#include "config.h" #define LIBSSH_STATIC #include "torture.h" #define DEBUG_BUFFER #include "buffer.c" #include #define LIMIT (8*1024*1024) static int setup(void **state) { ssh_buffer buffer; buffer = ssh_buffer_new(); if (buffer == NULL) { return -1; } ssh_buffer_set_secure(buffer); *state = (void *) buffer; return 0; } static int teardown(void **state) { SSH_BUFFER_FREE(*state); return 0; } /* * Test if the continuously growing buffer size never exceeds 2 time its * real capacity */ static void torture_growing_buffer(void **state) { ssh_buffer buffer = *state; int i; for(i=0;iused >= 128){ if(ssh_buffer_get_len(buffer) * 2 < buffer->allocated){ assert_true(ssh_buffer_get_len(buffer) * 2 >= buffer->allocated); } } } } /* * Test if the continuously growing buffer size never exceeds 2 time its * real capacity, when we remove 1 byte after each call (sliding window) */ static void torture_growing_buffer_shifting(void **state) { ssh_buffer buffer = *state; int i; unsigned char c; for(i=0; i<1024;++i){ ssh_buffer_add_data(buffer,"S",1); } for(i=0;iused >= 128){ if(ssh_buffer_get_len(buffer) * 4 < buffer->allocated){ assert_true(ssh_buffer_get_len(buffer) * 4 >= buffer->allocated); return; } } } } /* * Test the behavior of ssh_buffer_prepend_data */ static void torture_buffer_prepend(void **state) { ssh_buffer buffer = *state; uint32_t v; ssh_buffer_add_data(buffer,"abcdef",6); ssh_buffer_prepend_data(buffer,"xyz",3); assert_int_equal(ssh_buffer_get_len(buffer),9); assert_memory_equal(ssh_buffer_get(buffer), "xyzabcdef", 9); /* Now remove 4 bytes and see if we can replace them */ ssh_buffer_get_u32(buffer,&v); assert_int_equal(ssh_buffer_get_len(buffer),5); assert_memory_equal(ssh_buffer_get(buffer), "bcdef", 5); ssh_buffer_prepend_data(buffer,"aris",4); assert_int_equal(ssh_buffer_get_len(buffer),9); assert_memory_equal(ssh_buffer_get(buffer), "arisbcdef", 9); /* same thing but we add 5 bytes now */ ssh_buffer_get_u32(buffer,&v); assert_int_equal(ssh_buffer_get_len(buffer),5); assert_memory_equal(ssh_buffer_get(buffer), "bcdef", 5); ssh_buffer_prepend_data(buffer,"12345",5); assert_int_equal(ssh_buffer_get_len(buffer),10); assert_memory_equal(ssh_buffer_get(buffer), "12345bcdef", 10); } /* * Test the behavior of ssh_buffer_get_ssh_string with invalid data */ static void torture_ssh_buffer_get_ssh_string(void **state) { ssh_buffer buffer; int i,j,k,l, rc; /* some values that can go wrong */ uint32_t values[] = {0xffffffff, 0xfffffffe, 0xfffffffc, 0xffffff00, 0x80000000, 0x80000004, 0x7fffffff}; char data[128]; (void)state; memset(data,'X',sizeof(data)); for(i=0; i < (int)(sizeof(values)/sizeof(values[0]));++i){ for(j=0; j< (int)sizeof(data);++j){ for(k=1;k<5;++k){ buffer = ssh_buffer_new(); assert_non_null(buffer); for(l=0;lsecure); SSH_BUFFER_FREE(dup_buffer); /* test buffer with data */ rc = ssh_buffer_add_data(buffer, test_data, test_data_len); assert_int_equal(rc, SSH_OK); dup_buffer = ssh_buffer_dup(buffer); assert_non_null(dup_buffer); assert_int_equal(ssh_buffer_get_len(dup_buffer), test_data_len); assert_memory_equal(ssh_buffer_get(dup_buffer), test_data, test_data_len); assert_true(dup_buffer->secure); /* test independence of buffers - modify original buffer */ rc = ssh_buffer_add_data(buffer, " more data", 10); assert_int_equal(rc, SSH_OK); assert_int_equal(ssh_buffer_get_len(buffer), test_data_len + 10); assert_int_equal(ssh_buffer_get_len(dup_buffer), test_data_len); /* test independence of buffers - modify duplicated buffer */ rc = ssh_buffer_add_data(dup_buffer, " different", 10); assert_int_equal(rc, SSH_OK); assert_int_equal(ssh_buffer_get_len(dup_buffer), test_data_len + 10); assert_int_equal(ssh_buffer_get_len(buffer), test_data_len + 10); assert_memory_not_equal(ssh_buffer_get(buffer), ssh_buffer_get(dup_buffer), test_data_len + 10); SSH_BUFFER_FREE(dup_buffer); /* test duplicating non-secure buffer */ null_buffer = ssh_buffer_new(); assert_non_null(null_buffer); rc = ssh_buffer_add_data(null_buffer, "non-secure data", 15); assert_int_equal(rc, SSH_OK); dup_buffer = ssh_buffer_dup(null_buffer); assert_non_null(dup_buffer); assert_int_equal(ssh_buffer_get_len(dup_buffer), 15); assert_memory_equal(ssh_buffer_get(dup_buffer), "non-secure data", 15); assert_false(dup_buffer->secure); SSH_BUFFER_FREE(dup_buffer); SSH_BUFFER_FREE(null_buffer); } int torture_run_tests(void) { int rc; struct CMUnitTest tests[] = { cmocka_unit_test_setup_teardown(torture_growing_buffer, setup, teardown), cmocka_unit_test_setup_teardown(torture_growing_buffer_shifting, setup, teardown), cmocka_unit_test_setup_teardown(torture_buffer_prepend, setup, teardown), cmocka_unit_test(torture_ssh_buffer_get_ssh_string), cmocka_unit_test_setup_teardown(torture_ssh_buffer_add_format, setup, teardown), cmocka_unit_test_setup_teardown(torture_ssh_buffer_get_format, setup, teardown), cmocka_unit_test_setup_teardown(torture_ssh_buffer_get_format_error, setup, teardown), cmocka_unit_test_setup_teardown(torture_buffer_pack_badformat, setup, teardown), cmocka_unit_test(torture_ssh_buffer_bignum), cmocka_unit_test_setup_teardown(torture_ssh_buffer_dup, setup, teardown), }; ssh_init(); torture_filter_tests(tests); rc = cmocka_run_group_tests(tests, NULL, NULL); ssh_finalize(); return rc; }