123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354 |
- #include "fuzz.h"
- #include "session.h"
- #include "fuzz-wrapfd.h"
- #include "debug.h"
- static void setup_fuzzer(void) {
- fuzz_common_setup();
- }
- int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) {
- static int once = 0;
- if (!once) {
- setup_fuzzer();
- once = 1;
- }
- if (fuzz_set_input(Data, Size) == DROPBEAR_FAILURE) {
- return 0;
- }
- m_malloc_set_epoch(1);
- if (setjmp(fuzz.jmp) == 0) {
- buffer *line = buf_getstringbuf(fuzz.input);
- buffer *keyblob = buf_getstringbuf(fuzz.input);
- unsigned int algolen;
- char* algoname = buf_getstring(keyblob, &algolen);
- if (signature_type_from_name(algoname, algolen) == DROPBEAR_SIGNATURE_NONE) {
- dropbear_exit("fuzzer imagined a bogus algorithm");
- }
- int ret = fuzz_checkpubkey_line(line, 5, "/home/me/authorized_keys",
- algoname, algolen,
- keyblob->data, keyblob->len);
- if (ret == DROPBEAR_SUCCESS) {
- /* fuzz_checkpubkey_line() should have cleaned up for failure */
- svr_pubkey_options_cleanup();
- }
- buf_free(line);
- buf_free(keyblob);
- m_free(algoname);
- m_malloc_free_epoch(1, 0);
- } else {
- m_malloc_free_epoch(1, 1);
- TRACE(("dropbear_exit longjmped"))
- /* dropbear_exit jumped here */
- }
- return 0;
- }
|