view fuzzer-pubkey.c @ 1381:c98e242dc505 fuzz

add m_mp_free_multi, be more careful freeing when failing to load keys
author Matt Johnston <matt@ucc.asn.au>
date Fri, 26 May 2017 21:08:43 +0800
parents 7209a6e30932
children f03cfe9c76ac
line wrap: on
line source

#include "fuzz.h"
#include "session.h"
#include "fuzz-wrapfd.h"
#include "debug.h"

static void setup_fuzzer(void) {
	common_setup_fuzzer();
}

int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) {
	static int once = 0;
	if (!once) {
		setup_fuzzer();
		once = 1;
	}

	if (fuzzer_set_input(Data, Size) == DROPBEAR_FAILURE) {
		return 0;
	}

	m_malloc_set_epoch(1);

	// choose a keytype based on input
	uint8_t b = 0;
	size_t i;
	for (i = 0; i < Size; i++) {
		b ^= Data[i];
	}
	const char* algoname = fuzz_signkey_names[b%DROPBEAR_SIGNKEY_NUM_NAMED];
	const char* keyblob = "blob"; // keep short

	if (setjmp(fuzz.jmp) == 0) {
		fuzz_checkpubkey_line(fuzz.input, 5, "/home/me/authorized_keys", 
			algoname, strlen(algoname),
			keyblob, strlen(keyblob));
			m_malloc_free_epoch(1, 0);
	} else {
		m_malloc_free_epoch(1, 1);
		TRACE(("dropbear_exit longjmped"))
		// dropbear_exit jumped here
	}

	return 0;
}