diff options
author | iphydf <iphydf@users.noreply.github.com> | 2020-05-03 01:09:06 +0100 |
---|---|---|
committer | iphydf <iphydf@users.noreply.github.com> | 2020-05-03 14:13:48 +0000 |
commit | 88b90c82259f86470cf6eba8684e8d9b4cd61bc3 (patch) | |
tree | 90e052389ffacec791019a096837a670e205b225 /auto_tests | |
parent | 7b758f66dbc550fa52ed66fd7f8b81f8ed37a94e (diff) |
Fix a bug in savedata loading when malloc fails.
Also added a bunch of asserts to tests where they don't check allocs.
Diffstat (limited to 'auto_tests')
-rw-r--r-- | auto_tests/TCP_test.c | 1 | ||||
-rw-r--r-- | auto_tests/conference_invite_merge_test.c | 2 | ||||
-rw-r--r-- | auto_tests/conference_peer_nick_test.c | 1 | ||||
-rw-r--r-- | auto_tests/conference_test.c | 2 | ||||
-rw-r--r-- | auto_tests/encryptsave_test.c | 1 | ||||
-rw-r--r-- | auto_tests/file_saving_test.c | 8 |
6 files changed, 13 insertions, 2 deletions
diff --git a/auto_tests/TCP_test.c b/auto_tests/TCP_test.c index 9206e265..8a109317 100644 --- a/auto_tests/TCP_test.c +++ b/auto_tests/TCP_test.c | |||
@@ -185,6 +185,7 @@ struct sec_TCP_con { | |||
185 | static struct sec_TCP_con *new_TCP_con(TCP_Server *tcp_s, Mono_Time *mono_time) | 185 | static struct sec_TCP_con *new_TCP_con(TCP_Server *tcp_s, Mono_Time *mono_time) |
186 | { | 186 | { |
187 | struct sec_TCP_con *sec_c = (struct sec_TCP_con *)malloc(sizeof(struct sec_TCP_con)); | 187 | struct sec_TCP_con *sec_c = (struct sec_TCP_con *)malloc(sizeof(struct sec_TCP_con)); |
188 | ck_assert(sec_c != nullptr); | ||
188 | Socket sock = net_socket(net_family_ipv6, TOX_SOCK_STREAM, TOX_PROTO_TCP); | 189 | Socket sock = net_socket(net_family_ipv6, TOX_SOCK_STREAM, TOX_PROTO_TCP); |
189 | 190 | ||
190 | IP_Port ip_port_loopback; | 191 | IP_Port ip_port_loopback; |
diff --git a/auto_tests/conference_invite_merge_test.c b/auto_tests/conference_invite_merge_test.c index e7ec499c..21445525 100644 --- a/auto_tests/conference_invite_merge_test.c +++ b/auto_tests/conference_invite_merge_test.c | |||
@@ -91,9 +91,11 @@ static void reload(Tox **toxes, State *state, uint32_t n) | |||
91 | ck_assert(state[n].save_state != nullptr); | 91 | ck_assert(state[n].save_state != nullptr); |
92 | 92 | ||
93 | struct Tox_Options *const options = tox_options_new(nullptr); | 93 | struct Tox_Options *const options = tox_options_new(nullptr); |
94 | ck_assert(options != nullptr); | ||
94 | tox_options_set_savedata_type(options, TOX_SAVEDATA_TYPE_TOX_SAVE); | 95 | tox_options_set_savedata_type(options, TOX_SAVEDATA_TYPE_TOX_SAVE); |
95 | tox_options_set_savedata_data(options, state[n].save_state, state[n].save_size); | 96 | tox_options_set_savedata_data(options, state[n].save_state, state[n].save_size); |
96 | toxes[n] = tox_new_log(options, nullptr, &state[n].index); | 97 | toxes[n] = tox_new_log(options, nullptr, &state[n].index); |
98 | ck_assert(toxes[n] != nullptr); | ||
97 | tox_options_free(options); | 99 | tox_options_free(options); |
98 | 100 | ||
99 | set_mono_time_callback(toxes[n], &state[n]); | 101 | set_mono_time_callback(toxes[n], &state[n]); |
diff --git a/auto_tests/conference_peer_nick_test.c b/auto_tests/conference_peer_nick_test.c index 9d10a8a9..749f9098 100644 --- a/auto_tests/conference_peer_nick_test.c +++ b/auto_tests/conference_peer_nick_test.c | |||
@@ -68,6 +68,7 @@ static void rebuild_peer_list(Tox *tox) | |||
68 | "failed to get conference peer %u's name size (conference = %u): err = %d", peer_number, conference_number, err); | 68 | "failed to get conference peer %u's name size (conference = %u): err = %d", peer_number, conference_number, err); |
69 | 69 | ||
70 | uint8_t *const name = (uint8_t *)malloc(size); | 70 | uint8_t *const name = (uint8_t *)malloc(size); |
71 | ck_assert(name != nullptr); | ||
71 | tox_conference_peer_get_name(tox, conference_number, peer_number, name, &err); | 72 | tox_conference_peer_get_name(tox, conference_number, peer_number, name, &err); |
72 | ck_assert_msg(err == TOX_ERR_CONFERENCE_PEER_QUERY_OK, | 73 | ck_assert_msg(err == TOX_ERR_CONFERENCE_PEER_QUERY_OK, |
73 | "failed to get conference peer %u's name (conference = %u): err = %d", peer_number, conference_number, err); | 74 | "failed to get conference peer %u's name (conference = %u): err = %d", peer_number, conference_number, err); |
diff --git a/auto_tests/conference_test.c b/auto_tests/conference_test.c index ec88c82a..11a7bb06 100644 --- a/auto_tests/conference_test.c +++ b/auto_tests/conference_test.c | |||
@@ -250,9 +250,11 @@ static void run_conference_tests(Tox **toxes, State *state) | |||
250 | for (uint32_t i = 0; i < NUM_GROUP_TOX; ++i) { | 250 | for (uint32_t i = 0; i < NUM_GROUP_TOX; ++i) { |
251 | if (restarting[i]) { | 251 | if (restarting[i]) { |
252 | struct Tox_Options *const options = tox_options_new(nullptr); | 252 | struct Tox_Options *const options = tox_options_new(nullptr); |
253 | ck_assert(options != nullptr); | ||
253 | tox_options_set_savedata_type(options, TOX_SAVEDATA_TYPE_TOX_SAVE); | 254 | tox_options_set_savedata_type(options, TOX_SAVEDATA_TYPE_TOX_SAVE); |
254 | tox_options_set_savedata_data(options, save[i], save_size[i]); | 255 | tox_options_set_savedata_data(options, save[i], save_size[i]); |
255 | toxes[i] = tox_new_log(options, nullptr, &state[i].index); | 256 | toxes[i] = tox_new_log(options, nullptr, &state[i].index); |
257 | ck_assert(toxes[i] != nullptr); | ||
256 | tox_options_free(options); | 258 | tox_options_free(options); |
257 | free(save[i]); | 259 | free(save[i]); |
258 | 260 | ||
diff --git a/auto_tests/encryptsave_test.c b/auto_tests/encryptsave_test.c index 19574d16..ccb1ee88 100644 --- a/auto_tests/encryptsave_test.c +++ b/auto_tests/encryptsave_test.c | |||
@@ -76,6 +76,7 @@ static void test_save_friend(void) | |||
76 | ck_assert_msg(tox_is_data_encrypted(enc_data), "magic number missing"); | 76 | ck_assert_msg(tox_is_data_encrypted(enc_data), "magic number missing"); |
77 | 77 | ||
78 | struct Tox_Options *options = tox_options_new(nullptr); | 78 | struct Tox_Options *options = tox_options_new(nullptr); |
79 | ck_assert(options != nullptr); | ||
79 | tox_options_set_savedata_type(options, TOX_SAVEDATA_TYPE_TOX_SAVE); | 80 | tox_options_set_savedata_type(options, TOX_SAVEDATA_TYPE_TOX_SAVE); |
80 | tox_options_set_savedata_data(options, enc_data, size2); | 81 | tox_options_set_savedata_data(options, enc_data, size2); |
81 | 82 | ||
diff --git a/auto_tests/file_saving_test.c b/auto_tests/file_saving_test.c index 7faa6b20..cdcce95f 100644 --- a/auto_tests/file_saving_test.c +++ b/auto_tests/file_saving_test.c | |||
@@ -64,6 +64,7 @@ static void save_data_encrypted(void) | |||
64 | static void load_data_decrypted(void) | 64 | static void load_data_decrypted(void) |
65 | { | 65 | { |
66 | FILE *f = fopen(savefile, "r"); | 66 | FILE *f = fopen(savefile, "r"); |
67 | ck_assert(f != nullptr); | ||
67 | fseek(f, 0, SEEK_END); | 68 | fseek(f, 0, SEEK_END); |
68 | int64_t size = ftell(f); | 69 | int64_t size = ftell(f); |
69 | fseek(f, 0, SEEK_SET); | 70 | fseek(f, 0, SEEK_SET); |
@@ -71,7 +72,9 @@ static void load_data_decrypted(void) | |||
71 | ck_assert_msg(0 <= size && size <= UINT_MAX, "file size out of range"); | 72 | ck_assert_msg(0 <= size && size <= UINT_MAX, "file size out of range"); |
72 | 73 | ||
73 | uint8_t *cipher = (uint8_t *)malloc(size); | 74 | uint8_t *cipher = (uint8_t *)malloc(size); |
75 | ck_assert(cipher != nullptr); | ||
74 | uint8_t *clear = (uint8_t *)malloc(size - TOX_PASS_ENCRYPTION_EXTRA_LENGTH); | 76 | uint8_t *clear = (uint8_t *)malloc(size - TOX_PASS_ENCRYPTION_EXTRA_LENGTH); |
77 | ck_assert(clear != nullptr); | ||
75 | size_t read_value = fread(cipher, sizeof(*cipher), size, f); | 78 | size_t read_value = fread(cipher, sizeof(*cipher), size, f); |
76 | printf("Read read_value = %u of %u\n", (unsigned)read_value, (unsigned)size); | 79 | printf("Read read_value = %u of %u\n", (unsigned)read_value, (unsigned)size); |
77 | 80 | ||
@@ -81,6 +84,7 @@ static void load_data_decrypted(void) | |||
81 | "Could not decrypt, error code %d.", derr); | 84 | "Could not decrypt, error code %d.", derr); |
82 | 85 | ||
83 | struct Tox_Options *options = tox_options_new(nullptr); | 86 | struct Tox_Options *options = tox_options_new(nullptr); |
87 | ck_assert(options != nullptr); | ||
84 | 88 | ||
85 | tox_options_set_savedata_type(options, TOX_SAVEDATA_TYPE_TOX_SAVE); | 89 | tox_options_set_savedata_type(options, TOX_SAVEDATA_TYPE_TOX_SAVE); |
86 | 90 | ||
@@ -101,10 +105,10 @@ static void load_data_decrypted(void) | |||
101 | ck_assert_msg(strcmp((const char *)readname, name) == 0, | 105 | ck_assert_msg(strcmp((const char *)readname, name) == 0, |
102 | "name returned by tox_self_get_name does not match expected result"); | 106 | "name returned by tox_self_get_name does not match expected result"); |
103 | 107 | ||
104 | free(cipher); | 108 | tox_kill(t); |
105 | free(clear); | 109 | free(clear); |
110 | free(cipher); | ||
106 | fclose(f); | 111 | fclose(f); |
107 | tox_kill(t); | ||
108 | } | 112 | } |
109 | 113 | ||
110 | int main(void) | 114 | int main(void) |