summaryrefslogtreecommitdiffhomepage
path: root/fuzzer-verify.c
diff options
context:
space:
mode:
authorMatt Johnston <matt@ucc.asn.au>2020-05-17 23:58:31 +0800
committerMatt Johnston <matt@ucc.asn.au>2020-05-17 23:58:31 +0800
commit972d723484d89c71e73ed63cc17bb2a6ce8cca5a (patch)
treea235001a141556ea7e2578ff12f2765d6a953280 /fuzzer-verify.c
parent7dc2f36c3e2d21455ae432da4d8f338e7dc0668c (diff)
split signkey_type and signature_type for RSA sha1 vs sha256
Diffstat (limited to 'fuzzer-verify.c')
-rw-r--r--fuzzer-verify.c18
1 files changed, 14 insertions, 4 deletions
diff --git a/fuzzer-verify.c b/fuzzer-verify.c
index 8ecbcdb..cda7723 100644
--- a/fuzzer-verify.c
+++ b/fuzzer-verify.c
@@ -27,15 +27,25 @@ int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) {
if (setjmp(fuzz.jmp) == 0) {
sign_key *key = new_sign_key();
- enum signkey_type type = DROPBEAR_SIGNKEY_ANY;
- if (buf_get_pub_key(fuzz.input, key, &type) == DROPBEAR_SUCCESS) {
- if (buf_verify(fuzz.input, key, verifydata) == DROPBEAR_SUCCESS) {
+ enum signkey_type keytype = DROPBEAR_SIGNKEY_ANY;
+ if (buf_get_pub_key(fuzz.input, key, &keytype) == DROPBEAR_SUCCESS) {
+ enum signature_type sigtype = (enum signature_type)keytype;
+ if (keytype == DROPBEAR_SIGNKEY_RSA) {
+ /* Flip a coin to decide rsa signature type */
+ int flag = buf_getbyte(fuzz_input);
+ if (flag & 0x01) {
+ sigtype = DROPBEAR_SIGNATURE_RSA_SHA256;
+ } else {
+ sigtype = DROPBEAR_SIGNATURE_RSA_SHA1;
+ }
+ }
+ if (buf_verify(fuzz.input, key, sigtype, verifydata) == DROPBEAR_SUCCESS) {
/* The fuzzer is capable of generating keys with a signature to match.
We don't want false positives if the key is bogus, since a client/server
wouldn't be trusting a bogus key anyway */
int boguskey = 0;
- if (type == DROPBEAR_SIGNKEY_DSS) {
+ if (keytype == DROPBEAR_SIGNKEY_DSS) {
/* So far have seen dss keys with bad p/q/g domain parameters */
int pprime, qprime, trials;
trials = mp_prime_rabin_miller_trials(mp_count_bits(key->dsskey->p));