Mercurial > dropbear
view fuzz/fuzzer-kexdh.c @ 1902:4a6725ac957c
Revert "Don't include sk keys at all in KEX list"
This reverts git commit f972813ecdc7bb981d25b5a63638bd158f1c8e72.
The sk algorithms need to remain in the sigalgs list so that they
are included in the server-sig-algs ext-info message sent by
the server. RFC8308 for server-sig-algs requires that all algorithms are
listed (though OpenSSH client 8.4p1 tested doesn't require that)
author | Matt Johnston <matt@ucc.asn.au> |
---|---|
date | Thu, 24 Mar 2022 13:42:08 +0800 |
parents | 0cc85b4a4abb |
children |
line wrap: on
line source
#include "fuzz.h" #include "session.h" #include "fuzz-wrapfd.h" #include "debug.h" #include "runopts.h" #include "algo.h" #include "bignum.h" static struct key_context* keep_newkeys = NULL; #define NUM_PARAMS 80 static struct kex_dh_param *dh_params[NUM_PARAMS]; static void setup() __attribute__((constructor)); // Perform initial setup here to avoid hitting timeouts on first run static void setup() { fuzz_common_setup(); fuzz_svr_setup(); keep_newkeys = (struct key_context*)m_malloc(sizeof(struct key_context)); keep_newkeys->algo_kex = fuzz_get_algo(sshkex, "diffie-hellman-group14-sha256"); keep_newkeys->algo_hostkey = DROPBEAR_SIGNKEY_ECDSA_NISTP256; ses.newkeys = keep_newkeys; /* Pre-generate parameters */ int i; for (i = 0; i < NUM_PARAMS; i++) { dh_params[i] = gen_kexdh_param(); } } int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) { if (fuzz_set_input(Data, Size) == DROPBEAR_FAILURE) { return 0; } m_malloc_set_epoch(1); if (setjmp(fuzz.jmp) == 0) { /* Based on recv_msg_kexdh_init()/send_msg_kexdh_reply() with DROPBEAR_KEX_NORMAL_DH */ ses.newkeys = keep_newkeys; /* Choose from the collection of ecdh params */ unsigned int e = buf_getint(fuzz.input); struct kex_dh_param * dh_param = dh_params[e % NUM_PARAMS]; DEF_MP_INT(dh_e); m_mp_init(&dh_e); if (buf_getmpint(fuzz.input, &dh_e) != DROPBEAR_SUCCESS) { dropbear_exit("Bad kex value"); } ses.kexhashbuf = buf_new(KEXHASHBUF_MAX_INTS); kexdh_comb_key(dh_param, &dh_e, svr_opts.hostkey); mp_clear(ses.dh_K); m_free(ses.dh_K); mp_clear(&dh_e); buf_free(ses.hash); buf_free(ses.session_id); /* kexhashbuf is freed in kexdh_comb_key */ m_malloc_free_epoch(1, 0); } else { m_malloc_free_epoch(1, 1); TRACE(("dropbear_exit longjmped")) /* dropbear_exit jumped here */ } return 0; }