mirror of
https://github.com/refraction-networking/uquic.git
synced 2025-04-03 20:27:35 +03:00
generate a self-signed certificate for the handshake fuzzer
This commit is contained in:
parent
eaf5f47308
commit
b3c28ef2ea
2 changed files with 59 additions and 5 deletions
|
@ -1,17 +1,34 @@
|
|||
package handshake
|
||||
|
||||
import (
|
||||
"crypto/rand"
|
||||
"crypto/rsa"
|
||||
"crypto/tls"
|
||||
"crypto/x509"
|
||||
"fmt"
|
||||
"log"
|
||||
|
||||
"github.com/lucas-clemente/quic-go/fuzzing/internal/helper"
|
||||
"github.com/lucas-clemente/quic-go/internal/handshake"
|
||||
"github.com/lucas-clemente/quic-go/internal/protocol"
|
||||
"github.com/lucas-clemente/quic-go/internal/testdata"
|
||||
"github.com/lucas-clemente/quic-go/internal/utils"
|
||||
"github.com/lucas-clemente/quic-go/internal/wire"
|
||||
)
|
||||
|
||||
var cert *tls.Certificate
|
||||
var certPool *x509.CertPool
|
||||
|
||||
func init() {
|
||||
priv, err := rsa.GenerateKey(rand.Reader, 1024)
|
||||
if err != nil {
|
||||
log.Fatal(err)
|
||||
}
|
||||
cert, certPool, err = helper.GenerateCertificate(priv)
|
||||
if err != nil {
|
||||
log.Fatal(err)
|
||||
}
|
||||
}
|
||||
|
||||
type messageType uint8
|
||||
|
||||
// TLS handshake message types.
|
||||
|
@ -137,7 +154,7 @@ func Fuzz(data []byte) int {
|
|||
clientConf := &tls.Config{
|
||||
ServerName: "localhost",
|
||||
NextProtos: []string{alpn},
|
||||
RootCAs: testdata.GetRootCA(),
|
||||
RootCAs: certPool,
|
||||
}
|
||||
if useSessionTicketCache {
|
||||
clientConf.ClientSessionCache = tls.NewLRUClientSessionCache(5)
|
||||
|
@ -161,8 +178,6 @@ func Fuzz(data []byte) int {
|
|||
)
|
||||
|
||||
sChunkChan, sInitialStream, sHandshakeStream := initStreams()
|
||||
config := testdata.GetTLSConfig()
|
||||
config.NextProtos = []string{alpn}
|
||||
serverRunner := newRunner(&client, &server, "server")
|
||||
server = handshake.NewCryptoSetupServer(
|
||||
sInitialStream,
|
||||
|
@ -172,7 +187,10 @@ func Fuzz(data []byte) int {
|
|||
nil,
|
||||
&wire.TransportParameters{},
|
||||
serverRunner,
|
||||
config,
|
||||
&tls.Config{
|
||||
Certificates: []tls.Certificate{*cert},
|
||||
NextProtos: []string{alpn},
|
||||
},
|
||||
enable0RTTServer,
|
||||
utils.NewRTTStats(),
|
||||
nil,
|
||||
|
|
|
@ -1,11 +1,18 @@
|
|||
package helper
|
||||
|
||||
import (
|
||||
"crypto"
|
||||
"crypto/rand"
|
||||
"crypto/sha1"
|
||||
"crypto/tls"
|
||||
"crypto/x509"
|
||||
"crypto/x509/pkix"
|
||||
"encoding/hex"
|
||||
"io/ioutil"
|
||||
"math/big"
|
||||
"os"
|
||||
"path/filepath"
|
||||
"time"
|
||||
)
|
||||
|
||||
// NthBit gets the n-th bit of a byte (counting starts at 0).
|
||||
|
@ -35,3 +42,32 @@ func WriteCorpusFile(path string, data []byte) error {
|
|||
func WriteCorpusFileWithPrefix(path string, data []byte, n int) error {
|
||||
return WriteCorpusFile(path, append(make([]byte, n), data...))
|
||||
}
|
||||
|
||||
// GenerateCertificate generates a self-signed certificate.
|
||||
// It returns the certificate and a x509.CertPool containing that certificate.
|
||||
func GenerateCertificate(priv crypto.Signer) (*tls.Certificate, *x509.CertPool, error) {
|
||||
template := x509.Certificate{
|
||||
SerialNumber: big.NewInt(1),
|
||||
Subject: pkix.Name{Organization: []string{"quic-go fuzzer"}},
|
||||
NotBefore: time.Now().Add(-24 * time.Hour),
|
||||
NotAfter: time.Now().Add(30 * 24 * time.Hour),
|
||||
KeyUsage: x509.KeyUsageKeyEncipherment | x509.KeyUsageDigitalSignature,
|
||||
ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth},
|
||||
DNSNames: []string{"localhost"},
|
||||
BasicConstraintsValid: true,
|
||||
}
|
||||
derBytes, err := x509.CreateCertificate(rand.Reader, &template, &template, priv.Public(), priv)
|
||||
if err != nil {
|
||||
return nil, nil, err
|
||||
}
|
||||
cert, err := x509.ParseCertificate(derBytes)
|
||||
if err != nil {
|
||||
return nil, nil, err
|
||||
}
|
||||
certPool := x509.NewCertPool()
|
||||
certPool.AddCert(cert)
|
||||
return &tls.Certificate{
|
||||
Certificate: [][]byte{derBytes},
|
||||
PrivateKey: priv,
|
||||
}, certPool, nil
|
||||
}
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue