Mercurial > dropbear
view fuzzer-pubkey.c @ 1376:9e9c8d37fd56 fuzz
limit input size
author | Matt Johnston <matt@ucc.asn.au> |
---|---|
date | Thu, 25 May 2017 22:21:23 +0800 |
parents | ddfcadca3c4c |
children | d4cc85e6c569 |
line wrap: on
line source
#include "fuzz.h" #include "session.h" #include "fuzz-wrapfd.h" #include "debug.h" static void setup_fuzzer(void) { common_setup_fuzzer(); } int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) { static int once = 0; if (!once) { setup_fuzzer(); once = 1; } m_malloc_set_epoch(1); fuzz_seed(); fuzz.input->data = (unsigned char*)Data; fuzz.input->len = Size; fuzz.input->size = Size; fuzz.input->pos = 0; if (Size < 4) { return 0; } // choose a keytype based on input uint8_t b = 0; size_t i; for (i = 0; i < Size; i++) { b ^= Data[i]; } const char* algoname = fuzz_signkey_names[b%DROPBEAR_SIGNKEY_NUM_NAMED]; const char* keyblob = "fakekeyblob"; if (setjmp(fuzz.jmp) == 0) { fuzz_checkpubkey_line(fuzz.input, 5, "/home/me/authorized_keys", algoname, strlen(algoname), keyblob, strlen(keyblob)); } else { m_malloc_free_epoch(1); TRACE(("dropbear_exit longjmped")) // dropbear_exit jumped here } return 0; }