annotate fuzzers_test.sh @ 1732:2f5d797d9811

Don't choke on disabled authorized_keys(5) options As of 2020.79 X11 forwarding is disabled at build time, which could lock out users with authorized_keys(5) files containing ‘no-X11-forwarding’ options.
author Guilhem Moulin <guilhem@debian.org>
date Fri, 26 Jun 2020 20:56:03 +0800
parents f52919ffd3b1
children 8b27de2c92ee
Ignore whitespace changes - Everywhere: Within whitespace: At end of lines:
rev   line source
1566
3fc0e9a0978b add fuzzers to travis
Matt Johnston <matt@ucc.asn.au>
parents:
diff changeset
1 #!/bin/sh
3fc0e9a0978b add fuzzers to travis
Matt Johnston <matt@ucc.asn.au>
parents:
diff changeset
2
3fc0e9a0978b add fuzzers to travis
Matt Johnston <matt@ucc.asn.au>
parents:
diff changeset
3 # runs fuzz corpus with standalone fuzzers
3fc0e9a0978b add fuzzers to travis
Matt Johnston <matt@ucc.asn.au>
parents:
diff changeset
4
3fc0e9a0978b add fuzzers to travis
Matt Johnston <matt@ucc.asn.au>
parents:
diff changeset
5 result=0
3fc0e9a0978b add fuzzers to travis
Matt Johnston <matt@ucc.asn.au>
parents:
diff changeset
6
1655
f52919ffd3b1 update ltm to 1.1.0 and enable FIPS 186.4 compliant key-generation (#79)
Steffen Jaeckel <s_jaeckel@gmx.de>
parents: 1566
diff changeset
7 test -d fuzzcorpus && hg --repository fuzzcorpus/ pull || hg clone https://secure.ucc.asn.au/hg/dropbear-fuzzcorpus fuzzcorpus || exit 1
1566
3fc0e9a0978b add fuzzers to travis
Matt Johnston <matt@ucc.asn.au>
parents:
diff changeset
8 for f in `make list-fuzz-targets`; do
3fc0e9a0978b add fuzzers to travis
Matt Johnston <matt@ucc.asn.au>
parents:
diff changeset
9 ./$f fuzzcorpus/$f/* || result=1
3fc0e9a0978b add fuzzers to travis
Matt Johnston <matt@ucc.asn.au>
parents:
diff changeset
10 done
3fc0e9a0978b add fuzzers to travis
Matt Johnston <matt@ucc.asn.au>
parents:
diff changeset
11
3fc0e9a0978b add fuzzers to travis
Matt Johnston <matt@ucc.asn.au>
parents:
diff changeset
12 exit $result