File: zero_test.c

package info (click to toggle)
aws-crt-python 0.16.8%2Bdfsg-1
  • links: PTS, VCS
  • area: main
  • in suites: bookworm
  • size: 78,328 kB
  • sloc: ansic: 330,743; python: 18,949; makefile: 6,271; sh: 3,712; asm: 754; cpp: 699; ruby: 208; java: 77; perl: 73; javascript: 46; xml: 11
file content (108 lines) | stat: -rw-r--r-- 3,298 bytes parent folder | download | duplicates (3)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
/**
 * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
 * SPDX-License-Identifier: Apache-2.0.
 */

#include <aws/common/byte_buf.h>
#include <aws/common/common.h>
#include <aws/testing/aws_test_harness.h>

AWS_TEST_CASE(test_secure_zero, s_test_secure_zero_fn)
static int s_test_secure_zero_fn(struct aws_allocator *allocator, void *ctx) {
    (void)allocator;
    (void)ctx;

    /* We can't actually test the secure part of the zero operation - anything
     * we do to observe the buffer will teach the compiler that it needs to
     * actually zero the buffer (or provide a convincing-enough simulation of
     * the same). So we'll just test that it behaves like memset.
     */

    unsigned char buf[16];

    for (size_t i = 0; i < sizeof(buf); i++) {
        volatile unsigned char *ptr = buf;
        ptr += i;

        *ptr = (unsigned char)0xDD;
    }

    aws_secure_zero(buf, sizeof(buf) / 2);

    for (size_t i = 0; i < sizeof(buf); i++) {
        if (i < sizeof(buf) / 2) {
            ASSERT_INT_EQUALS(0, buf[i]);
        } else {
            ASSERT_INT_EQUALS((unsigned char)0xDD, (unsigned char)buf[i]);
        }
    }

    /* check that it's safe to pass NULL */
    aws_secure_zero(NULL, 0);

    return SUCCESS;
}

AWS_TEST_CASE(test_buffer_secure_zero, s_test_buffer_secure_zero_fn)
static int s_test_buffer_secure_zero_fn(struct aws_allocator *allocator, void *ctx) {
    (void)ctx;

    struct aws_byte_buf buf;
    size_t len = 27;
    ASSERT_SUCCESS(aws_byte_buf_init(&buf, allocator, len));
    buf.len = buf.capacity;
    for (size_t i = 0; i < len; ++i) {
        buf.buffer[i] = 0xDD;
    }

    aws_byte_buf_secure_zero(&buf);
    for (size_t i = 0; i < len; ++i) {
        ASSERT_INT_EQUALS(0, buf.buffer[i]);
    }
    ASSERT_INT_EQUALS(0, buf.len);

    aws_byte_buf_clean_up(&buf);
    return SUCCESS;
}

AWS_TEST_CASE(test_buffer_clean_up_secure, s_test_buffer_clean_up_secure_fn)
static int s_test_buffer_clean_up_secure_fn(struct aws_allocator *allocator, void *ctx) {
    (void)ctx;

    /* We cannot test the zeroing of data here, because that would require reading
     * memory that has already been freed. Simply verifies that there is no memory leak.
     */
    struct aws_byte_buf buf;
    ASSERT_SUCCESS(aws_byte_buf_init(&buf, allocator, 37));
    aws_byte_buf_clean_up_secure(&buf);
    ASSERT_INT_EQUALS(buf.len, 0);
    ASSERT_INT_EQUALS(buf.capacity, 0);
    ASSERT_NULL(buf.buffer);
    ASSERT_NULL(buf.allocator);
    return SUCCESS;
}

AWS_TEST_CASE(is_zeroed, s_test_is_zeroed_fn)
static int s_test_is_zeroed_fn(struct aws_allocator *allocator, void *ctx) {
    (void)allocator;
    (void)ctx;

    /* Using a value that's 2X the largest amount we check in a single CPU instruction */
    enum { max_size = 64 * 2 };
    uint8_t buf[max_size];

    for (size_t size = 1; size <= max_size; ++size) {
        /* Zero out buffer and check */
        memset(buf, 0, size);
        ASSERT_TRUE(aws_is_mem_zeroed(buf, size));

        /* Set 1 byte to be non-zero and check */
        for (size_t non_zero_byte = 0; non_zero_byte < size; ++non_zero_byte) {
            buf[non_zero_byte] = 1;
            ASSERT_FALSE(aws_is_mem_zeroed(buf, size));
            buf[non_zero_byte] = 0;
        }
    }

    return SUCCESS;
}