Starting up the random number generator is by far the slowest part of
plink's startup, and randomness is bad for fuzzing, so disabling it
should make fuzzing more effective.
# show up as GPFs at the point of failure rather than appearing
# later on as second-level damage.
#
+# - XFLAGS=/DFUZZING
+# Builds a version of PuTTY with some tweaks to make fuzz testing
+# easier: the SSH random number generator is replaced by one that
+# always returns the same thing. Note that this makes SSH
+# completely insecure -- a FUZZING build should never be used to
+# connect to a real server.
!end
# ------------------------------------------------------------
int stir_pending;
};
-static struct RandPool pool;
int random_active = 0;
+
+#ifdef FUZZING
+/*
+ * Special dummy version of the RNG for use when fuzzing.
+ */
+void random_add_noise(void *noise, int length) { }
+void random_add_heavynoise(void *noise, int length) { }
+void random_ref(void) { }
+void random_unref(void) { }
+int random_byte(void)
+{
+ return 0x45; /* Chosen by eight fair coin tosses */
+}
+void random_get_savedata(void **data, int *len) { }
+#else /* !FUZZING */
+static struct RandPool pool;
long next_noise_collection;
#ifdef RANDOM_DIAGNOSTICS
*data = buf;
random_stir();
}
+#endif