Index: testing/libfuzzer/fuzzers/libsrtp_fuzzer.cc |
diff --git a/testing/libfuzzer/fuzzers/libsrtp_fuzzer.cc b/testing/libfuzzer/fuzzers/libsrtp_fuzzer.cc |
new file mode 100644 |
index 0000000000000000000000000000000000000000..8ec3a85807b0ef522548f7c8d697ee059c83b466 |
--- /dev/null |
+++ b/testing/libfuzzer/fuzzers/libsrtp_fuzzer.cc |
@@ -0,0 +1,142 @@ |
+// Copyright 2016 The Chromium Authors. All rights reserved. |
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+ |
+#include <assert.h> |
+#include <stddef.h> |
+#include <stdint.h> |
+ |
+#include <algorithm> |
+#include <vector> |
+ |
+#include "third_party/libsrtp/srtp/include/rtp.h" |
+#include "third_party/libsrtp/srtp/include/rtp_priv.h" |
+#include "third_party/libsrtp/srtp/include/srtp.h" |
+ |
+// TODO(katrielc) Also test the authenticated path, which is what |
+// WebRTC uses. This is nontrivial because you need to bypass the MAC |
+// check. Two options: add a UNSAFE_FUZZER_MODE flag to libsrtp (or |
+// the chromium fork of it), or compute the HMAC of whatever gibberish |
+// the fuzzer produces and write it into the packet manually. |
+ |
+namespace LibSrtpFuzzer { |
+enum CryptoPolicy { |
+ NONE, |
+ LIKE_WEBRTC, |
+ LIKE_WEBRTC_WITHOUT_AUTH, |
+ AES_GCM, |
+ NUMBER_OF_POLICIES, |
+}; |
+} |
+ |
+struct Environment { |
+ srtp_policy_t GetCryptoPolicy(LibSrtpFuzzer::CryptoPolicy crypto_policy, |
+ const unsigned char* replacement_key) { |
+ switch (crypto_policy) { |
+ case LibSrtpFuzzer::NUMBER_OF_POLICIES: |
+ case LibSrtpFuzzer::NONE: |
+ crypto_policy_set_null_cipher_null_auth(&policy.rtp); |
+ crypto_policy_set_null_cipher_null_auth(&policy.rtcp); |
+ break; |
+ case LibSrtpFuzzer::LIKE_WEBRTC: |
+ crypto_policy_set_aes_cm_128_hmac_sha1_80(&policy.rtp); |
+ crypto_policy_set_aes_cm_128_hmac_sha1_80(&policy.rtcp); |
+ case LibSrtpFuzzer::LIKE_WEBRTC_WITHOUT_AUTH: |
+ crypto_policy_set_aes_cm_128_null_auth(&policy.rtp); |
+ crypto_policy_set_aes_cm_128_null_auth(&policy.rtcp); |
+ break; |
+ case LibSrtpFuzzer::AES_GCM: |
+ // There was a security bug in the GCM mode in libsrtp 1.5.2. |
+ crypto_policy_set_aes_gcm_128_8_auth(&policy.rtp); |
+ crypto_policy_set_aes_gcm_128_8_auth(&policy.rtcp); |
+ break; |
+ } |
+ |
+ memcpy(key, replacement_key, SRTP_MASTER_KEY_LEN); |
+ return policy; |
+ }; |
+ |
+ Environment() { |
+ srtp_init(); |
+ |
+ memset(&policy, 0, sizeof(policy)); |
+ policy.allow_repeat_tx = 1; |
+ policy.ekt = nullptr; |
+ policy.key = key; |
+ policy.next = nullptr; |
+ policy.ssrc.type = ssrc_any_inbound; |
+ policy.ssrc.value = 0xdeadbeef; |
+ policy.window_size = 1024; |
+ } |
+ |
+ private: |
+ srtp_policy_t policy; |
+ unsigned char key[SRTP_MASTER_KEY_LEN] = {0}; |
+ |
+ static void crypto_policy_set_null_cipher_null_auth(crypto_policy_t* p) { |
+ p->cipher_type = NULL_CIPHER; |
+ p->cipher_key_len = 0; |
+ p->auth_type = NULL_AUTH; |
+ p->auth_key_len = 0; |
+ p->auth_tag_len = 0; |
+ p->sec_serv = sec_serv_none; |
+ }; |
+}; |
+ |
+size_t ReadLength(const uint8_t* data, size_t size) { |
+ // Read one byte of input and interpret it as a length to read from |
+ // data. Don't return more bytes than are available. |
+ size_t n = static_cast<size_t>(data[0]); |
+ return std::min(n, size - 1); |
+} |
+ |
+Environment* env = new Environment(); |
+ |
+extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { |
+ // Read one byte and use it to choose a crypto policy. |
+ if (size <= 1) |
+ return 0; |
+ LibSrtpFuzzer::CryptoPolicy policy = static_cast<LibSrtpFuzzer::CryptoPolicy>( |
+ data[0] % LibSrtpFuzzer::NUMBER_OF_POLICIES); |
+ data += 1; |
+ size -= 1; |
+ |
+ // Read some more bytes to use as a key. |
+ if (size <= SRTP_MASTER_KEY_LEN) |
+ return 0; |
+ srtp_policy_t srtp_policy = env->GetCryptoPolicy(policy, data); |
+ data += SRTP_MASTER_KEY_LEN; |
+ size -= SRTP_MASTER_KEY_LEN; |
+ |
+ srtp_t session; |
+ err_status_t error = srtp_create(&session, &srtp_policy); |
+ assert(error == err_status_ok); |
+ |
+ // Read one byte as a packet length N, then feed the next N bytes |
+ // into srtp_unprotect. Keep going until we run out of data. |
+ size_t packet_size; |
+ while (size > 0 && (packet_size = ReadLength(data, size)) > 0) { |
+ // One byte was used by ReadLength. |
+ data++; |
+ size--; |
+ |
+ size_t header_size = std::min(sizeof(srtp_hdr_t), packet_size); |
+ size_t body_size = packet_size - header_size; |
+ |
+ // We deliberately do not initialise this struct. MSAN will catch |
+ // usage of the uninitialised memory. |
+ rtp_msg_t message; |
+ memcpy(&message.header, data, header_size); |
+ memcpy(&message.body, data + header_size, body_size); |
+ |
+ int out_len = static_cast<int>(packet_size); |
+ srtp_unprotect(session, &message, &out_len); |
+ |
+ // |packet_size| bytes were used above. |
+ data += packet_size; |
+ size -= packet_size; |
+ } |
+ |
+ srtp_dealloc(session); |
+ return 0; |
+} |