mirror of
http://galexander.org/git/simplesshd.git
synced 2024-11-30 11:18:12 +00:00
55 lines
1.2 KiB
C
55 lines
1.2 KiB
C
#include "fuzz.h"
|
|
#include "session.h"
|
|
#include "fuzz-wrapfd.h"
|
|
#include "debug.h"
|
|
|
|
static void setup_fuzzer(void) {
|
|
fuzz_common_setup();
|
|
}
|
|
|
|
int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) {
|
|
static int once = 0;
|
|
if (!once) {
|
|
setup_fuzzer();
|
|
once = 1;
|
|
}
|
|
|
|
if (fuzz_set_input(Data, Size) == DROPBEAR_FAILURE) {
|
|
return 0;
|
|
}
|
|
|
|
m_malloc_set_epoch(1);
|
|
|
|
if (setjmp(fuzz.jmp) == 0) {
|
|
buffer *line = buf_getstringbuf(fuzz.input);
|
|
buffer *keyblob = buf_getstringbuf(fuzz.input);
|
|
|
|
unsigned int algolen;
|
|
char* algoname = buf_getstring(keyblob, &algolen);
|
|
|
|
if (signature_type_from_name(algoname, algolen) == DROPBEAR_SIGNKEY_NONE) {
|
|
dropbear_exit("fuzzer imagined a bogus algorithm");
|
|
}
|
|
|
|
int ret = fuzz_checkpubkey_line(line, 5, "/home/me/authorized_keys",
|
|
algoname, algolen,
|
|
keyblob->data, keyblob->len);
|
|
|
|
if (ret == DROPBEAR_SUCCESS) {
|
|
/* fuzz_checkpubkey_line() should have cleaned up for failure */
|
|
svr_pubkey_options_cleanup();
|
|
}
|
|
|
|
buf_free(line);
|
|
buf_free(keyblob);
|
|
m_free(algoname);
|
|
m_malloc_free_epoch(1, 0);
|
|
} else {
|
|
m_malloc_free_epoch(1, 1);
|
|
TRACE(("dropbear_exit longjmped"))
|
|
/* dropbear_exit jumped here */
|
|
}
|
|
|
|
return 0;
|
|
}
|