generate a self-signed certificate for the handshake fuzzer

This commit is contained in:
Marten Seemann 2020-09-03 10:52:52 +07:00
parent eaf5f47308
commit b3c28ef2ea
2 changed files with 59 additions and 5 deletions

View file

@ -1,17 +1,34 @@
package handshake package handshake
import ( import (
"crypto/rand"
"crypto/rsa"
"crypto/tls" "crypto/tls"
"crypto/x509"
"fmt" "fmt"
"log"
"github.com/lucas-clemente/quic-go/fuzzing/internal/helper" "github.com/lucas-clemente/quic-go/fuzzing/internal/helper"
"github.com/lucas-clemente/quic-go/internal/handshake" "github.com/lucas-clemente/quic-go/internal/handshake"
"github.com/lucas-clemente/quic-go/internal/protocol" "github.com/lucas-clemente/quic-go/internal/protocol"
"github.com/lucas-clemente/quic-go/internal/testdata"
"github.com/lucas-clemente/quic-go/internal/utils" "github.com/lucas-clemente/quic-go/internal/utils"
"github.com/lucas-clemente/quic-go/internal/wire" "github.com/lucas-clemente/quic-go/internal/wire"
) )
var cert *tls.Certificate
var certPool *x509.CertPool
func init() {
priv, err := rsa.GenerateKey(rand.Reader, 1024)
if err != nil {
log.Fatal(err)
}
cert, certPool, err = helper.GenerateCertificate(priv)
if err != nil {
log.Fatal(err)
}
}
type messageType uint8 type messageType uint8
// TLS handshake message types. // TLS handshake message types.
@ -137,7 +154,7 @@ func Fuzz(data []byte) int {
clientConf := &tls.Config{ clientConf := &tls.Config{
ServerName: "localhost", ServerName: "localhost",
NextProtos: []string{alpn}, NextProtos: []string{alpn},
RootCAs: testdata.GetRootCA(), RootCAs: certPool,
} }
if useSessionTicketCache { if useSessionTicketCache {
clientConf.ClientSessionCache = tls.NewLRUClientSessionCache(5) clientConf.ClientSessionCache = tls.NewLRUClientSessionCache(5)
@ -161,8 +178,6 @@ func Fuzz(data []byte) int {
) )
sChunkChan, sInitialStream, sHandshakeStream := initStreams() sChunkChan, sInitialStream, sHandshakeStream := initStreams()
config := testdata.GetTLSConfig()
config.NextProtos = []string{alpn}
serverRunner := newRunner(&client, &server, "server") serverRunner := newRunner(&client, &server, "server")
server = handshake.NewCryptoSetupServer( server = handshake.NewCryptoSetupServer(
sInitialStream, sInitialStream,
@ -172,7 +187,10 @@ func Fuzz(data []byte) int {
nil, nil,
&wire.TransportParameters{}, &wire.TransportParameters{},
serverRunner, serverRunner,
config, &tls.Config{
Certificates: []tls.Certificate{*cert},
NextProtos: []string{alpn},
},
enable0RTTServer, enable0RTTServer,
utils.NewRTTStats(), utils.NewRTTStats(),
nil, nil,

View file

@ -1,11 +1,18 @@
package helper package helper
import ( import (
"crypto"
"crypto/rand"
"crypto/sha1" "crypto/sha1"
"crypto/tls"
"crypto/x509"
"crypto/x509/pkix"
"encoding/hex" "encoding/hex"
"io/ioutil" "io/ioutil"
"math/big"
"os" "os"
"path/filepath" "path/filepath"
"time"
) )
// NthBit gets the n-th bit of a byte (counting starts at 0). // NthBit gets the n-th bit of a byte (counting starts at 0).
@ -35,3 +42,32 @@ func WriteCorpusFile(path string, data []byte) error {
func WriteCorpusFileWithPrefix(path string, data []byte, n int) error { func WriteCorpusFileWithPrefix(path string, data []byte, n int) error {
return WriteCorpusFile(path, append(make([]byte, n), data...)) return WriteCorpusFile(path, append(make([]byte, n), data...))
} }
// GenerateCertificate generates a self-signed certificate.
// It returns the certificate and a x509.CertPool containing that certificate.
func GenerateCertificate(priv crypto.Signer) (*tls.Certificate, *x509.CertPool, error) {
template := x509.Certificate{
SerialNumber: big.NewInt(1),
Subject: pkix.Name{Organization: []string{"quic-go fuzzer"}},
NotBefore: time.Now().Add(-24 * time.Hour),
NotAfter: time.Now().Add(30 * 24 * time.Hour),
KeyUsage: x509.KeyUsageKeyEncipherment | x509.KeyUsageDigitalSignature,
ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth},
DNSNames: []string{"localhost"},
BasicConstraintsValid: true,
}
derBytes, err := x509.CreateCertificate(rand.Reader, &template, &template, priv.Public(), priv)
if err != nil {
return nil, nil, err
}
cert, err := x509.ParseCertificate(derBytes)
if err != nil {
return nil, nil, err
}
certPool := x509.NewCertPool()
certPool.AddCert(cert)
return &tls.Certificate{
Certificate: [][]byte{derBytes},
PrivateKey: priv,
}, certPool, nil
}