/* * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. * * Licensed under the Apache License, Version 2.0 (the "License"). * You may not use this file except in compliance with the License. * A copy of the License is located at * * http://aws.amazon.com/apache2.0 * * or in the "license" file accompanying this file. This file is distributed * on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either * express or implied. See the License for the specific language governing * permissions and limitations under the License. */ /* Target Functions: s2n_parse_cert_chain s2n_create_cert_chain_from_stuffer s2n_cert_chain_and_key_free */ #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include "api/s2n.h" #include "stuffer/s2n_stuffer.h" #include "tls/s2n_config.h" #include "utils/s2n_blob.h" #include "utils/s2n_mem.h" #include "utils/s2n_safety.h" #include "s2n_test.h" #include "crypto/s2n_certificate.h" static int openssl_parse_cert_chain(struct s2n_stuffer *in) { uint8_t chain_len = 0; BIO *membio = BIO_new_mem_buf((void *) in->blob.data, in->blob.size - 1); X509 *cert = NULL; while (1) { /* Try parsing Cert PEM with OpenSSL */ cert = PEM_read_bio_X509(membio, NULL, 0, NULL); if (cert != NULL) { X509_free(cert); chain_len++; } else { break; } } BIO_free(membio); return chain_len; } static int s2n_parse_cert_chain(struct s2n_stuffer *in) { struct s2n_cert_chain_and_key *chain_and_key = s2n_cert_chain_and_key_new(); /* Allocate the memory for the chain and key */ if (s2n_create_cert_chain_from_stuffer(chain_and_key->cert_chain, in) != S2N_SUCCESS) { POSIX_GUARD(s2n_cert_chain_and_key_free(chain_and_key)); return S2N_SUCCESS; } int chain_len = 0; struct s2n_cert *next = chain_and_key->cert_chain->head; while(next != NULL) { chain_len++; next = next->next; } s2n_cert_chain_and_key_free(chain_and_key); return chain_len; } int s2n_fuzz_test(const uint8_t *buf, size_t len) { struct s2n_stuffer in = {0}; POSIX_GUARD(s2n_stuffer_alloc(&in, len + 1)); POSIX_GUARD(s2n_stuffer_write_bytes(&in, buf, len)); in.blob.data[len] = 0; uint8_t openssl_chain_len = openssl_parse_cert_chain(&in); POSIX_GUARD(s2n_stuffer_reread(&in)); uint8_t s2n_chain_len = s2n_parse_cert_chain(&in); POSIX_GUARD(s2n_stuffer_free(&in)); if (openssl_chain_len > s2n_chain_len) { /* If we return -1 here, then this fuzz test will fail if OpenSSL is able to parse a messy PEM file that s2n * isn't able to. All well formed PEM files that follow the RFC are still parsable by both, but we should * leave this commented out for now until we update our PEM parser to be more lenient, * or decide to do something else. */ /* return -1; */ } return S2N_SUCCESS; } static void s2n_fuzz_cleanup() { ERR_free_strings(); CRYPTO_cleanup_all_ex_data(); CONF_modules_free(); ERR_clear_error(); } S2N_FUZZ_TARGET(NULL, s2n_fuzz_test, s2n_fuzz_cleanup)