From 05f4e29a52ff806620b1f80ab59797ac1bc8415d Mon Sep 17 00:00:00 2001 From: Matt Johnston Date: Wed, 21 Feb 2018 21:49:24 +0800 Subject: The fuzzer has managed to generated DSS key/signature pairs that verify. Avoid false positives from bogus keys that wouldn't be used --HG-- branch : fuzz --- fuzz-common.c | 2 ++ 1 file changed, 2 insertions(+) (limited to 'fuzz-common.c') diff --git a/fuzz-common.c b/fuzz-common.c index b596821..8403a7b 100644 --- a/fuzz-common.c +++ b/fuzz-common.c @@ -22,6 +22,8 @@ void fuzz_common_setup(void) { fuzz.input = m_malloc(sizeof(buffer)); _dropbear_log = fuzz_dropbear_log; crypto_init(); + /* let any messages get flushed */ + setlinebuf(stdout); } int fuzz_set_input(const uint8_t *Data, size_t Size) { -- cgit v1.2.3