Mercurial > dropbear
view fuzz/fuzzer-kexdh.c @ 1921:284c3837891c
Allow user space file locations (rootless support)
Why:
Running dropbear as a user (rootless) is aided if
files and programs can be saved/removed without
needing sudo.
What:
Use the same convention as DROPBEAR_DEFAULT_CLI_AUTHKEY;
if not starting with '/', then is relative to hedge's /home/hedge:
*_PRIV_FILENAME
DROPBEAR_PIDFILE
SFTPSERVER_PATH
default_options.h commentary added.
Changes kept to a minimum, so log entry in svr_kex.c#163
is refactored.
From:
Generated hostkey is <path> ... <finger-print>
to:
Generated hostkey path is <path>
Generated hostkey fingerprint is <fp>
Otherwise the unexpanded path was reported.
Patch modified by Matt Johnston
Signed-off-by: Begley Brothers Inc <[email protected]>
author | Begley Brothers Inc <begleybrothers@gmail.com> |
---|---|
date | Thu, 09 Jul 2020 17:47:58 +1000 |
parents | 0cc85b4a4abb |
children |
line wrap: on
line source
#include "fuzz.h" #include "session.h" #include "fuzz-wrapfd.h" #include "debug.h" #include "runopts.h" #include "algo.h" #include "bignum.h" static struct key_context* keep_newkeys = NULL; #define NUM_PARAMS 80 static struct kex_dh_param *dh_params[NUM_PARAMS]; static void setup() __attribute__((constructor)); // Perform initial setup here to avoid hitting timeouts on first run static void setup() { fuzz_common_setup(); fuzz_svr_setup(); keep_newkeys = (struct key_context*)m_malloc(sizeof(struct key_context)); keep_newkeys->algo_kex = fuzz_get_algo(sshkex, "diffie-hellman-group14-sha256"); keep_newkeys->algo_hostkey = DROPBEAR_SIGNKEY_ECDSA_NISTP256; ses.newkeys = keep_newkeys; /* Pre-generate parameters */ int i; for (i = 0; i < NUM_PARAMS; i++) { dh_params[i] = gen_kexdh_param(); } } int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) { if (fuzz_set_input(Data, Size) == DROPBEAR_FAILURE) { return 0; } m_malloc_set_epoch(1); if (setjmp(fuzz.jmp) == 0) { /* Based on recv_msg_kexdh_init()/send_msg_kexdh_reply() with DROPBEAR_KEX_NORMAL_DH */ ses.newkeys = keep_newkeys; /* Choose from the collection of ecdh params */ unsigned int e = buf_getint(fuzz.input); struct kex_dh_param * dh_param = dh_params[e % NUM_PARAMS]; DEF_MP_INT(dh_e); m_mp_init(&dh_e); if (buf_getmpint(fuzz.input, &dh_e) != DROPBEAR_SUCCESS) { dropbear_exit("Bad kex value"); } ses.kexhashbuf = buf_new(KEXHASHBUF_MAX_INTS); kexdh_comb_key(dh_param, &dh_e, svr_opts.hostkey); mp_clear(ses.dh_K); m_free(ses.dh_K); mp_clear(&dh_e); buf_free(ses.hash); buf_free(ses.session_id); /* kexhashbuf is freed in kexdh_comb_key */ m_malloc_free_epoch(1, 0); } else { m_malloc_free_epoch(1, 1); TRACE(("dropbear_exit longjmped")) /* dropbear_exit jumped here */ } return 0; }