History log of /openbmc/slpd-lite/test/ (Results 1 – 6 of 6)
Revision Date Author Comments
(<<< Hide modified files)
(Show modified files >>>)
8375b78424-May-2024 Andrew Geissler <geissonator@yahoo.com>

test-suite: manual test script

A series of tests that exercise a variety of paths in the slpd
application

Change-Id: I2087e08af009921da948e4aa95d104fdb8ba23ec
Signed-off-by: Andrew Geissler <geisso

test-suite: manual test script

A series of tests that exercise a variety of paths in the slpd
application

Change-Id: I2087e08af009921da948e4aa95d104fdb8ba23ec
Signed-off-by: Andrew Geissler <geissonator@yahoo.com>

show more ...

20bab74824-May-2024 Andrew Geissler <geissonator@yahoo.com>

SrvRqst: Add bounds checking on buffer parsing

There are multiple length fields provided by the user in this command.
Need to ensure those lengths do not exceed the input buffer size.

Tested:
- Exe

SrvRqst: Add bounds checking on buffer parsing

There are multiple length fields provided by the user in this command.
Need to ensure those lengths do not exceed the input buffer size.

Tested:
- Executed new unit tests successfully

Change-Id: Ife4b74d7541d6939bdc30a381fc5cc80cfd24057
Signed-off-by: Andrew Geissler <geissonator@yahoo.com>

show more ...

f60e710824-May-2024 Andrew Geissler <geissonator@yahoo.com>

SrvTypeRqst: Add bounds checking on buffer parsing

There are multiple length fields provided by the user in this command.
Need to ensure those lengths do not exceed the input buffer size.

Tested:
-

SrvTypeRqst: Add bounds checking on buffer parsing

There are multiple length fields provided by the user in this command.
Need to ensure those lengths do not exceed the input buffer size.

Tested:
- Executed new unit tests successfully

Change-Id: Id42c8c2f7f87cab07982edabe93f09cd9ef4208a
Signed-off-by: Andrew Geissler <geissonator@yahoo.com>

show more ...

6f01edce24-May-2024 Andrew Geissler <geissonator@yahoo.com>

Do not use input header for error responses

When parsing of the input header fails, it could be for a variety of
issues, including an overflow of the language tag length. We should not
utilize any v

Do not use input header for error responses

When parsing of the input header fails, it could be for a variety of
issues, including an overflow of the language tag length. We should not
utilize any variable aspects of the header in our response and
instead just send back a default of all 0's with the static fields set
along with error the code.

Utilize std::bitset to get the function ID properly written to
cout/cerr.

Tested:
- Verified when sending in an invalid header, it no longer can cause
unexpected error paths in parseHeader function

Change-Id: I17a8a013bcd90e083b1156f794f059fc1b830a63
Signed-off-by: Andrew Geissler <geissonator@yahoo.com>

show more ...

c668313e23-May-2024 Andrew Geissler <geissonator@yahoo.com>

unit-test: add language tag length validation

Ensure caller has provided enough language tag data to match with their
input length

Change-Id: Icc60601d19ee33a52413dd8f2b8462791571ebcb
Signed-off-by

unit-test: add language tag length validation

Ensure caller has provided enough language tag data to match with their
input length

Change-Id: Icc60601d19ee33a52413dd8f2b8462791571ebcb
Signed-off-by: Andrew Geissler <geissonator@yahoo.com>

show more ...

0e948dca23-May-2024 Andrew Geissler <geissonator@yahoo.com>

unit-test: add basic header validation tests

Ensure header size is correct and write tests to validate it.

The goal of this patch series is to match with the validation done
within openslp (slp_v2m

unit-test: add basic header validation tests

Ensure header size is correct and write tests to validate it.

The goal of this patch series is to match with the validation done
within openslp (slp_v2message.c, SLPv2MessageParseHeader)

Change-Id: I42aace162051a9e4795ebbaf36f193efe4738dcd
Signed-off-by: Andrew Geissler <geissonator@yahoo.com>

show more ...