# HG changeset patch # User Matt Johnston # Date 1520162385 -28800 # Node ID cdfab509c392d97ebd3ae7fc886528fca1660e94 # Parent d17a6bab2179cf2ceaa323c57772acc492be66d6 use random keyblob from the fuzzer instead diff -r d17a6bab2179 -r cdfab509c392 fuzzer-pubkey.c --- a/fuzzer-pubkey.c Sun Mar 04 17:17:37 2018 +0800 +++ b/fuzzer-pubkey.c Sun Mar 04 19:19:45 2018 +0800 @@ -20,19 +20,22 @@ m_malloc_set_epoch(1); - /* choose a keytype based on input */ - uint8_t b = 0; - size_t i; - for (i = 0; i < Size; i++) { - b ^= Data[i]; - } - const char* algoname = fuzz_signkey_names[b%DROPBEAR_SIGNKEY_NUM_NAMED]; - const char* keyblob = "blob"; /* keep short */ + if (setjmp(fuzz.jmp) == 0) { + buffer *line = buf_getstringbuf(fuzz.input); + buffer *keyblob = buf_getstringbuf(fuzz.input); + + unsigned int algolen; + const char* algoname = buf_getstring(keyblob, &algolen); - if (setjmp(fuzz.jmp) == 0) { - fuzz_checkpubkey_line(fuzz.input, 5, "/home/me/authorized_keys", - algoname, strlen(algoname), - (unsigned char*)keyblob, strlen(keyblob)); + if (have_algo(algo, algolen, sshhostkey) == DROPBEAR_FAILURE) { + dropbear_exit("fuzzer imagined a bogus algorithm"); + } + fuzz_checkpubkey_line(line, 5, "/home/me/authorized_keys", + algoname, algolen, + keyblob->data, keyblob->len); + + buf_free(line); + buf_free(keyblob); m_malloc_free_epoch(1, 0); } else { m_malloc_free_epoch(1, 1);