12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182 |
- #include "fuzz.h"
- #include "session.h"
- #include "fuzz-wrapfd.h"
- #include "debug.h"
- #include "runopts.h"
- #include "algo.h"
- #include "bignum.h"
- static const struct dropbear_kex *ecdh[3];
- static struct key_context* keep_newkeys = NULL;
- #define NUM_PARAMS 80
- static struct kex_ecdh_param *ecdh_params[NUM_PARAMS];
- static void setup() __attribute__((constructor));
- static void setup() {
- fuzz_common_setup();
- fuzz_svr_setup();
-
- keep_newkeys = (struct key_context*)m_malloc(sizeof(struct key_context));
- ecdh[0] = fuzz_get_algo(sshkex, "ecdh-sha2-nistp256");
- ecdh[1] = fuzz_get_algo(sshkex, "ecdh-sha2-nistp384");
- ecdh[2] = fuzz_get_algo(sshkex, "ecdh-sha2-nistp521");
- assert(ecdh[0]);
- assert(ecdh[1]);
- assert(ecdh[2]);
- keep_newkeys->algo_hostkey = DROPBEAR_SIGNKEY_ECDSA_NISTP256;
- ses.newkeys = keep_newkeys;
-
- int i;
- for (i = 0; i < NUM_PARAMS; i++) {
- ses.newkeys->algo_kex = ecdh[i % 3];
- ecdh_params[i] = gen_kexecdh_param();
- }
- }
- int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) {
- if (fuzz_set_input(Data, Size) == DROPBEAR_FAILURE) {
- return 0;
- }
- m_malloc_set_epoch(1);
- if (setjmp(fuzz.jmp) == 0) {
-
- ses.newkeys = keep_newkeys;
-
- unsigned char b = buf_getbyte(fuzz.input);
- ses.newkeys->algo_kex = ecdh[b % 3];
-
- unsigned int e = buf_getint(fuzz.input);
- struct kex_ecdh_param *ecdh_param = ecdh_params[e % NUM_PARAMS];
- buffer * ecdh_qs = buf_getstringbuf(fuzz.input);
- ses.kexhashbuf = buf_new(KEXHASHBUF_MAX_INTS);
- kexecdh_comb_key(ecdh_param, ecdh_qs, svr_opts.hostkey);
- mp_clear(ses.dh_K);
- m_free(ses.dh_K);
- buf_free(ecdh_qs);
- buf_free(ses.hash);
- buf_free(ses.session_id);
-
- m_malloc_free_epoch(1, 0);
- } else {
- m_malloc_free_epoch(1, 1);
- TRACE(("dropbear_exit longjmped"))
-
- }
- return 0;
- }
|