root/crypto/openssh/regress/misc/fuzz-harness/agent_fuzz_helper.c
#include "fixed-keys.h"
#include <assert.h>

#define main(ac, av) xxxmain(ac, av)
#include "../../../ssh-agent.c"

void test_one(const uint8_t* s, size_t slen);

static int
devnull_or_die(void)
{
        int fd;

        if ((fd = open("/dev/null", O_RDWR)) == -1) {
                error_f("open /dev/null: %s", strerror(errno));
                abort();
        }
        return fd;
}

static struct sshkey *
pubkey_or_die(const char *s)
{
        char *tmp, *cp;
        struct sshkey *pubkey;
        int r;

        tmp = cp = xstrdup(s);
        if ((pubkey = sshkey_new(KEY_UNSPEC)) == NULL)
                abort();
        if ((r = sshkey_read(pubkey, &cp)) != 0) {
                error_fr(r, "parse");
                abort();
        }
        free(tmp);
        return pubkey;
}

static struct sshkey *
privkey_or_die(const char *s)
{
        int r;
        struct sshbuf *b;
        struct sshkey *privkey;

        if ((b = sshbuf_from(s, strlen(s))) == NULL) {
                error_f("sshbuf_from failed");
                abort();
        }
        if ((r = sshkey_parse_private_fileblob(b, "", &privkey, NULL)) != 0) {
                error_fr(r, "parse");
                abort();
        }
        sshbuf_free(b);
        return privkey;
}

static void
add_key(const char *privkey, const char *certpath)
{
        Identity *id;
        int r;
        struct sshkey *cert;

        id = xcalloc(1, sizeof(Identity));
        TAILQ_INSERT_TAIL(&idtab->idlist, id, next);
        idtab->nentries++;
        id->key = privkey_or_die(privkey);
        id->comment = xstrdup("rhododaktulos Eos");
        if (sshkey_is_sk(id->key))
                id->sk_provider = xstrdup("internal");

        /* Now the cert too */
        id = xcalloc(1, sizeof(Identity));
        TAILQ_INSERT_TAIL(&idtab->idlist, id, next);
        idtab->nentries++;
        id->key = privkey_or_die(privkey);
        cert = pubkey_or_die(certpath);
        if ((r = sshkey_to_certified(id->key)) != 0) {
                error_fr(r, "sshkey_to_certified");
                abort();
        }
        if ((r = sshkey_cert_copy(cert, id->key)) != 0) {
                error_fr(r, "sshkey_cert_copy");
                abort();
        }
        sshkey_free(cert);
        id->comment = xstrdup("outis");
        if (sshkey_is_sk(id->key))
                id->sk_provider = xstrdup("internal");
}

static void
cleanup_idtab(void)
{
        Identity *id;

        if (idtab == NULL) return;
        for (id = TAILQ_FIRST(&idtab->idlist); id;
            id = TAILQ_FIRST(&idtab->idlist)) {
                TAILQ_REMOVE(&idtab->idlist, id, next);
                free_identity(id);
        }
        free(idtab);
        idtab = NULL;
}

static void
reset_idtab(void)
{
        cleanup_idtab();
        idtab_init();
        // Load keys.
        add_key(PRIV_RSA, CERT_RSA);
        add_key(PRIV_ECDSA, CERT_ECDSA);
        add_key(PRIV_ED25519, CERT_ED25519);
        add_key(PRIV_ECDSA_SK, CERT_ECDSA_SK);
        add_key(PRIV_ED25519_SK, CERT_ED25519_SK);
}

static void
cleanup_sockettab(void)
{
        u_int i;
        for (i = 0; i < sockets_alloc; i++) {
                if (sockets[i].type != AUTH_UNUSED)
                        close_socket(sockets + i);
        }
        free(sockets);
        sockets = NULL;
        sockets_alloc = 0;
}

static void
reset_sockettab(int devnull)
{
        int fd;

        cleanup_sockettab();
        if ((fd = dup(devnull)) == -1) {
                error_f("dup: %s", strerror(errno));
                abort();
        }
        new_socket(AUTH_CONNECTION, fd);
        assert(sockets[0].type == AUTH_CONNECTION);
        assert(sockets[0].fd == fd);
}

#define MAX_MESSAGES 256
void
test_one(const uint8_t* s, size_t slen)
{
        static int devnull = -1;
        size_t i, olen, nlen;

        if (devnull == -1) {
                log_init(__progname, SYSLOG_LEVEL_DEBUG3,
                    SYSLOG_FACILITY_AUTH, 1);
                devnull = devnull_or_die();
                allowed_providers = xstrdup("");
                websafe_allowlist = xstrdup("*");
                setenv("DISPLAY", "", 1); /* ban askpass */
        }

        reset_idtab();
        reset_sockettab(devnull);
        (void)sshbuf_put(sockets[0].input, s, slen);
        for (i = 0; i < MAX_MESSAGES; i++) {
                olen = sshbuf_len(sockets[0].input);
                process_message(0);
                nlen = sshbuf_len(sockets[0].input);
                if (nlen == 0 || nlen == olen)
                        break;
        }
        cleanup_idtab();
        cleanup_sockettab();
}

int
pkcs11_make_cert(const struct sshkey *priv,
    const struct sshkey *certpub, struct sshkey **certprivp)
{
        return -1; /* XXX */
}