2015-11-09 21:57:26 +00:00
|
|
|
#include <assert.h>
|
|
|
|
|
2016-03-02 03:57:32 +00:00
|
|
|
#include <openssl/rand.h>
|
2015-11-09 21:57:26 +00:00
|
|
|
#include <openssl/ssl.h>
|
|
|
|
|
|
|
|
struct GlobalState {
|
|
|
|
GlobalState() : ctx(SSL_CTX_new(SSLv23_method())) {}
|
|
|
|
|
|
|
|
~GlobalState() {
|
|
|
|
SSL_CTX_free(ctx);
|
|
|
|
}
|
|
|
|
|
|
|
|
SSL_CTX *const ctx;
|
|
|
|
};
|
|
|
|
|
|
|
|
static GlobalState g_state;
|
|
|
|
|
|
|
|
extern "C" int LLVMFuzzerTestOneInput(uint8_t *buf, size_t len) {
|
2016-03-02 03:57:32 +00:00
|
|
|
RAND_reset_for_fuzzing();
|
|
|
|
|
2015-11-09 21:57:26 +00:00
|
|
|
SSL *client = SSL_new(g_state.ctx);
|
|
|
|
BIO *in = BIO_new(BIO_s_mem());
|
|
|
|
BIO *out = BIO_new(BIO_s_mem());
|
|
|
|
SSL_set_bio(client, in, out);
|
|
|
|
SSL_set_connect_state(client);
|
2016-03-02 19:53:11 +00:00
|
|
|
SSL_set_renegotiate_mode(client, ssl_renegotiate_freely);
|
2015-11-09 21:57:26 +00:00
|
|
|
|
|
|
|
BIO_write(in, buf, len);
|
2016-03-02 19:53:11 +00:00
|
|
|
if (SSL_do_handshake(client) == 1) {
|
|
|
|
// Keep reading application data until error or EOF.
|
|
|
|
uint8_t tmp[1024];
|
|
|
|
for (;;) {
|
|
|
|
if (SSL_read(client, tmp, sizeof(tmp)) <= 0) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2015-11-09 21:57:26 +00:00
|
|
|
SSL_free(client);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|