mirror of
https://github.com/clearml/dropbear
synced 2025-06-26 18:17:32 +00:00
kexhashbuf was much to small in kex fuzzers
This commit is contained in:
@@ -54,8 +54,7 @@ int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) {
|
||||
dropbear_exit("Bad kex value");
|
||||
}
|
||||
|
||||
ses.kexhashbuf = buf_new(4);
|
||||
buf_putint(ses.kexhashbuf, 12345);
|
||||
ses.kexhashbuf = buf_new(KEXHASHBUF_MAX_INTS);
|
||||
kexdh_comb_key(dh_param, &dh_e, svr_opts.hostkey);
|
||||
|
||||
/* kexhashbuf is freed in kexdh_comb_key */
|
||||
|
||||
@@ -60,8 +60,7 @@ int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) {
|
||||
|
||||
buffer * ecdh_qs = buf_getstringbuf(fuzz.input);
|
||||
|
||||
ses.kexhashbuf = buf_new(4);
|
||||
buf_putint(ses.kexhashbuf, 12345);
|
||||
ses.kexhashbuf = buf_new(KEXHASHBUF_MAX_INTS);
|
||||
kexecdh_comb_key(ecdh_param, ecdh_qs, svr_opts.hostkey);
|
||||
|
||||
/* kexhashbuf is freed in kexdh_comb_key */
|
||||
|
||||
Reference in New Issue
Block a user