Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(543)

Unified Diff: net/http/http_proxy_client_socket_fuzzer.cc

Issue 1890193002: Add a fuzzer for HttpProxyClientSocket. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Remove test code, dictionary Created 4 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« net/BUILD.gn ('K') | « net/BUILD.gn ('k') | net/socket/fuzzed_socket.cc » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: net/http/http_proxy_client_socket_fuzzer.cc
diff --git a/net/http/http_proxy_client_socket_fuzzer.cc b/net/http/http_proxy_client_socket_fuzzer.cc
new file mode 100644
index 0000000000000000000000000000000000000000..940af8e11c56881df42cb65a25d55032d67a230e
--- /dev/null
+++ b/net/http/http_proxy_client_socket_fuzzer.cc
@@ -0,0 +1,89 @@
+// Copyright 2016 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#include "net/http/http_proxy_client_socket.h"
+
+#include <stddef.h>
+#include <stdint.h>
+
+#include <string>
+
+#include "base/logging.h"
+#include "base/memory/scoped_ptr.h"
+#include "base/message_loop/message_loop.h"
+#include "base/strings/utf_string_conversions.h"
+#include "net/base/address_list.h"
+#include "net/base/auth.h"
+#include "net/base/host_port_pair.h"
+#include "net/base/test_completion_callback.h"
+#include "net/http/http_auth_cache.h"
+#include "net/http/http_auth_handler_basic.h"
+#include "net/http/http_auth_handler_digest.h"
+#include "net/http/http_auth_handler_factory.h"
+#include "net/http/http_auth_scheme.h"
+#include "net/log/test_net_log.h"
+#include "net/socket/client_socket_handle.h"
+#include "net/socket/fuzzed_socket.h"
+#include "net/socket/next_proto.h"
+
+// Fuzzer for HttpProxyClientSocket only tests establshing a connection when
eroman 2016/04/15 19:07:21 typo: establishing
mmenke 2016/04/15 19:23:52 Done.
+// using the proxy as a tunnel.
+//
+// |data| is used to create a FuzzedSocket to fuzz reads and writes, see that
+// class for details.
+extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) {
+ // Needed for thread checks and waits.
+ base::MessageLoopForIO message_loop;
+
+ // Use a test NetLog, to exercise logging code.
+ net::BoundTestNetLog bound_test_net_log;
+
+ // Use last byte to determine if the HttpProxyClientSocket should be told the
+ // underlying socket is HTTPS.
+ bool is_https_proxy = 0;
+ if (size > 0) {
+ is_https_proxy = !(data[size - 1] & 1);
eroman 2016/04/15 19:07:21 It might be interesting to add our own fuzzer supp
mmenke 2016/04/15 19:23:52 I'm actually planning on implementing a shared ref
eroman 2016/04/15 19:31:56 sounds good, I was envisioning something similar :
+ size--;
+ }
+
+ net::TestCompletionCallback callback;
+ scoped_ptr<net::FuzzedSocket> fuzzed_socket(
eroman 2016/04/15 19:07:21 I believe std::unique_ptr<> is the new hotness now
mmenke 2016/04/15 19:23:52 Dang dentists...Always messing with a good thing (
+ new net::FuzzedSocket(data, size, bound_test_net_log.bound()));
eroman 2016/04/15 19:07:21 Assuming our style allows std::make_unique, this c
mmenke 2016/04/15 19:23:52 I'm happy with the old ways...The ways of our grea
+ CHECK_EQ(net::OK, fuzzed_socket->Connect(callback.callback()));
+
+ scoped_ptr<net::ClientSocketHandle> socket_handle(
+ new net::ClientSocketHandle());
+ socket_handle->SetSocket(std::move(fuzzed_socket));
+
+ // Create auth handler supporting basic and digest schemes. Other schemes can
+ // make system calls, which doesn't seem like a great idea.
+ net::HttpAuthCache auth_cache;
+ net::HttpAuthHandlerRegistryFactory auth_handler_factory;
+ auth_handler_factory.RegisterSchemeFactory(
+ net::kBasicAuthScheme, new net::HttpAuthHandlerBasic::Factory());
+ auth_handler_factory.RegisterSchemeFactory(
+ net::kDigestAuthScheme, new net::HttpAuthHandlerDigest::Factory());
+
+ scoped_refptr<net::HttpAuthController> auth_controller(
+ new net::HttpAuthController(net::HttpAuth::AUTH_PROXY,
+ GURL("http://proxy:42/"), &auth_cache,
+ &auth_handler_factory));
+ net::HttpProxyClientSocket socket(
+ socket_handle.release(), "Bond/007", net::HostPortPair("foo", 80),
eroman 2016/04/15 19:07:21 shaken not stirred
+ net::HostPortPair("proxy", 42), auth_controller.get(), true /* tunnel */,
+ false /* using_spdy */, net::kProtoUnknown, nullptr /* proxy_delegate */,
+ is_https_proxy);
+ int result = socket.Connect(callback.callback());
+ result = callback.GetResult(result);
+
+ // Repeatedly try to log in with the same credentials.
+ while (result == net::ERR_PROXY_AUTH_REQUESTED) {
eroman 2016/04/15 19:07:21 How many times will this loop?
mmenke 2016/04/15 19:23:52 Until it stops reading new auth challenges. If th
eroman 2016/04/15 19:31:56 Good point - this necessarily terminates provided
+ auth_controller->ResetAuth(net::AuthCredentials(
+ base::ASCIIToUTF16("user"), base::ASCIIToUTF16("pass")));
+ result = socket.RestartWithAuth(callback.callback());
+ result = callback.GetResult(result);
+ }
+
+ return 0;
+}
« net/BUILD.gn ('K') | « net/BUILD.gn ('k') | net/socket/fuzzed_socket.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698