6d073f2746
fuzz: Avoid the server fuzzer to proceed to the authentication and further
...
Thanks Phil Turnbull from GitHub
Signed-off-by: Jakub Jelen <jjelen@redhat.com >
Reviewed-by: Norbert Pocs <npocs@redhat.com >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2023-04-28 11:35:49 +02:00
bff436695b
Fix various spelling issues reported by codespell
...
Signed-off-by: Jakub Jelen <jjelen@redhat.com >
Reviewed-by: Anderson Toshiyuki Sasaki <ansasaki@redhat.com >
(cherry picked from commit 97c9ac2f58
)
2022-11-18 16:18:44 +01:00
f97ff7c2e8
fuzz: Provide host and ssh dir for the fuzzer
...
Signed-off-by: Jakub Jelen <jjelen@redhat.com >
Reviewed-by: Anderson Toshiyuki Sasaki <ansasaki@redhat.com >
2022-02-15 11:34:11 +01:00
44665f33a4
fuzz: Add a testcase for each fuzzer with a corpus
...
Signed-off-by: Jakub Jelen <jjelen@redhat.com >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2022-02-10 11:21:19 +01:00
2e68cfbf40
fuzz: Add known_hosts file fuzzer
...
Signed-off-by: Jakub Jelen <jjelen@redhat.com >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2022-02-10 11:21:19 +01:00
314c57d414
fuzz: Get rid of cpp mess in fuzzers
...
Signed-off-by: Jakub Jelen <jjelen@redhat.com >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2022-02-08 19:13:45 +01:00
0aa3b4ee81
tests: Introduce bind configuration fuzzer
...
Signed-off-by: Jakub Jelen <jjelen@redhat.com >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2021-11-10 10:12:56 +01:00
ce26b56e13
client configuration fuzzing and fixes
...
Signed-off-by: Stanislav Zidek <szidek@redhat.com >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
Reviewed-by: Jakub Jelen <jjelen@redhat.com >
2021-11-02 11:33:26 +01:00
455a161ed7
fuzz: Extend readme for reproducing and debugging tips
...
Signed-off-by: Jakub Jelen <jjelen@redhat.com >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2020-12-08 14:54:25 +01:00
4149cebd64
fuzz: Avoid warnings from csbuild in fuzzers
...
Signed-off-by: Jakub Jelen <jjelen@redhat.com >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2020-05-05 14:29:16 +02:00
425c02cb94
fuzz: Add instructions for corpus creation and first corpus files
...
Signed-off-by: Jakub Jelen <jjelen@redhat.com >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2020-05-05 14:29:13 +02:00
ad8dedd4a4
fuzz: Allow to increase log level from server fuzzer
...
Signed-off-by: Jakub Jelen <jjelen@redhat.com >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2020-05-05 14:23:06 +02:00
e26e98e59f
fuzz: Do not parse configuration files
...
Signed-off-by: Jakub Jelen <jjelen@redhat.com >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2020-05-05 14:23:06 +02:00
ae184db913
fuzz: Use none cipher and MAC
...
Signed-off-by: Jakub Jelen <jjelen@redhat.com >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2020-05-05 14:23:06 +02:00
62a0229f16
fuzz: Simplify definition of fuzzing targets and build them also with gcc
...
Signed-off-by: Jakub Jelen <jjelen@redhat.com >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2020-05-05 14:23:06 +02:00
5411e0821f
fuzz: Correctly sort members initialization to prevent GCC warnings
...
tests/fuzz/ssh_client_fuzzer.cpp:45:1: error: designator order for field ‘ssh_callbacks_struct::userdata’ does not match declaration order in ‘ssh_callbacks_struct’
Signed-off-by: Jakub Jelen <jjelen@redhat.com >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2020-05-05 14:23:06 +02:00
8c36a865f2
cmake: Rename static library
...
This is only compiled for tests and fuzzers!
Signed-off-by: Andreas Schneider <asn@cryptomilk.org >
Reviewed-by: Anderson Toshiyuki Sasaki <ansasaki@redhat.com >
2019-11-07 14:01:01 +01:00
a5cad4e700
tests: Do not use internal macros in the fuzzer
...
It should be buildable without internal headers.
Signed-off-by: Andreas Schneider <asn@cryptomilk.org >
Reviewed-by: Jakub Jelen <jjelen@redhat.com >
2019-07-09 09:31:12 +02:00
85951a156b
tests: Add ssh_client_fuzzer
...
Signed-off-by: Andreas Schneider <asn@cryptomilk.org >
Reviewed-by: Jakub Jelen <jjelen@redhat.com >
2019-07-08 14:58:59 +02:00
343c90ccf4
ctest: Run the ssh_server_fuzzer to check it works
...
Signed-off-by: Andreas Schneider <asn@cryptomilk.org >
Reviewed-by: Jakub Jelen <jjelen@redhat.com >
2019-07-08 12:02:19 +02:00
7cd66d49f8
tests: Fix memory leak in ssh_server_fuzzer
...
Signed-off-by: Andreas Schneider <asn@cryptomilk.org >
Reviewed-by: Jakub Jelen <jjelen@redhat.com >
2019-07-08 12:02:19 +02:00
b2c7e0dd69
cmake: We don't have to define the ssh link libraries
...
Signed-off-by: Andreas Schneider <asn@cryptomilk.org >
Reviewed-by: Jakub Jelen <jjelen@redhat.com >
2019-07-08 12:02:19 +02:00
519074f13e
tests: Improve fuzzer test
...
Signed-off-by: Andreas Schneider <asn@cryptomilk.org >
Reviewed-by: Anderson Toshiyuki Sasaki <ansasaki@redhat.com >
2019-07-04 11:56:04 +02:00
5a50fc6b0d
cmake: Fix building the ssh_server_fuzzer
...
Signed-off-by: Andreas Schneider <asn@cryptomilk.org >
Reviewed-by: Anderson Toshiyuki Sasaki <ansasaki@redhat.com >
2019-07-04 11:56:04 +02:00
83b43443e5
threads: Automatically call ssh_init on load
...
This makes unnecessary to call ssh_init() when the library is
dynamically loaded. Also removes the threads shared library. The used
threads implementation is chosen in configuration time, changing the
ssh_threads_get_default() depending on the available threads library.
Internally, it is expected a threads implementation providing:
- void ssh_mutex_lock(void **mutex);
- void ssh_mutex_unlock(void **mutex);
- struct ssh_threads_callbacks_struct *ssh_threads_get_default(void);
and a crypto implementation providing:
- int crypto_thread_init(struct ssh_threads_callbacks_struct *user_callbacks);
- void crypto_thread_finalize(void);
This adds internal threads implementation for pthreads and noop.
Signed-off-by: Anderson Toshiyuki Sasaki <ansasaki@redhat.com >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2018-08-03 16:43:03 +02:00
6026fc8036
cmake: Fix libfuzzer linking with clang6
...
This is always available using -fsanitize=fuzzer now.
Signed-off-by: Andreas Schneider <asn@cryptomilk.org >
2018-04-10 11:13:57 +02:00
25ff1214a4
cmake: Build ssh_server_fuzzer if enabled
...
Fixes T67
Signed-off-by: Andreas Schneider <asn@cryptomilk.org >
2018-02-04 11:52:45 +01:00
d84b0926f0
tests: Added a fuzzer for the server
...
Fixes T67
Signed-off-by: Alex Gaynor <alex.gaynor@gmail.com >
2018-02-04 11:51:58 +01:00