summaryrefslogtreecommitdiff
path: root/auto_tests
diff options
context:
space:
mode:
authoriphydf <iphydf@users.noreply.github.com>2020-05-03 01:09:06 +0100
committeriphydf <iphydf@users.noreply.github.com>2020-05-03 14:13:48 +0000
commit88b90c82259f86470cf6eba8684e8d9b4cd61bc3 (patch)
tree90e052389ffacec791019a096837a670e205b225 /auto_tests
parent7b758f66dbc550fa52ed66fd7f8b81f8ed37a94e (diff)
Fix a bug in savedata loading when malloc fails.
Also added a bunch of asserts to tests where they don't check allocs.
Diffstat (limited to 'auto_tests')
-rw-r--r--auto_tests/TCP_test.c1
-rw-r--r--auto_tests/conference_invite_merge_test.c2
-rw-r--r--auto_tests/conference_peer_nick_test.c1
-rw-r--r--auto_tests/conference_test.c2
-rw-r--r--auto_tests/encryptsave_test.c1
-rw-r--r--auto_tests/file_saving_test.c8
6 files changed, 13 insertions, 2 deletions
diff --git a/auto_tests/TCP_test.c b/auto_tests/TCP_test.c
index 9206e265..8a109317 100644
--- a/auto_tests/TCP_test.c
+++ b/auto_tests/TCP_test.c
@@ -185,6 +185,7 @@ struct sec_TCP_con {
185static struct sec_TCP_con *new_TCP_con(TCP_Server *tcp_s, Mono_Time *mono_time) 185static struct sec_TCP_con *new_TCP_con(TCP_Server *tcp_s, Mono_Time *mono_time)
186{ 186{
187 struct sec_TCP_con *sec_c = (struct sec_TCP_con *)malloc(sizeof(struct sec_TCP_con)); 187 struct sec_TCP_con *sec_c = (struct sec_TCP_con *)malloc(sizeof(struct sec_TCP_con));
188 ck_assert(sec_c != nullptr);
188 Socket sock = net_socket(net_family_ipv6, TOX_SOCK_STREAM, TOX_PROTO_TCP); 189 Socket sock = net_socket(net_family_ipv6, TOX_SOCK_STREAM, TOX_PROTO_TCP);
189 190
190 IP_Port ip_port_loopback; 191 IP_Port ip_port_loopback;
diff --git a/auto_tests/conference_invite_merge_test.c b/auto_tests/conference_invite_merge_test.c
index e7ec499c..21445525 100644
--- a/auto_tests/conference_invite_merge_test.c
+++ b/auto_tests/conference_invite_merge_test.c
@@ -91,9 +91,11 @@ static void reload(Tox **toxes, State *state, uint32_t n)
91 ck_assert(state[n].save_state != nullptr); 91 ck_assert(state[n].save_state != nullptr);
92 92
93 struct Tox_Options *const options = tox_options_new(nullptr); 93 struct Tox_Options *const options = tox_options_new(nullptr);
94 ck_assert(options != nullptr);
94 tox_options_set_savedata_type(options, TOX_SAVEDATA_TYPE_TOX_SAVE); 95 tox_options_set_savedata_type(options, TOX_SAVEDATA_TYPE_TOX_SAVE);
95 tox_options_set_savedata_data(options, state[n].save_state, state[n].save_size); 96 tox_options_set_savedata_data(options, state[n].save_state, state[n].save_size);
96 toxes[n] = tox_new_log(options, nullptr, &state[n].index); 97 toxes[n] = tox_new_log(options, nullptr, &state[n].index);
98 ck_assert(toxes[n] != nullptr);
97 tox_options_free(options); 99 tox_options_free(options);
98 100
99 set_mono_time_callback(toxes[n], &state[n]); 101 set_mono_time_callback(toxes[n], &state[n]);
diff --git a/auto_tests/conference_peer_nick_test.c b/auto_tests/conference_peer_nick_test.c
index 9d10a8a9..749f9098 100644
--- a/auto_tests/conference_peer_nick_test.c
+++ b/auto_tests/conference_peer_nick_test.c
@@ -68,6 +68,7 @@ static void rebuild_peer_list(Tox *tox)
68 "failed to get conference peer %u's name size (conference = %u): err = %d", peer_number, conference_number, err); 68 "failed to get conference peer %u's name size (conference = %u): err = %d", peer_number, conference_number, err);
69 69
70 uint8_t *const name = (uint8_t *)malloc(size); 70 uint8_t *const name = (uint8_t *)malloc(size);
71 ck_assert(name != nullptr);
71 tox_conference_peer_get_name(tox, conference_number, peer_number, name, &err); 72 tox_conference_peer_get_name(tox, conference_number, peer_number, name, &err);
72 ck_assert_msg(err == TOX_ERR_CONFERENCE_PEER_QUERY_OK, 73 ck_assert_msg(err == TOX_ERR_CONFERENCE_PEER_QUERY_OK,
73 "failed to get conference peer %u's name (conference = %u): err = %d", peer_number, conference_number, err); 74 "failed to get conference peer %u's name (conference = %u): err = %d", peer_number, conference_number, err);
diff --git a/auto_tests/conference_test.c b/auto_tests/conference_test.c
index ec88c82a..11a7bb06 100644
--- a/auto_tests/conference_test.c
+++ b/auto_tests/conference_test.c
@@ -250,9 +250,11 @@ static void run_conference_tests(Tox **toxes, State *state)
250 for (uint32_t i = 0; i < NUM_GROUP_TOX; ++i) { 250 for (uint32_t i = 0; i < NUM_GROUP_TOX; ++i) {
251 if (restarting[i]) { 251 if (restarting[i]) {
252 struct Tox_Options *const options = tox_options_new(nullptr); 252 struct Tox_Options *const options = tox_options_new(nullptr);
253 ck_assert(options != nullptr);
253 tox_options_set_savedata_type(options, TOX_SAVEDATA_TYPE_TOX_SAVE); 254 tox_options_set_savedata_type(options, TOX_SAVEDATA_TYPE_TOX_SAVE);
254 tox_options_set_savedata_data(options, save[i], save_size[i]); 255 tox_options_set_savedata_data(options, save[i], save_size[i]);
255 toxes[i] = tox_new_log(options, nullptr, &state[i].index); 256 toxes[i] = tox_new_log(options, nullptr, &state[i].index);
257 ck_assert(toxes[i] != nullptr);
256 tox_options_free(options); 258 tox_options_free(options);
257 free(save[i]); 259 free(save[i]);
258 260
diff --git a/auto_tests/encryptsave_test.c b/auto_tests/encryptsave_test.c
index 19574d16..ccb1ee88 100644
--- a/auto_tests/encryptsave_test.c
+++ b/auto_tests/encryptsave_test.c
@@ -76,6 +76,7 @@ static void test_save_friend(void)
76 ck_assert_msg(tox_is_data_encrypted(enc_data), "magic number missing"); 76 ck_assert_msg(tox_is_data_encrypted(enc_data), "magic number missing");
77 77
78 struct Tox_Options *options = tox_options_new(nullptr); 78 struct Tox_Options *options = tox_options_new(nullptr);
79 ck_assert(options != nullptr);
79 tox_options_set_savedata_type(options, TOX_SAVEDATA_TYPE_TOX_SAVE); 80 tox_options_set_savedata_type(options, TOX_SAVEDATA_TYPE_TOX_SAVE);
80 tox_options_set_savedata_data(options, enc_data, size2); 81 tox_options_set_savedata_data(options, enc_data, size2);
81 82
diff --git a/auto_tests/file_saving_test.c b/auto_tests/file_saving_test.c
index 7faa6b20..cdcce95f 100644
--- a/auto_tests/file_saving_test.c
+++ b/auto_tests/file_saving_test.c
@@ -64,6 +64,7 @@ static void save_data_encrypted(void)
64static void load_data_decrypted(void) 64static void load_data_decrypted(void)
65{ 65{
66 FILE *f = fopen(savefile, "r"); 66 FILE *f = fopen(savefile, "r");
67 ck_assert(f != nullptr);
67 fseek(f, 0, SEEK_END); 68 fseek(f, 0, SEEK_END);
68 int64_t size = ftell(f); 69 int64_t size = ftell(f);
69 fseek(f, 0, SEEK_SET); 70 fseek(f, 0, SEEK_SET);
@@ -71,7 +72,9 @@ static void load_data_decrypted(void)
71 ck_assert_msg(0 <= size && size <= UINT_MAX, "file size out of range"); 72 ck_assert_msg(0 <= size && size <= UINT_MAX, "file size out of range");
72 73
73 uint8_t *cipher = (uint8_t *)malloc(size); 74 uint8_t *cipher = (uint8_t *)malloc(size);
75 ck_assert(cipher != nullptr);
74 uint8_t *clear = (uint8_t *)malloc(size - TOX_PASS_ENCRYPTION_EXTRA_LENGTH); 76 uint8_t *clear = (uint8_t *)malloc(size - TOX_PASS_ENCRYPTION_EXTRA_LENGTH);
77 ck_assert(clear != nullptr);
75 size_t read_value = fread(cipher, sizeof(*cipher), size, f); 78 size_t read_value = fread(cipher, sizeof(*cipher), size, f);
76 printf("Read read_value = %u of %u\n", (unsigned)read_value, (unsigned)size); 79 printf("Read read_value = %u of %u\n", (unsigned)read_value, (unsigned)size);
77 80
@@ -81,6 +84,7 @@ static void load_data_decrypted(void)
81 "Could not decrypt, error code %d.", derr); 84 "Could not decrypt, error code %d.", derr);
82 85
83 struct Tox_Options *options = tox_options_new(nullptr); 86 struct Tox_Options *options = tox_options_new(nullptr);
87 ck_assert(options != nullptr);
84 88
85 tox_options_set_savedata_type(options, TOX_SAVEDATA_TYPE_TOX_SAVE); 89 tox_options_set_savedata_type(options, TOX_SAVEDATA_TYPE_TOX_SAVE);
86 90
@@ -101,10 +105,10 @@ static void load_data_decrypted(void)
101 ck_assert_msg(strcmp((const char *)readname, name) == 0, 105 ck_assert_msg(strcmp((const char *)readname, name) == 0,
102 "name returned by tox_self_get_name does not match expected result"); 106 "name returned by tox_self_get_name does not match expected result");
103 107
104 free(cipher); 108 tox_kill(t);
105 free(clear); 109 free(clear);
110 free(cipher);
106 fclose(f); 111 fclose(f);
107 tox_kill(t);
108} 112}
109 113
110int main(void) 114int main(void)