check_memory.c 5.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201
  1. #define _XOPEN_SOURCE 500
  2. #include <stdio.h>
  3. #include <stdlib.h>
  4. #include "ua_types.h"
  5. #include "ua_types_generated.h"
  6. #include "ua_types_encoding_binary.h"
  7. #include "ua_util.h"
  8. #include "check.h"
  9. START_TEST(newAndEmptyObjectShallBeDeleted) {
  10. // given
  11. void *obj = UA_new(&UA_TYPES[_i]);
  12. // then
  13. ck_assert_ptr_ne(obj, UA_NULL);
  14. // finally
  15. UA_delete(obj, &UA_TYPES[_i]);
  16. }
  17. END_TEST
  18. START_TEST(arrayCopyShallMakeADeepCopy) {
  19. // given
  20. UA_String a1[3];
  21. a1[0] = (UA_String){1, (UA_Byte*)"a"};
  22. a1[1] = (UA_String){2, (UA_Byte*)"bb"};
  23. a1[2] = (UA_String){3, (UA_Byte*)"ccc"};
  24. // when
  25. UA_String *a2;
  26. UA_Int32 retval = UA_Array_copy((const void *)a1, 3, (void **)&a2, &UA_TYPES[UA_TYPES_STRING]);
  27. // then
  28. ck_assert_int_eq(retval, UA_STATUSCODE_GOOD);
  29. ck_assert_int_eq(a1[0].length, 1);
  30. ck_assert_int_eq(a1[1].length, 2);
  31. ck_assert_int_eq(a1[2].length, 3);
  32. ck_assert_int_eq(a1[0].length, a2[0].length);
  33. ck_assert_int_eq(a1[1].length, a2[1].length);
  34. ck_assert_int_eq(a1[2].length, a2[2].length);
  35. ck_assert_ptr_ne(a1[0].data, a2[0].data);
  36. ck_assert_ptr_ne(a1[1].data, a2[1].data);
  37. ck_assert_ptr_ne(a1[2].data, a2[2].data);
  38. ck_assert_int_eq(a1[0].data[0], a2[0].data[0]);
  39. ck_assert_int_eq(a1[1].data[0], a2[1].data[0]);
  40. ck_assert_int_eq(a1[2].data[0], a2[2].data[0]);
  41. // finally
  42. UA_Array_delete((void *)a2, 3, &UA_TYPES[UA_TYPES_STRING]);
  43. }
  44. END_TEST
  45. START_TEST(encodeShallYieldDecode) {
  46. // given
  47. UA_ByteString msg1, msg2;
  48. UA_UInt32 pos = 0;
  49. void *obj1 = UA_new(&UA_TYPES[_i]);
  50. UA_ByteString_newMembers(&msg1, UA_calcSizeBinary(obj1, &UA_TYPES[_i]));
  51. UA_StatusCode retval = UA_encodeBinary(obj1, &UA_TYPES[_i], &msg1, &pos);
  52. if(retval != UA_STATUSCODE_GOOD) {
  53. // this happens, e.g. when we encode a variant (with UA_TYPES[UA_INVALIDTYPE] in the vtable)
  54. UA_delete(obj1, &UA_TYPES[_i]);
  55. UA_ByteString_deleteMembers(&msg1);
  56. return;
  57. }
  58. // when
  59. void *obj2 = UA_new(&UA_TYPES[_i]);
  60. pos = 0; retval = UA_decodeBinary(&msg1, &pos, obj2, &UA_TYPES[_i]);
  61. ck_assert_msg(retval == UA_STATUSCODE_GOOD, "messages differ idx=%d,nodeid=%i", _i, UA_TYPES_IDS[_i]);
  62. retval = UA_ByteString_newMembers(&msg2, UA_calcSizeBinary(obj2, &UA_TYPES[_i]));
  63. ck_assert_int_eq(retval, UA_STATUSCODE_GOOD);
  64. pos = 0; retval = UA_encodeBinary(obj2, &UA_TYPES[_i], &msg2, &pos);
  65. ck_assert_int_eq(retval, UA_STATUSCODE_GOOD);
  66. // then
  67. ck_assert_msg(UA_ByteString_equal(&msg1, &msg2) == UA_TRUE, "messages differ idx=%d,nodeid=%i", _i, UA_TYPES_IDS[_i]);
  68. // finally
  69. UA_delete(obj1, &UA_TYPES[_i]);
  70. UA_delete(obj2, &UA_TYPES[_i]);
  71. UA_ByteString_deleteMembers(&msg1);
  72. UA_ByteString_deleteMembers(&msg2);
  73. }
  74. END_TEST
  75. START_TEST(decodeShallFailWithTruncatedBufferButSurvive) {
  76. // given
  77. UA_ByteString msg1;
  78. UA_UInt32 pos;
  79. void *obj1 = UA_new(&UA_TYPES[_i]);
  80. UA_ByteString_newMembers(&msg1, UA_calcSizeBinary(obj1, &UA_TYPES[_i]));
  81. pos = 0; UA_encodeBinary(obj1, &UA_TYPES[_i], &msg1, &pos);
  82. UA_delete(obj1, &UA_TYPES[_i]);
  83. // when
  84. void *obj2 = UA_new(&UA_TYPES[_i]);
  85. pos = 0;
  86. msg1.length = msg1.length / 2;
  87. //fprintf(stderr,"testing %s with half buffer\n",UA_TYPES[_i].name);
  88. UA_decodeBinary(&msg1, &pos, obj2, &UA_TYPES[_i]);
  89. //then
  90. // finally
  91. //fprintf(stderr,"delete %s with half buffer\n",UA_TYPES[_i].name);
  92. UA_delete(obj2, &UA_TYPES[_i]);
  93. UA_ByteString_deleteMembers(&msg1);
  94. }
  95. END_TEST
  96. #define RANDOM_TESTS 1000
  97. START_TEST(decodeScalarBasicTypeFromRandomBufferShallSucceed) {
  98. // given
  99. void *obj1 = UA_NULL;
  100. UA_ByteString msg1;
  101. UA_Int32 retval = UA_STATUSCODE_GOOD;
  102. UA_Int32 buflen = 256;
  103. UA_ByteString_newMembers(&msg1, buflen); // fixed size
  104. #ifdef _WIN32
  105. srand(42);
  106. #else
  107. srandom(42);
  108. #endif
  109. for(int n = 0;n < RANDOM_TESTS;n++) {
  110. for(UA_Int32 i = 0;i < buflen;i++) {
  111. #ifdef _WIN32
  112. UA_UInt32 rnd;
  113. rnd = rand();
  114. msg1.data[i] = rnd;
  115. #else
  116. msg1.data[i] = (UA_Byte)random(); // when
  117. #endif
  118. }
  119. UA_UInt32 pos = 0;
  120. obj1 = UA_new(&UA_TYPES[_i]);
  121. retval |= UA_decodeBinary(&msg1, &pos, obj1, &UA_TYPES[_i]);
  122. //then
  123. ck_assert_msg(retval == UA_STATUSCODE_GOOD, "Decoding %d from random buffer", UA_TYPES_IDS[_i]);
  124. // finally
  125. UA_delete(obj1, &UA_TYPES[_i]);
  126. }
  127. UA_ByteString_deleteMembers(&msg1);
  128. }
  129. END_TEST
  130. START_TEST(decodeComplexTypeFromRandomBufferShallSurvive) {
  131. // given
  132. UA_ByteString msg1;
  133. UA_Int32 retval = UA_STATUSCODE_GOOD;
  134. UA_Int32 buflen = 256;
  135. UA_ByteString_newMembers(&msg1, buflen); // fixed size
  136. #ifdef _WIN32
  137. srand(42);
  138. #else
  139. srandom(42);
  140. #endif
  141. // when
  142. for(int n = 0;n < RANDOM_TESTS;n++) {
  143. for(UA_Int32 i = 0;i < buflen;i++) {
  144. #ifdef _WIN32
  145. UA_UInt32 rnd;
  146. rnd = rand();
  147. msg1.data[i] = rnd;
  148. #else
  149. msg1.data[i] = (UA_Byte)random(); // when
  150. #endif
  151. }
  152. UA_UInt32 pos = 0;
  153. void *obj1 = UA_new(&UA_TYPES[_i]);
  154. retval |= UA_decodeBinary(&msg1, &pos, obj1, &UA_TYPES[_i]);
  155. UA_delete(obj1, &UA_TYPES[_i]);
  156. }
  157. // finally
  158. UA_ByteString_deleteMembers(&msg1);
  159. }
  160. END_TEST
  161. int main(void) {
  162. int number_failed = 0;
  163. SRunner *sr;
  164. Suite *s = suite_create("testMemoryHandling");
  165. TCase *tc = tcase_create("Empty Objects");
  166. tcase_add_loop_test(tc, newAndEmptyObjectShallBeDeleted, UA_TYPES_BOOLEAN, UA_TYPES_EVENTNOTIFICATIONLIST);
  167. tcase_add_test(tc, arrayCopyShallMakeADeepCopy);
  168. tcase_add_loop_test(tc, encodeShallYieldDecode, UA_TYPES_BOOLEAN, UA_TYPES_EVENTNOTIFICATIONLIST);
  169. suite_add_tcase(s, tc);
  170. tc = tcase_create("Truncated Buffers");
  171. tcase_add_loop_test(tc, decodeShallFailWithTruncatedBufferButSurvive, UA_TYPES_BOOLEAN, UA_TYPES_EVENTNOTIFICATIONLIST);
  172. suite_add_tcase(s, tc);
  173. tc = tcase_create("Fuzzing with Random Buffers");
  174. tcase_add_loop_test(tc, decodeScalarBasicTypeFromRandomBufferShallSucceed, UA_TYPES_BOOLEAN, UA_TYPES_GUID);
  175. tcase_add_loop_test(tc, decodeComplexTypeFromRandomBufferShallSurvive, UA_TYPES_NODEID, UA_TYPES_EVENTNOTIFICATIONLIST);
  176. suite_add_tcase(s, tc);
  177. sr = srunner_create(s);
  178. //srunner_set_fork_status(sr, CK_NOFORK);
  179. srunner_run_all (sr, CK_NORMAL);
  180. number_failed += srunner_ntests_failed(sr);
  181. srunner_free(sr);
  182. return (number_failed == 0) ? EXIT_SUCCESS : EXIT_FAILURE;
  183. }