File: test_buffer_safety.c

package info (click to toggle)
pacparser 1.5.0-1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 3,276 kB
  • sloc: ansic: 72,713; python: 299; sh: 169; makefile: 144
file content (170 lines) | stat: -rw-r--r-- 5,051 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
// Buffer safety test for resolve_host
// Tests that we don't overflow the buffer even with many results

#include <stdio.h>
#include <string.h>
#include <stdlib.h>

#ifndef _WIN32
#include <unistd.h>
#include <sys/socket.h>
#include <netdb.h>
#include <arpa/inet.h>
#else
#include <winsock2.h>
#include <ws2tcpip.h>
#endif

#define MAX_IP_RESULTS 10
#define CANARY_PATTERN 0xDEADBEEF

static int
resolve_host(const char *hostname, char *ipaddr_list, int max_results,
             int req_ai_family)
{
  struct addrinfo hints;
  struct addrinfo *result;
  char ipaddr[INET6_ADDRSTRLEN];
  int error;

  // Truncate ipaddr_list to an empty string.
  ipaddr_list[0] = '\0';

  memset(&hints, 0, sizeof(struct addrinfo));

  hints.ai_family = req_ai_family;
  hints.ai_socktype = SOCK_STREAM;

  error = getaddrinfo(hostname, NULL, &hints, &result);
  if (error) return error;
  int i = 0;
  size_t offset = 0;
  for(struct addrinfo *ai = result; ai != NULL && i < max_results; ai = ai->ai_next, i++) {
    getnameinfo(ai->ai_addr, ai->ai_addrlen, ipaddr, sizeof(ipaddr), NULL, 0,
                NI_NUMERICHOST);
    if (offset > 0) {
      ipaddr_list[offset++] = ';';
    }
    size_t len = strlen(ipaddr);
    strcpy(ipaddr_list + offset, ipaddr);
    offset += len;
  }
  freeaddrinfo(result);
  return 0;
}

int main() {
  printf("=== Buffer Safety Test ===\n\n");

  // Create a buffer with canary values before and after
  size_t buffer_size = INET6_ADDRSTRLEN * MAX_IP_RESULTS + MAX_IP_RESULTS;
  unsigned int *canary_before = malloc(sizeof(unsigned int));
  char *ipaddr_list = malloc(buffer_size);
  unsigned int *canary_after = malloc(sizeof(unsigned int));

  *canary_before = CANARY_PATTERN;
  *canary_after = CANARY_PATTERN;

  printf("Buffer size: %zu bytes\n", buffer_size);
  printf("Canary before buffer: 0x%X at %p\n", *canary_before, (void*)canary_before);
  printf("Buffer address: %p\n", (void*)ipaddr_list);
  printf("Canary after buffer:  0x%X at %p\n\n", *canary_after, (void*)canary_after);

  // Test 1: Normal hostname
  printf("Test 1: Normal hostname (google.com)\n");
  int result = resolve_host("google.com", ipaddr_list, MAX_IP_RESULTS, AF_UNSPEC);
  if (result == 0) {
    printf("Result: %s\n", ipaddr_list);
    printf("Length: %zu bytes\n", strlen(ipaddr_list));
  }

  if (*canary_before != CANARY_PATTERN) {
    printf("✗ CANARY BEFORE CORRUPTED: 0x%X\n", *canary_before);
  } else {
    printf("✓ Canary before intact\n");
  }

  if (*canary_after != CANARY_PATTERN) {
    printf("✗ CANARY AFTER CORRUPTED: 0x%X\n", *canary_after);
  } else {
    printf("✓ Canary after intact\n");
  }

  // Test 2: Fill buffer to near-capacity
  printf("\n\nTest 2: Large max_results (stress test)\n");
  result = resolve_host("www.google.com", ipaddr_list, MAX_IP_RESULTS, AF_UNSPEC);
  if (result == 0) {
    size_t len = strlen(ipaddr_list);
    printf("Result length: %zu bytes (%.1f%% of buffer)\n",
           len, (len * 100.0) / buffer_size);
    printf("Result: %s\n", ipaddr_list);

    // Count IPs
    int count = 1;
    for (char *p = ipaddr_list; *p; p++) {
      if (*p == ';') count++;
    }
    printf("Number of IPs: %d\n", count);
  }

  if (*canary_before != CANARY_PATTERN) {
    printf("✗ CANARY BEFORE CORRUPTED: 0x%X\n", *canary_before);
  } else {
    printf("✓ Canary before intact\n");
  }

  if (*canary_after != CANARY_PATTERN) {
    printf("✗ CANARY AFTER CORRUPTED: 0x%X\n", *canary_after);
  } else {
    printf("✓ Canary after intact\n");
  }

  // Test 3: Edge case - max_results = 0
  printf("\n\nTest 3: Edge case - max_results = 0\n");
  result = resolve_host("localhost", ipaddr_list, 0, AF_INET);
  printf("Result: '%s'\n", ipaddr_list);
  printf("Length: %zu bytes (should be 0)\n", strlen(ipaddr_list));

  if (*canary_before != CANARY_PATTERN) {
    printf("✗ CANARY BEFORE CORRUPTED: 0x%X\n", *canary_before);
  } else {
    printf("✓ Canary before intact\n");
  }

  if (*canary_after != CANARY_PATTERN) {
    printf("✗ CANARY AFTER CORRUPTED: 0x%X\n", *canary_after);
  } else {
    printf("✓ Canary after intact\n");
  }

  // Test 4: Very long IPv6 addresses
  printf("\n\nTest 4: IPv6 addresses (longest format)\n");
  result = resolve_host("ipv6.google.com", ipaddr_list, MAX_IP_RESULTS, AF_INET6);
  if (result == 0) {
    printf("Result: %s\n", ipaddr_list);
    printf("Length: %zu bytes\n", strlen(ipaddr_list));
  } else {
    printf("Could not resolve ipv6.google.com (error: %s)\n", gai_strerror(result));
  }

  if (*canary_before != CANARY_PATTERN) {
    printf("✗ CANARY BEFORE CORRUPTED: 0x%X\n", *canary_before);
  } else {
    printf("✓ Canary before intact\n");
  }

  if (*canary_after != CANARY_PATTERN) {
    printf("✗ CANARY AFTER CORRUPTED: 0x%X\n", *canary_after);
  } else {
    printf("✓ Canary after intact\n");
  }

  free(canary_before);
  free(ipaddr_list);
  free(canary_after);

  printf("\n=== Buffer Safety Test Complete ===\n");
  printf("If all canaries are intact, the function is memory-safe.\n");

  return 0;
}