summaryrefslogtreecommitdiffstats
path: root/regress/usr.bin/ssh/unittests/sshkey/test_fuzz.c
diff options
context:
space:
mode:
authordjm <djm@openbsd.org>2017-04-30 23:33:48 +0000
committerdjm <djm@openbsd.org>2017-04-30 23:33:48 +0000
commitcb2472150f94eb1933496a34948bc8dca2d77bba (patch)
treeafd227dc1955a85fbca344be61d090614bd318a2 /regress/usr.bin/ssh/unittests/sshkey/test_fuzz.c
parentflense SSHv1 support from ssh-agent, considerably simplifying it (diff)
downloadwireguard-openbsd-cb2472150f94eb1933496a34948bc8dca2d77bba.tar.xz
wireguard-openbsd-cb2472150f94eb1933496a34948bc8dca2d77bba.zip
remove SSHv1 support from unit tests
Diffstat (limited to 'regress/usr.bin/ssh/unittests/sshkey/test_fuzz.c')
-rw-r--r--regress/usr.bin/ssh/unittests/sshkey/test_fuzz.c45
1 files changed, 1 insertions, 44 deletions
diff --git a/regress/usr.bin/ssh/unittests/sshkey/test_fuzz.c b/regress/usr.bin/ssh/unittests/sshkey/test_fuzz.c
index c86b7cc9935..91418d8bab1 100644
--- a/regress/usr.bin/ssh/unittests/sshkey/test_fuzz.c
+++ b/regress/usr.bin/ssh/unittests/sshkey/test_fuzz.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: test_fuzz.c,v 1.6 2015/12/07 02:20:46 djm Exp $ */
+/* $OpenBSD: test_fuzz.c,v 1.7 2017/04/30 23:33:48 djm Exp $ */
/*
* Fuzz tests for key parsing
*
@@ -98,49 +98,6 @@ sshkey_fuzz_tests(void)
struct fuzz *fuzz;
int r;
-#ifdef WITH_SSH1
- TEST_START("fuzz RSA1 private");
- buf = load_file("rsa1_1");
- fuzz = fuzz_begin(FUZZ_1_BIT_FLIP | FUZZ_1_BYTE_FLIP |
- FUZZ_TRUNCATE_START | FUZZ_TRUNCATE_END,
- sshbuf_mutable_ptr(buf), sshbuf_len(buf));
- ASSERT_INT_EQ(sshkey_parse_private_fileblob(buf, "", &k1, NULL), 0);
- sshkey_free(k1);
- sshbuf_free(buf);
- ASSERT_PTR_NE(fuzzed = sshbuf_new(), NULL);
- TEST_ONERROR(onerror, fuzz);
- for(; !fuzz_done(fuzz); fuzz_next(fuzz)) {
- r = sshbuf_put(fuzzed, fuzz_ptr(fuzz), fuzz_len(fuzz));
- ASSERT_INT_EQ(r, 0);
- if (sshkey_parse_private_fileblob(fuzzed, "", &k1, NULL) == 0)
- sshkey_free(k1);
- sshbuf_reset(fuzzed);
- }
- sshbuf_free(fuzzed);
- fuzz_cleanup(fuzz);
- TEST_DONE();
-
- TEST_START("fuzz RSA1 public");
- buf = load_file("rsa1_1_pw");
- fuzz = fuzz_begin(FUZZ_1_BIT_FLIP | FUZZ_1_BYTE_FLIP |
- FUZZ_TRUNCATE_START | FUZZ_TRUNCATE_END,
- sshbuf_mutable_ptr(buf), sshbuf_len(buf));
- ASSERT_INT_EQ(sshkey_parse_public_rsa1_fileblob(buf, &k1, NULL), 0);
- sshkey_free(k1);
- sshbuf_free(buf);
- ASSERT_PTR_NE(fuzzed = sshbuf_new(), NULL);
- TEST_ONERROR(onerror, fuzz);
- for(; !fuzz_done(fuzz); fuzz_next(fuzz)) {
- r = sshbuf_put(fuzzed, fuzz_ptr(fuzz), fuzz_len(fuzz));
- ASSERT_INT_EQ(r, 0);
- if (sshkey_parse_public_rsa1_fileblob(fuzzed, &k1, NULL) == 0)
- sshkey_free(k1);
- sshbuf_reset(fuzzed);
- }
- sshbuf_free(fuzzed);
- fuzz_cleanup(fuzz);
- TEST_DONE();
-#endif
TEST_START("fuzz RSA private");
buf = load_file("rsa_1");