1 | // RUN: %clangxx_msan -O0 %s -o %t && %run %t |
2 | // RUN: not %run %t NTOP_READ 2>&1 | FileCheck %s --check-prefix=NTOP_READ |
3 | // RUN: not %run %t PTON_READ 2>&1 | FileCheck %s --check-prefix=PTON_READ |
4 | |
5 | #include <assert.h> |
6 | #include <resolv.h> |
7 | #include <stdlib.h> |
8 | #include <string.h> |
9 | #include <sys/types.h> |
10 | |
11 | #include <sanitizer/msan_interface.h> |
12 | |
13 | int main(int iArgc, char *szArgv[]) { |
14 | char* test = nullptr; |
15 | if (iArgc > 1) { |
16 | test = szArgv[1]; |
17 | } |
18 | |
19 | if (test == nullptr) { |
20 | // Check NTOP writing |
21 | const char *src = "base64 test data" ; |
22 | size_t src_len = strlen(s: src); |
23 | size_t dst_len = ((src_len + 2) / 3) * 4 + 1; |
24 | char dst[dst_len]; |
25 | int res = b64_ntop(reinterpret_cast<const unsigned char *>(src), src_len, |
26 | dst, dst_len); |
27 | assert(res >= 0); |
28 | __msan_check_mem_is_initialized(x: dst, size: res); |
29 | |
30 | // Check PTON writing |
31 | unsigned char target[dst_len]; |
32 | res = b64_pton(dst, target, dst_len); |
33 | assert(res >= 0); |
34 | __msan_check_mem_is_initialized(x: target, size: res); |
35 | |
36 | // Check NTOP writing for zero length src |
37 | src = "" ; |
38 | src_len = strlen(s: src); |
39 | assert(((src_len + 2) / 3) * 4 + 1 < dst_len); |
40 | res = b64_ntop(reinterpret_cast<const unsigned char *>(src), src_len, |
41 | dst, dst_len); |
42 | assert(res >= 0); |
43 | __msan_check_mem_is_initialized(x: dst, size: res); |
44 | |
45 | // Check PTON writing for zero length src |
46 | dst[0] = '\0'; |
47 | res = b64_pton(dst, target, dst_len); |
48 | assert(res >= 0); |
49 | __msan_check_mem_is_initialized(x: target, size: res); |
50 | |
51 | return 0; |
52 | } |
53 | |
54 | if (strcmp(s1: test, s2: "NTOP_READ" ) == 0) { |
55 | // Check NTOP reading |
56 | size_t src_len = 80; |
57 | char src[src_len]; |
58 | __msan_poison(a: src, size: src_len); |
59 | size_t dst_len = ((src_len + 2) / 3) * 4 + 1; |
60 | char dst[dst_len]; |
61 | int res = b64_ntop(reinterpret_cast<const unsigned char *>(src), src_len, |
62 | dst, dst_len); |
63 | // NTOP_READ: Uninitialized bytes in __b64_ntop |
64 | return 0; |
65 | } |
66 | |
67 | if (strcmp(s1: test, s2: "PTON_READ" ) == 0) { |
68 | // Check PTON reading |
69 | size_t src_len = 80; |
70 | char src[src_len]; |
71 | strcpy(dest: src, src: "junk longer than zero" ); |
72 | // pretend it is uninitialized |
73 | __msan_poison(a: src, size: src_len); |
74 | unsigned char target[src_len]; |
75 | int res = b64_pton(src, target, src_len); |
76 | // PTON_READ: Uninitialized bytes in __b64_pton |
77 | return 0; |
78 | } |
79 | |
80 | return 0; |
81 | } |
82 | |