check_memory.c 6.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209
  1. #define _XOPEN_SOURCE 500
  2. #include <stdio.h>
  3. #include <stdlib.h>
  4. #include "ua_types.h"
  5. #include "ua_types_generated.h"
  6. #include "ua_types_encoding_binary.h"
  7. #include "ua_util.h"
  8. #include "check.h"
  9. START_TEST(newAndEmptyObjectShallBeDeleted) {
  10. // given
  11. void *obj = UA_new(&UA_TYPES[_i]);
  12. // then
  13. ck_assert_ptr_ne(obj, NULL);
  14. // finally
  15. UA_delete(obj, &UA_TYPES[_i]);
  16. }
  17. END_TEST
  18. START_TEST(arrayCopyShallMakeADeepCopy) {
  19. // given
  20. UA_String a1[3];
  21. a1[0] = (UA_String){1, (UA_Byte*)"a"};
  22. a1[1] = (UA_String){2, (UA_Byte*)"bb"};
  23. a1[2] = (UA_String){3, (UA_Byte*)"ccc"};
  24. // when
  25. UA_String *a2;
  26. UA_Int32 retval = UA_Array_copy((const void *)a1, 3, (void **)&a2, &UA_TYPES[UA_TYPES_STRING]);
  27. // then
  28. ck_assert_int_eq(retval, UA_STATUSCODE_GOOD);
  29. ck_assert_int_eq(a1[0].length, 1);
  30. ck_assert_int_eq(a1[1].length, 2);
  31. ck_assert_int_eq(a1[2].length, 3);
  32. ck_assert_int_eq(a1[0].length, a2[0].length);
  33. ck_assert_int_eq(a1[1].length, a2[1].length);
  34. ck_assert_int_eq(a1[2].length, a2[2].length);
  35. ck_assert_ptr_ne(a1[0].data, a2[0].data);
  36. ck_assert_ptr_ne(a1[1].data, a2[1].data);
  37. ck_assert_ptr_ne(a1[2].data, a2[2].data);
  38. ck_assert_int_eq(a1[0].data[0], a2[0].data[0]);
  39. ck_assert_int_eq(a1[1].data[0], a2[1].data[0]);
  40. ck_assert_int_eq(a1[2].data[0], a2[2].data[0]);
  41. // finally
  42. UA_Array_delete((void *)a2, 3, &UA_TYPES[UA_TYPES_STRING]);
  43. }
  44. END_TEST
  45. START_TEST(encodeShallYieldDecode) {
  46. // given
  47. UA_ByteString msg1, msg2;
  48. size_t pos = 0;
  49. void *obj1 = UA_new(&UA_TYPES[_i]);
  50. msg1 = UA_ByteString_withSize(65000); // fixed buf size
  51. UA_StatusCode retval = UA_encodeBinary(obj1, &UA_TYPES[_i], &msg1, &pos);
  52. msg1.length = pos;
  53. if(retval != UA_STATUSCODE_GOOD) {
  54. UA_delete(obj1, &UA_TYPES[_i]);
  55. UA_ByteString_deleteMembers(&msg1);
  56. return;
  57. }
  58. // when
  59. void *obj2 = UA_new(&UA_TYPES[_i]);
  60. pos = 0; retval = UA_decodeBinary(&msg1, &pos, obj2, &UA_TYPES[_i]);
  61. ck_assert_msg(retval == UA_STATUSCODE_GOOD, "could not decode idx=%d,nodeid=%i", _i, UA_TYPES[_i].typeId.identifier.numeric);
  62. ck_assert_msg(!memcmp(obj1, obj2, UA_TYPES[_i].memSize), "Decoded structure is not bit-identical idx=%d,nodeid=%i", _i, UA_TYPES[_i].typeId.identifier.numeric);
  63. assert(!memcmp(obj1, obj2, UA_TYPES[_i].memSize));
  64. msg2 = UA_ByteString_withSize(65000);
  65. pos = 0; retval = UA_encodeBinary(obj2, &UA_TYPES[_i], &msg2, &pos);
  66. msg2.length = pos;
  67. ck_assert_int_eq(retval, UA_STATUSCODE_GOOD);
  68. // then
  69. ck_assert_msg(UA_ByteString_equal(&msg1, &msg2) == UA_TRUE, "messages differ idx=%d,nodeid=%i", _i,
  70. UA_TYPES[_i].typeId.identifier.numeric);
  71. // finally
  72. UA_delete(obj1, &UA_TYPES[_i]);
  73. UA_delete(obj2, &UA_TYPES[_i]);
  74. UA_ByteString_deleteMembers(&msg1);
  75. UA_ByteString_deleteMembers(&msg2);
  76. }
  77. END_TEST
  78. START_TEST(decodeShallFailWithTruncatedBufferButSurvive) {
  79. // given
  80. UA_ByteString msg1;
  81. void *obj1 = UA_new(&UA_TYPES[_i]);
  82. size_t pos = 0;
  83. msg1 = UA_ByteString_withSize(65000); // fixed buf size
  84. UA_StatusCode retval = UA_encodeBinary(obj1, &UA_TYPES[_i], &msg1, &pos);
  85. UA_delete(obj1, &UA_TYPES[_i]);
  86. if(retval != UA_STATUSCODE_GOOD) {
  87. UA_ByteString_deleteMembers(&msg1);
  88. return; // e.g. variants cannot be encoded after an init without failing (no datatype set)
  89. }
  90. // when
  91. void *obj2 = UA_new(&UA_TYPES[_i]);
  92. pos = 0;
  93. msg1.length = pos / 2;
  94. //fprintf(stderr,"testing %s with half buffer\n",UA_TYPES[_i].name);
  95. retval = UA_decodeBinary(&msg1, &pos, obj2, &UA_TYPES[_i]);
  96. ck_assert_int_ne(retval, UA_STATUSCODE_GOOD);
  97. //then
  98. // finally
  99. //fprintf(stderr,"delete %s with half buffer\n",UA_TYPES[_i].name);
  100. UA_delete(obj2, &UA_TYPES[_i]);
  101. UA_ByteString_deleteMembers(&msg1);
  102. }
  103. END_TEST
  104. #define RANDOM_TESTS 1000
  105. START_TEST(decodeScalarBasicTypeFromRandomBufferShallSucceed) {
  106. // given
  107. void *obj1 = NULL;
  108. UA_ByteString msg1;
  109. UA_Int32 retval = UA_STATUSCODE_GOOD;
  110. UA_Int32 buflen = 256;
  111. msg1 = UA_ByteString_withSize(buflen); // fixed size
  112. #ifdef _WIN32
  113. srand(42);
  114. #else
  115. srandom(42);
  116. #endif
  117. for(int n = 0;n < RANDOM_TESTS;n++) {
  118. for(UA_Int32 i = 0;i < buflen;i++) {
  119. #ifdef _WIN32
  120. UA_UInt32 rnd;
  121. rnd = rand();
  122. msg1.data[i] = rnd;
  123. #else
  124. msg1.data[i] = (UA_Byte)random(); // when
  125. #endif
  126. }
  127. size_t pos = 0;
  128. obj1 = UA_new(&UA_TYPES[_i]);
  129. retval |= UA_decodeBinary(&msg1, &pos, obj1, &UA_TYPES[_i]);
  130. //then
  131. ck_assert_msg(retval == UA_STATUSCODE_GOOD, "Decoding %d from random buffer", UA_TYPES[_i].typeId.identifier.numeric);
  132. // finally
  133. UA_delete(obj1, &UA_TYPES[_i]);
  134. }
  135. UA_ByteString_deleteMembers(&msg1);
  136. }
  137. END_TEST
  138. START_TEST(decodeComplexTypeFromRandomBufferShallSurvive) {
  139. // given
  140. UA_ByteString msg1;
  141. UA_Int32 retval = UA_STATUSCODE_GOOD;
  142. UA_Int32 buflen = 256;
  143. msg1 = UA_ByteString_withSize(buflen); // fixed size
  144. #ifdef _WIN32
  145. srand(42);
  146. #else
  147. srandom(42);
  148. #endif
  149. // when
  150. for(int n = 0;n < RANDOM_TESTS;n++) {
  151. for(UA_Int32 i = 0;i < buflen;i++) {
  152. #ifdef _WIN32
  153. UA_UInt32 rnd;
  154. rnd = rand();
  155. msg1.data[i] = rnd;
  156. #else
  157. msg1.data[i] = (UA_Byte)random(); // when
  158. #endif
  159. }
  160. size_t pos = 0;
  161. void *obj1 = UA_new(&UA_TYPES[_i]);
  162. retval |= UA_decodeBinary(&msg1, &pos, obj1, &UA_TYPES[_i]);
  163. UA_delete(obj1, &UA_TYPES[_i]);
  164. }
  165. // finally
  166. UA_ByteString_deleteMembers(&msg1);
  167. }
  168. END_TEST
  169. int main(void) {
  170. int number_failed = 0;
  171. SRunner *sr;
  172. Suite *s = suite_create("testMemoryHandling");
  173. TCase *tc = tcase_create("Empty Objects");
  174. tcase_add_loop_test(tc, newAndEmptyObjectShallBeDeleted, UA_TYPES_BOOLEAN, UA_TYPES_COUNT - 1);
  175. tcase_add_test(tc, arrayCopyShallMakeADeepCopy);
  176. tcase_add_loop_test(tc, encodeShallYieldDecode, UA_TYPES_BOOLEAN, UA_TYPES_COUNT - 1);
  177. suite_add_tcase(s, tc);
  178. tc = tcase_create("Truncated Buffers");
  179. tcase_add_loop_test(tc, decodeShallFailWithTruncatedBufferButSurvive, UA_TYPES_BOOLEAN, UA_TYPES_COUNT - 1);
  180. suite_add_tcase(s, tc);
  181. tc = tcase_create("Fuzzing with Random Buffers");
  182. tcase_add_loop_test(tc, decodeScalarBasicTypeFromRandomBufferShallSucceed, UA_TYPES_BOOLEAN, UA_TYPES_DOUBLE);
  183. tcase_add_loop_test(tc, decodeComplexTypeFromRandomBufferShallSurvive, UA_TYPES_NODEID, UA_TYPES_COUNT - 1);
  184. suite_add_tcase(s, tc);
  185. sr = srunner_create(s);
  186. srunner_set_fork_status(sr, CK_NOFORK);
  187. srunner_run_all (sr, CK_NORMAL);
  188. number_failed += srunner_ntests_failed(sr);
  189. srunner_free(sr);
  190. return (number_failed == 0) ? EXIT_SUCCESS : EXIT_FAILURE;
  191. }