annotate fuzzers_test.sh @ 1855:35d504d59c05

Implement server-side support for sk-ecdsa U2F-backed keys (#142) * Implement server-side support for sk-ecdsa U2F-backed keys * Fix out-of-bounds read on normal ecdsa-sha2-[identifier] keys * Fix one more potential out-of-bounds read * Check if nistp256 curve is used in sk-ecdsa-sha2- key It's the only allowed curve per PROTOCOL.u2f specification * Implement server-side support for sk-ed25519 FIDO2-backed keys * Keys with type sk-* make no sense as host keys, so they should be disabled * fix typo * Make sk-ecdsa call buf_ecdsa_verify This reduces code duplication, the SK code just handles the different message format. * Reduce sk specific code The application id can be stored in signkey, then we don't need to call sk-specific functions from svr-authpubkey * Remove debugging output, which causes compilation errors with DEBUG_TRACE disabled * Proper cleanup of sk_app Co-authored-by: Matt Johnston <[email protected]>
author egor-duda <egor-duda@users.noreply.github.com>
date Sat, 22 Jan 2022 16:53:04 +0300
parents fd00aeff38fd
children
Ignore whitespace changes - Everywhere: Within whitespace: At end of lines:
rev   line source
1566
3fc0e9a0978b add fuzzers to travis
Matt Johnston <matt@ucc.asn.au>
parents:
diff changeset
1 #!/bin/sh
3fc0e9a0978b add fuzzers to travis
Matt Johnston <matt@ucc.asn.au>
parents:
diff changeset
2
3fc0e9a0978b add fuzzers to travis
Matt Johnston <matt@ucc.asn.au>
parents:
diff changeset
3 # runs fuzz corpus with standalone fuzzers
3fc0e9a0978b add fuzzers to travis
Matt Johnston <matt@ucc.asn.au>
parents:
diff changeset
4
3fc0e9a0978b add fuzzers to travis
Matt Johnston <matt@ucc.asn.au>
parents:
diff changeset
5 result=0
3fc0e9a0978b add fuzzers to travis
Matt Johnston <matt@ucc.asn.au>
parents:
diff changeset
6
1737
8b27de2c92ee Change secure.ucc.asn.au/hg to hg.ucc.asn.au
Matt Johnston <matt@ucc.asn.au>
parents: 1655
diff changeset
7 test -d fuzzcorpus && hg --repository fuzzcorpus/ pull || hg clone https://hg.ucc.asn.au/dropbear-fuzzcorpus fuzzcorpus || exit 1
1566
3fc0e9a0978b add fuzzers to travis
Matt Johnston <matt@ucc.asn.au>
parents:
diff changeset
8 for f in `make list-fuzz-targets`; do
1808
42daf3044618 fuzz: split long argument list with xargs
Matt Johnston <matt@ucc.asn.au>
parents: 1737
diff changeset
9 # use xargs to split the too-long argument list
1809
fd00aeff38fd fuzz: add -q quiet argument for standalone fuzzers.
Matt Johnston <matt@ucc.asn.au>
parents: 1808
diff changeset
10 # -q quiet because travis has a logfile limit
fd00aeff38fd fuzz: add -q quiet argument for standalone fuzzers.
Matt Johnston <matt@ucc.asn.au>
parents: 1808
diff changeset
11 echo fuzzcorpus/$f/* | xargs -n 1000 ./$f -q || result=1
1566
3fc0e9a0978b add fuzzers to travis
Matt Johnston <matt@ucc.asn.au>
parents:
diff changeset
12 done
3fc0e9a0978b add fuzzers to travis
Matt Johnston <matt@ucc.asn.au>
parents:
diff changeset
13
3fc0e9a0978b add fuzzers to travis
Matt Johnston <matt@ucc.asn.au>
parents:
diff changeset
14 exit $result