mirror of
https://github.com/clearml/dropbear
synced 2025-03-03 10:41:39 +00:00
- fuzzer-pubkey needs to free algoname, fix build
- improve dictionary with lengths
This commit is contained in:
parent
129c440362
commit
f7dedab4a7
@ -25,9 +25,9 @@ int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) {
|
||||
buffer *keyblob = buf_getstringbuf(fuzz.input);
|
||||
|
||||
unsigned int algolen;
|
||||
const char* algoname = buf_getstring(keyblob, &algolen);
|
||||
char* algoname = buf_getstring(keyblob, &algolen);
|
||||
|
||||
if (have_algo(algo, algolen, sshhostkey) == DROPBEAR_FAILURE) {
|
||||
if (have_algo(algoname, algolen, sshhostkey) == DROPBEAR_FAILURE) {
|
||||
dropbear_exit("fuzzer imagined a bogus algorithm");
|
||||
}
|
||||
fuzz_checkpubkey_line(line, 5, "/home/me/authorized_keys",
|
||||
@ -36,6 +36,7 @@ int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) {
|
||||
|
||||
buf_free(line);
|
||||
buf_free(keyblob);
|
||||
m_free(algoname);
|
||||
m_malloc_free_epoch(1, 0);
|
||||
} else {
|
||||
m_malloc_free_epoch(1, 1);
|
||||
|
@ -1,8 +1,8 @@
|
||||
"ssh-rsa"
|
||||
"ssh-dss"
|
||||
"ecdsa-sha2-nistp256"
|
||||
"ecdsa-sha2-nistp384"
|
||||
"ecdsa-sha2-nistp521"
|
||||
"\x00\x00\x00\x07ssh-rsa"
|
||||
"\x00\x00\x00\x07ssh-dss"
|
||||
"\x00\x00\x00\x13ecdsa-sha2-nistp256"
|
||||
"\x00\x00\x00\x13ecdsa-sha2-nistp384"
|
||||
"\x00\x00\x00\x13ecdsa-sha2-nistp521"
|
||||
"no-port-forwarding"
|
||||
"no-port-forwarding"
|
||||
"no-agent-forwarding"
|
||||
|
Loading…
Reference in New Issue
Block a user