diff options
Diffstat (limited to 'gtests')
-rw-r--r-- | gtests/mozpkix_gtest/pkixder_input_tests.cpp | 46 |
1 files changed, 32 insertions, 14 deletions
diff --git a/gtests/mozpkix_gtest/pkixder_input_tests.cpp b/gtests/mozpkix_gtest/pkixder_input_tests.cpp index c66f06e6a..2667e32b5 100644 --- a/gtests/mozpkix_gtest/pkixder_input_tests.cpp +++ b/gtests/mozpkix_gtest/pkixder_input_tests.cpp @@ -246,14 +246,13 @@ TEST_F(pkixder_input_tests, ReadWordWithInsufficentData) ASSERT_NE(0x1122, readWord1); } -TEST_F(pkixder_input_tests, ReadWordWrapAroundPointer) +static void UNSANITIZED_ReadWordWrapAroundPointer() +#if defined(__clang__) + /* Use "undefined" instead of more specific "pointer-overflow" for + * clang 4.0.0 backward compatability. */ + __attribute__((no_sanitize("undefined"))) +#endif { - // The original implementation of our buffer read overflow checks was - // susceptible to integer overflows which could make the checks ineffective. - // This attempts to verify that we've fixed that. Unfortunately, decrementing - // a null pointer is undefined behavior according to the C++ language spec., - // but this should catch the problem on at least some compilers, if not all of - // them. const uint8_t* der = nullptr; --der; Input buf; @@ -263,6 +262,16 @@ TEST_F(pkixder_input_tests, ReadWordWrapAroundPointer) ASSERT_EQ(Result::ERROR_BAD_DER, input.Read(b)); } +TEST_F(pkixder_input_tests, ReadWordWrapAroundPointer) { + // The original implementation of our buffer read overflow checks was + // susceptible to integer overflows which could make the checks ineffective. + // This attempts to verify that we've fixed that. Unfortunately, decrementing + // a null pointer is undefined behavior according to the C++ language spec., + // but this should catch the problem on at least some compilers, if not all of + // them. + UNSANITIZED_ReadWordWrapAroundPointer(); +} + TEST_F(pkixder_input_tests, Skip) { const uint8_t der[] = { 0x11, 0x22, 0x33, 0x44 }; @@ -352,14 +361,13 @@ TEST_F(pkixder_input_tests, Skip_ToInput) ASSERT_TRUE(InputsAreEqual(expected, item)); } -TEST_F(pkixder_input_tests, Skip_WrapAroundPointer) +static void UNSANITIZED_Skip_WrapAroundPointer() +#if defined(__clang__) + /* Use "undefined" instead of more specific "pointer-overflow" for + * clang 4.0.0 backward compatability. */ + __attribute__((no_sanitize("undefined"))) +#endif { - // The original implementation of our buffer read overflow checks was - // susceptible to integer overflows which could make the checks ineffective. - // This attempts to verify that we've fixed that. Unfortunately, decrementing - // a null pointer is undefined behavior according to the C++ language spec., - // but this should catch the problem on at least some compilers, if not all of - // them. const uint8_t* der = nullptr; // coverity[FORWARD_NULL] --der; @@ -369,6 +377,16 @@ TEST_F(pkixder_input_tests, Skip_WrapAroundPointer) ASSERT_EQ(Result::ERROR_BAD_DER, input.Skip(1)); } +TEST_F(pkixder_input_tests, Skip_WrapAroundPointer) { + // The original implementation of our buffer read overflow checks was + // susceptible to integer overflows which could make the checks ineffective. + // This attempts to verify that we've fixed that. Unfortunately, decrementing + // a null pointer is undefined behavior according to the C++ language spec., + // but this should catch the problem on at least some compilers, if not all of + // them. + UNSANITIZED_Skip_WrapAroundPointer(); +} + TEST_F(pkixder_input_tests, Skip_ToInputPastEnd) { const uint8_t der[] = { 0x11, 0x22, 0x33, 0x44 }; |