{tests} -}]
PROGRAMS_NO_INST=asn1-test asn1parse-test bignum-test bndiv-test conf-test crl-test server-test x509-test
PROGRAMS_NO_INST=asn1-test asn1parse-test bignum-test bndiv-test c
lient-test c
onf-test crl-test server-test x509-test
IF[{- !$disabled{"cms"} -}]
PROGRAMS_NO_INST=cms-test
...
...
@@ -87,6 +91,10 @@ IF[{- !$disabled{tests} -}]
INCLUDE[bndiv-test]=../include
DEPEND[bndiv-test]=../libcrypto
SOURCE[client-test]=client.c test-corpus.c
INCLUDE[client-test]=../include
DEPEND[client-test]=../libcrypto ../libssl
SOURCE[cms-test]=cms.c test-corpus.c
INCLUDE[cms-test]=../include
DEPEND[cms-test]=../libcrypto
...
...
fuzz/client.c
0 → 100644
浏览文件 @
4410f9d7
/*
* Copyright 2016 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the OpenSSL licenses, (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
* https://www.openssl.org/source/license.html
* or in the file LICENSE in the source distribution.
*/
#include <openssl/rand.h>
#include <openssl/ssl.h>
#include <openssl/rsa.h>
#include <openssl/err.h>
#include "fuzzer.h"
#ifdef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
extern
int
rand_predictable
;
#endif
#define ENTROPY_NEEDED 32
/* unused, to avoid warning. */
static
int
idx
;
int
FuzzerInitialize
(
int
*
argc
,
char
***
argv
)
{
STACK_OF
(
SSL_COMP
)
*
comp_methods
;
OPENSSL_init_crypto
(
OPENSSL_INIT_LOAD_CRYPTO_STRINGS
|
OPENSSL_INIT_ASYNC
,
NULL
);
OPENSSL_init_ssl
(
OPENSSL_INIT_LOAD_SSL_STRINGS
,
NULL
);
ERR_get_state
();
CRYPTO_free_ex_index
(
0
,
-
1
);
idx
=
SSL_get_ex_data_X509_STORE_CTX_idx
();
RAND_add
(
""
,
1
,
ENTROPY_NEEDED
);
RAND_status
();
RSA_get_default_method
();
comp_methods
=
SSL_COMP_get_compression_methods
();
OPENSSL_sk_sort
((
OPENSSL_STACK
*
)
comp_methods
);
#ifdef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
rand_predictable
=
1
;
#endif
return
1
;
}
int
FuzzerTestOneInput
(
const
uint8_t
*
buf
,
size_t
len
)
{
SSL
*
client
;
BIO
*
in
;
BIO
*
out
;
SSL_CTX
*
ctx
;
if
(
len
==
0
)
return
0
;
/*
* TODO: use the ossltest engine (optionally?) to disable crypto checks.
*/
/* This only fuzzes the initial flow from the client so far. */
ctx
=
SSL_CTX_new
(
SSLv23_method
());
client
=
SSL_new
(
ctx
);
in
=
BIO_new
(
BIO_s_mem
());
out
=
BIO_new
(
BIO_s_mem
());
SSL_set_bio
(
client
,
in
,
out
);
SSL_set_connect_state
(
client
);
OPENSSL_assert
((
size_t
)
BIO_write
(
in
,
buf
,
len
)
==
len
);
if
(
SSL_do_handshake
(
client
)
==
1
)
{
/* Keep reading application data until error or EOF. */
uint8_t
tmp
[
1024
];
for
(;;)
{
if
(
SSL_read
(
client
,
tmp
,
sizeof
(
tmp
))
<=
0
)
{
break
;
}
}
}
SSL_free
(
client
);
ERR_clear_error
();
SSL_CTX_free
(
ctx
);
return
0
;
}
void
FuzzerCleanup
(
void
)
{
}
test/recipes/90-test_fuzz.t
浏览文件 @
4410f9d7
...
...
@@ -15,7 +15,7 @@ use OpenSSL::Test::Utils;
setup
("
test_fuzz
");
my
@fuzzers
=
('
asn1
',
'
asn1parse
',
'
bignum
',
'
bndiv
',
'
conf
',
'
crl
',
'
server
',
'
x509
');
my
@fuzzers
=
('
asn1
',
'
asn1parse
',
'
bignum
',
'
bndiv
',
'
c
lient
',
'
c
onf
',
'
crl
',
'
server
',
'
x509
');
if
(
!
disabled
("
cms
"))
{
push
@fuzzers
,
'
cms
';
}
...
...
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录