8375b784 | 24-May-2024 |
Andrew Geissler <geissonator@yahoo.com> |
test-suite: manual test script
A series of tests that exercise a variety of paths in the slpd application
Change-Id: I2087e08af009921da948e4aa95d104fdb8ba23ec Signed-off-by: Andrew Geissler <geisso
test-suite: manual test script
A series of tests that exercise a variety of paths in the slpd application
Change-Id: I2087e08af009921da948e4aa95d104fdb8ba23ec Signed-off-by: Andrew Geissler <geissonator@yahoo.com>
show more ...
|
20bab748 | 24-May-2024 |
Andrew Geissler <geissonator@yahoo.com> |
SrvRqst: Add bounds checking on buffer parsing
There are multiple length fields provided by the user in this command. Need to ensure those lengths do not exceed the input buffer size.
Tested: - Exe
SrvRqst: Add bounds checking on buffer parsing
There are multiple length fields provided by the user in this command. Need to ensure those lengths do not exceed the input buffer size.
Tested: - Executed new unit tests successfully
Change-Id: Ife4b74d7541d6939bdc30a381fc5cc80cfd24057 Signed-off-by: Andrew Geissler <geissonator@yahoo.com>
show more ...
|
f60e7108 | 24-May-2024 |
Andrew Geissler <geissonator@yahoo.com> |
SrvTypeRqst: Add bounds checking on buffer parsing
There are multiple length fields provided by the user in this command. Need to ensure those lengths do not exceed the input buffer size.
Tested: -
SrvTypeRqst: Add bounds checking on buffer parsing
There are multiple length fields provided by the user in this command. Need to ensure those lengths do not exceed the input buffer size.
Tested: - Executed new unit tests successfully
Change-Id: Id42c8c2f7f87cab07982edabe93f09cd9ef4208a Signed-off-by: Andrew Geissler <geissonator@yahoo.com>
show more ...
|
6f01edce | 24-May-2024 |
Andrew Geissler <geissonator@yahoo.com> |
Do not use input header for error responses
When parsing of the input header fails, it could be for a variety of issues, including an overflow of the language tag length. We should not utilize any v
Do not use input header for error responses
When parsing of the input header fails, it could be for a variety of issues, including an overflow of the language tag length. We should not utilize any variable aspects of the header in our response and instead just send back a default of all 0's with the static fields set along with error the code.
Utilize std::bitset to get the function ID properly written to cout/cerr.
Tested: - Verified when sending in an invalid header, it no longer can cause unexpected error paths in parseHeader function
Change-Id: I17a8a013bcd90e083b1156f794f059fc1b830a63 Signed-off-by: Andrew Geissler <geissonator@yahoo.com>
show more ...
|
c668313e | 23-May-2024 |
Andrew Geissler <geissonator@yahoo.com> |
unit-test: add language tag length validation
Ensure caller has provided enough language tag data to match with their input length
Change-Id: Icc60601d19ee33a52413dd8f2b8462791571ebcb Signed-off-by
unit-test: add language tag length validation
Ensure caller has provided enough language tag data to match with their input length
Change-Id: Icc60601d19ee33a52413dd8f2b8462791571ebcb Signed-off-by: Andrew Geissler <geissonator@yahoo.com>
show more ...
|
0e948dca | 23-May-2024 |
Andrew Geissler <geissonator@yahoo.com> |
unit-test: add basic header validation tests
Ensure header size is correct and write tests to validate it.
The goal of this patch series is to match with the validation done within openslp (slp_v2m
unit-test: add basic header validation tests
Ensure header size is correct and write tests to validate it.
The goal of this patch series is to match with the validation done within openslp (slp_v2message.c, SLPv2MessageParseHeader)
Change-Id: I42aace162051a9e4795ebbaf36f193efe4738dcd Signed-off-by: Andrew Geissler <geissonator@yahoo.com>
show more ...
|