changeset 1584:cdfab509c392

use random keyblob from the fuzzer instead
author Matt Johnston <matt@ucc.asn.au>
date Sun, 04 Mar 2018 19:19:45 +0800
parents d17a6bab2179
children 4192f8831858
files fuzzer-pubkey.c
diffstat 1 files changed, 15 insertions(+), 12 deletions(-) [+]
line wrap: on
line diff
--- a/fuzzer-pubkey.c	Sun Mar 04 17:17:37 2018 +0800
+++ b/fuzzer-pubkey.c	Sun Mar 04 19:19:45 2018 +0800
@@ -20,19 +20,22 @@
 
 	m_malloc_set_epoch(1);
 
-	/* choose a keytype based on input */
-	uint8_t b = 0;
-	size_t i;
-	for (i = 0; i < Size; i++) {
-		b ^= Data[i];
-	}
-	const char* algoname = fuzz_signkey_names[b%DROPBEAR_SIGNKEY_NUM_NAMED];
-	const char* keyblob = "blob"; /* keep short */
+	if (setjmp(fuzz.jmp) == 0) {
+		buffer *line = buf_getstringbuf(fuzz.input);
+		buffer *keyblob = buf_getstringbuf(fuzz.input);
+
+		unsigned int algolen;
+		const char* algoname = buf_getstring(keyblob, &algolen);
 
-	if (setjmp(fuzz.jmp) == 0) {
-		fuzz_checkpubkey_line(fuzz.input, 5, "/home/me/authorized_keys", 
-			algoname, strlen(algoname),
-			(unsigned char*)keyblob, strlen(keyblob));
+		if (have_algo(algo, algolen, sshhostkey) == DROPBEAR_FAILURE) {
+			dropbear_exit("fuzzer imagined a bogus algorithm");
+		}
+		fuzz_checkpubkey_line(line, 5, "/home/me/authorized_keys",
+			algoname, algolen,
+			keyblob->data, keyblob->len);
+
+		buf_free(line);
+		buf_free(keyblob);
 		m_malloc_free_epoch(1, 0);
 	} else {
 		m_malloc_free_epoch(1, 1);