diff options
author | Dennis Jackson <djackson@mozilla.com> | 2023-05-05 09:16:15 +0000 |
---|---|---|
committer | Dennis Jackson <djackson@mozilla.com> | 2023-05-05 09:16:15 +0000 |
commit | caf041181aa300631acfe897a3e3e222c9632e53 (patch) | |
tree | ca1e12710d4c32aa625ce0f96b094678f08331da /gtests | |
parent | 4a4054b5586eb7f1f3bc01afe9aa93a69a582dbe (diff) | |
download | nss-hg-caf041181aa300631acfe897a3e3e222c9632e53.tar.gz |
Bug 1786018 - Add explicit handling of zero length records. r=mt
This is based on the patch developed by Leander in D157183, but is a
little more explicit.
Co-Authored-By: Leander Schwarz
Differential Revision: https://phabricator.services.mozilla.com/D176157
Diffstat (limited to 'gtests')
-rw-r--r-- | gtests/mozpkix_gtest/pkixder_input_tests.cpp | 46 |
1 files changed, 32 insertions, 14 deletions
diff --git a/gtests/mozpkix_gtest/pkixder_input_tests.cpp b/gtests/mozpkix_gtest/pkixder_input_tests.cpp index c66f06e6a..2667e32b5 100644 --- a/gtests/mozpkix_gtest/pkixder_input_tests.cpp +++ b/gtests/mozpkix_gtest/pkixder_input_tests.cpp @@ -246,14 +246,13 @@ TEST_F(pkixder_input_tests, ReadWordWithInsufficentData) ASSERT_NE(0x1122, readWord1); } -TEST_F(pkixder_input_tests, ReadWordWrapAroundPointer) +static void UNSANITIZED_ReadWordWrapAroundPointer() +#if defined(__clang__) + /* Use "undefined" instead of more specific "pointer-overflow" for + * clang 4.0.0 backward compatability. */ + __attribute__((no_sanitize("undefined"))) +#endif { - // The original implementation of our buffer read overflow checks was - // susceptible to integer overflows which could make the checks ineffective. - // This attempts to verify that we've fixed that. Unfortunately, decrementing - // a null pointer is undefined behavior according to the C++ language spec., - // but this should catch the problem on at least some compilers, if not all of - // them. const uint8_t* der = nullptr; --der; Input buf; @@ -263,6 +262,16 @@ TEST_F(pkixder_input_tests, ReadWordWrapAroundPointer) ASSERT_EQ(Result::ERROR_BAD_DER, input.Read(b)); } +TEST_F(pkixder_input_tests, ReadWordWrapAroundPointer) { + // The original implementation of our buffer read overflow checks was + // susceptible to integer overflows which could make the checks ineffective. + // This attempts to verify that we've fixed that. Unfortunately, decrementing + // a null pointer is undefined behavior according to the C++ language spec., + // but this should catch the problem on at least some compilers, if not all of + // them. + UNSANITIZED_ReadWordWrapAroundPointer(); +} + TEST_F(pkixder_input_tests, Skip) { const uint8_t der[] = { 0x11, 0x22, 0x33, 0x44 }; @@ -352,14 +361,13 @@ TEST_F(pkixder_input_tests, Skip_ToInput) ASSERT_TRUE(InputsAreEqual(expected, item)); } -TEST_F(pkixder_input_tests, Skip_WrapAroundPointer) +static void UNSANITIZED_Skip_WrapAroundPointer() +#if defined(__clang__) + /* Use "undefined" instead of more specific "pointer-overflow" for + * clang 4.0.0 backward compatability. */ + __attribute__((no_sanitize("undefined"))) +#endif { - // The original implementation of our buffer read overflow checks was - // susceptible to integer overflows which could make the checks ineffective. - // This attempts to verify that we've fixed that. Unfortunately, decrementing - // a null pointer is undefined behavior according to the C++ language spec., - // but this should catch the problem on at least some compilers, if not all of - // them. const uint8_t* der = nullptr; // coverity[FORWARD_NULL] --der; @@ -369,6 +377,16 @@ TEST_F(pkixder_input_tests, Skip_WrapAroundPointer) ASSERT_EQ(Result::ERROR_BAD_DER, input.Skip(1)); } +TEST_F(pkixder_input_tests, Skip_WrapAroundPointer) { + // The original implementation of our buffer read overflow checks was + // susceptible to integer overflows which could make the checks ineffective. + // This attempts to verify that we've fixed that. Unfortunately, decrementing + // a null pointer is undefined behavior according to the C++ language spec., + // but this should catch the problem on at least some compilers, if not all of + // them. + UNSANITIZED_Skip_WrapAroundPointer(); +} + TEST_F(pkixder_input_tests, Skip_ToInputPastEnd) { const uint8_t der[] = { 0x11, 0x22, 0x33, 0x44 }; |