/* * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. * * Licensed under the Apache License, Version 2.0 (the "License"). * You may not use this file except in compliance with the License. * A copy of the License is located at * * http://aws.amazon.com/apache2.0 * * or in the "license" file accompanying this file. This file is distributed * on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either * express or implied. See the License for the specific language governing * permissions and limitations under the License. */ /* Target Functions: s2n_client_key_recv s2n_kex_client_key_recv calculate_keys s2n_kex_tls_prf s2n_prf_key_expansion s2n_ecdhe_client_key_recv s2n_kem_client_key_recv s2n_hybrid_client_action */ #include "crypto/s2n_crypto.h" #include "crypto/s2n_drbg.h" #include "crypto/s2n_hash.h" #include "crypto/s2n_openssl.h" #include "error/s2n_errno.h" #include "stuffer/s2n_stuffer.h" #include "tests/s2n_test.h" #include "tests/testlib/s2n_testlib.h" #include "tls/s2n_kex.h" #include "tls/s2n_kem.h" #include "tls/s2n_tls.h" #include "utils/s2n_random.h" #include "utils/s2n_safety.h" #include "utils/s2n_safety.h" #include "tls/s2n_cipher_suites.h" #include "tls/s2n_security_policies.h" #include "pq-crypto/s2n_pq.h" static struct s2n_kem_params kyber512_r3_draft0_params = {.kem = &s2n_kyber_512_r3, .len_prefixed = true }; static struct s2n_kem_params kyber512_r3_draft5_params = {.kem = &s2n_kyber_512_r3, .len_prefixed = false }; /* Setup the connection in a state for a fuzz test run, s2n_client_key_recv modifies the state of the connection * along the way and gets cleaned up at the end of each fuzz test. * - Connection needs cipher suite, curve, and kem setup * - Connection needs a ecdhe key and a kem private key, this would normally be setup when the server calls s2n_server_send_key * */ static int setup_connection(struct s2n_connection *server_conn, struct s2n_kem_params* params) { server_conn->actual_protocol_version = S2N_TLS12; const struct s2n_ecc_preferences *ecc_preferences = NULL; POSIX_GUARD(s2n_connection_get_ecc_preferences(server_conn, &ecc_preferences)); POSIX_ENSURE_REF(ecc_preferences); server_conn->kex_params.server_ecc_evp_params.negotiated_curve = ecc_preferences->ecc_curves[0]; server_conn->kex_params.server_ecc_evp_params.evp_pkey = NULL; server_conn->kex_params.kem_params.kem = &s2n_kyber_512_r3; server_conn->secure->cipher_suite = &s2n_ecdhe_kyber_rsa_with_aes_256_gcm_sha384; server_conn->handshake_params.conn_sig_scheme = s2n_rsa_pkcs1_sha384; POSIX_GUARD(s2n_dup(¶ms->private_key, &server_conn->kex_params.kem_params.private_key)); POSIX_GUARD(s2n_ecc_evp_generate_ephemeral_key(&server_conn->kex_params.server_ecc_evp_params)); return S2N_SUCCESS; } int s2n_fuzz_init_kem_param(struct s2n_kem_params *param) { POSIX_ENSURE_REF(param->kem); struct s2n_blob *public_key = ¶m->public_key; POSIX_GUARD(s2n_alloc(public_key, S2N_KYBER_512_R3_PUBLIC_KEY_BYTES)); /* Do not GUARD this call to s2n_kem_generate_keypair(), as it will fail when attempting to generate the KEM * key pair if !s2n_pq_is_enabled(). However, even if it does fail, it will have allocated zeroed memory for the * public and private keys needed for setup_connection() to complete. */ s2n_result result = s2n_kem_generate_keypair(param); POSIX_ENSURE_EQ(s2n_pq_is_enabled(), s2n_result_is_ok(result)); POSIX_ENSURE_REF(param->public_key.data); POSIX_ENSURE_REF(param->private_key.data); POSIX_GUARD(s2n_free(public_key)); return S2N_SUCCESS; } int s2n_fuzz_init(int *argc, char **argv[]) { POSIX_GUARD(s2n_fuzz_init_kem_param(&kyber512_r3_draft0_params)); POSIX_GUARD(s2n_fuzz_init_kem_param(&kyber512_r3_draft5_params)); return S2N_SUCCESS; } int s2n_fuzz_test_with_params(const uint8_t *buf, size_t len, struct s2n_kem_params *params) { struct s2n_connection *server_conn; POSIX_ENSURE_REF(server_conn = s2n_connection_new(S2N_SERVER)); POSIX_GUARD(setup_connection(server_conn, params)); /* You can't write 0 bytes to a stuffer but attempting to call s2n_client_key_recv with 0 data is an interesting test */ if (len > 0) { POSIX_GUARD(s2n_stuffer_write_bytes(&server_conn->handshake.io, buf, len)); } /* The missing GUARD is because s2n_client_key_recv might fail due to bad input which is okay, the connection * must still be cleaned up. Don't return s2n_client_key_recv's result because the the test still passes as long as * s2n_client_key_recv does not leak/contaminate any memory, the fuzz input is most likely not valid and will fail * to be recv'd successfully. */ int result = s2n_client_key_recv(server_conn); /* If PQ is disabled, then s2n_client_key_recv should always fail since the KEM calls will always fail. */ if (!s2n_pq_is_enabled()) { POSIX_ENSURE_EQ(result, S2N_FAILURE); } POSIX_GUARD(s2n_connection_free(server_conn)); return S2N_SUCCESS; } int s2n_fuzz_test(const uint8_t *buf, size_t len) { POSIX_GUARD(s2n_fuzz_test_with_params(buf, len, &kyber512_r3_draft0_params)); POSIX_GUARD(s2n_fuzz_test_with_params(buf, len, &kyber512_r3_draft5_params)); return S2N_SUCCESS; } static void s2n_fuzz_cleanup() { s2n_kem_free(&kyber512_r3_draft0_params); s2n_kem_free(&kyber512_r3_draft5_params); } S2N_FUZZ_TARGET(s2n_fuzz_init, s2n_fuzz_test, s2n_fuzz_cleanup)