xref: /aosp_15_r20/external/cronet/net/spdy/spdy_session_fuzzer.cc (revision 6777b5387eb2ff775bb5750e3f5d96f37fb7352b)
1 // Copyright 2017 The Chromium Authors
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4 
5 #include <fuzzer/FuzzedDataProvider.h>
6 
7 #include <algorithm>
8 
9 #include "base/logging.h"
10 #include "base/run_loop.h"
11 #include "net/base/host_port_pair.h"
12 #include "net/base/net_errors.h"
13 #include "net/base/request_priority.h"
14 #include "net/base/session_usage.h"
15 #include "net/cert/x509_certificate.h"
16 #include "net/dns/public/secure_dns_policy.h"
17 #include "net/log/net_log.h"
18 #include "net/log/net_log_source.h"
19 #include "net/log/test_net_log.h"
20 #include "net/socket/fuzzed_socket_factory.h"
21 #include "net/socket/socket_tag.h"
22 #include "net/socket/socket_test_util.h"
23 #include "net/socket/ssl_client_socket.h"
24 #include "net/spdy/spdy_test_util_common.h"
25 #include "net/ssl/ssl_config.h"
26 #include "net/traffic_annotation/network_traffic_annotation_test_helper.h"
27 
28 namespace {
29 
30 const uint8_t kCertData[] = {
31 #include "net/data/ssl/certificates/spdy_pooling.inc"
32 };
33 
34 class FuzzerDelegate : public net::SpdyStream::Delegate {
35  public:
FuzzerDelegate(base::OnceClosure done_closure)36   explicit FuzzerDelegate(base::OnceClosure done_closure)
37       : done_closure_(std::move(done_closure)) {}
38 
39   FuzzerDelegate(const FuzzerDelegate&) = delete;
40   FuzzerDelegate& operator=(const FuzzerDelegate&) = delete;
41 
OnHeadersSent()42   void OnHeadersSent() override {}
OnEarlyHintsReceived(const spdy::Http2HeaderBlock & headers)43   void OnEarlyHintsReceived(const spdy::Http2HeaderBlock& headers) override {}
OnHeadersReceived(const spdy::Http2HeaderBlock & response_headers)44   void OnHeadersReceived(
45       const spdy::Http2HeaderBlock& response_headers) override {}
OnDataReceived(std::unique_ptr<net::SpdyBuffer> buffer)46   void OnDataReceived(std::unique_ptr<net::SpdyBuffer> buffer) override {}
OnDataSent()47   void OnDataSent() override {}
OnTrailers(const spdy::Http2HeaderBlock & trailers)48   void OnTrailers(const spdy::Http2HeaderBlock& trailers) override {}
OnClose(int status)49   void OnClose(int status) override { std::move(done_closure_).Run(); }
CanGreaseFrameType() const50   bool CanGreaseFrameType() const override { return false; }
51 
source_dependency() const52   net::NetLogSource source_dependency() const override {
53     return net::NetLogSource();
54   }
55 
56  private:
57   base::OnceClosure done_closure_;
58 };
59 
60 }  // namespace
61 
62 namespace net {
63 
64 namespace {
65 
66 class FuzzedSocketFactoryWithMockSSLData : public FuzzedSocketFactory {
67  public:
68   explicit FuzzedSocketFactoryWithMockSSLData(
69       FuzzedDataProvider* data_provider);
70 
71   void AddSSLSocketDataProvider(SSLSocketDataProvider* socket);
72 
73   std::unique_ptr<SSLClientSocket> CreateSSLClientSocket(
74       SSLClientContext* context,
75       std::unique_ptr<StreamSocket> nested_socket,
76       const HostPortPair& host_and_port,
77       const SSLConfig& ssl_config) override;
78 
79  private:
80   SocketDataProviderArray<SSLSocketDataProvider> mock_ssl_data_;
81 };
82 
FuzzedSocketFactoryWithMockSSLData(FuzzedDataProvider * data_provider)83 FuzzedSocketFactoryWithMockSSLData::FuzzedSocketFactoryWithMockSSLData(
84     FuzzedDataProvider* data_provider)
85     : FuzzedSocketFactory(data_provider) {}
86 
AddSSLSocketDataProvider(SSLSocketDataProvider * data)87 void FuzzedSocketFactoryWithMockSSLData::AddSSLSocketDataProvider(
88     SSLSocketDataProvider* data) {
89   mock_ssl_data_.Add(data);
90 }
91 
92 std::unique_ptr<SSLClientSocket>
CreateSSLClientSocket(SSLClientContext * context,std::unique_ptr<StreamSocket> nested_socket,const HostPortPair & host_and_port,const SSLConfig & ssl_config)93 FuzzedSocketFactoryWithMockSSLData::CreateSSLClientSocket(
94     SSLClientContext* context,
95     std::unique_ptr<StreamSocket> nested_socket,
96     const HostPortPair& host_and_port,
97     const SSLConfig& ssl_config) {
98   return std::make_unique<MockSSLClientSocket>(std::move(nested_socket),
99                                                host_and_port, ssl_config,
100                                                mock_ssl_data_.GetNext());
101 }
102 
103 }  // namespace
104 
105 }  // namespace net
106 
107 // Fuzzer for SpdySession
108 //
109 // |data| is used to create a FuzzedServerSocket.
LLVMFuzzerTestOneInput(const uint8_t * data,size_t size)110 extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) {
111   // Including an observer; even though the recorded results aren't currently
112   // used, it'll ensure the netlogging code is fuzzed as well.
113   net::RecordingNetLogObserver net_log_observer;
114   net::NetLogWithSource net_log_with_source =
115       net::NetLogWithSource::Make(net::NetLogSourceType::NONE);
116   FuzzedDataProvider data_provider(data, size);
117   net::FuzzedSocketFactoryWithMockSSLData socket_factory(&data_provider);
118   socket_factory.set_fuzz_connect_result(false);
119 
120   net::SSLSocketDataProvider ssl_provider(net::ASYNC, net::OK);
121   ssl_provider.ssl_info.cert = net::X509Certificate::CreateFromBytes(kCertData);
122   CHECK(ssl_provider.ssl_info.cert);
123   socket_factory.AddSSLSocketDataProvider(&ssl_provider);
124 
125   net::SpdySessionDependencies deps;
126   std::unique_ptr<net::HttpNetworkSession> http_session(
127       net::SpdySessionDependencies::SpdyCreateSessionWithSocketFactory(
128           &deps, &socket_factory));
129 
130   net::SpdySessionKey session_key(
131       net::HostPortPair("127.0.0.1", 80), net::PRIVACY_MODE_DISABLED,
132       net::ProxyChain::Direct(), net::SessionUsage::kDestination,
133       net::SocketTag(), net::NetworkAnonymizationKey(),
134       net::SecureDnsPolicy::kAllow,
135       /*disable_cert_verification_network_fetches=*/false);
136   base::WeakPtr<net::SpdySession> spdy_session(net::CreateSpdySession(
137       http_session.get(), session_key, net_log_with_source));
138 
139   net::SpdyStreamRequest stream_request;
140   base::WeakPtr<net::SpdyStream> stream;
141 
142   net::TestCompletionCallback wait_for_start;
143   int rv = stream_request.StartRequest(
144       net::SPDY_REQUEST_RESPONSE_STREAM, spdy_session,
145       GURL("http://www.example.invalid/"), /*can_send_early=*/false,
146       net::DEFAULT_PRIORITY, net::SocketTag(), net_log_with_source,
147       wait_for_start.callback(), TRAFFIC_ANNOTATION_FOR_TESTS);
148 
149   if (rv == net::ERR_IO_PENDING) {
150     rv = wait_for_start.WaitForResult();
151   }
152 
153   // Re-check the status after potential event loop.
154   if (rv != net::OK) {
155     LOG(WARNING) << "StartRequest failed with result=" << rv;
156     return 0;
157   }
158 
159   stream = stream_request.ReleaseStream();
160   stream->SendRequestHeaders(
161       net::SpdyTestUtil::ConstructGetHeaderBlock("http://www.example.invalid"),
162       net::NO_MORE_DATA_TO_SEND);
163 
164   base::RunLoop run_loop;
165   FuzzerDelegate delegate(run_loop.QuitClosure());
166   stream->SetDelegate(&delegate);
167   run_loop.Run();
168 
169   // Give a chance for GOING_AWAY sessions to wrap up.
170   base::RunLoop().RunUntilIdle();
171 
172   return 0;
173 }
174