Fixed SVACE report defects.
authori.pazderskyy <i.pazderskyy@samsung.com>
Wed, 29 Jun 2016 11:25:41 +0000 (14:25 +0300)
committerRandeep Singh <randeep.s@samsung.com>
Thu, 30 Jun 2016 10:44:38 +0000 (10:44 +0000)
Change-Id: I90bef9beb9619b1fba1ce03f96a6873d6fc31594
Signed-off-by: i.pazderskyy <i.pazderskyy@samsung.com>
Reviewed-on: https://gerrit.iotivity.org/gerrit/9029
Tested-by: jenkins-iotivity <jenkins-iotivity@opendaylight.org>
Reviewed-by: Jongsung Lee <js126.lee@samsung.com>
Reviewed-by: Randeep Singh <randeep.s@samsung.com>
resource/csdk/security/provisioning/ck_manager/sample/provisioningclient.c
resource/csdk/security/provisioning/ck_manager/unittest/ckm_info_test.cpp

index 91a7619..dc7485d 100644 (file)
@@ -37,6 +37,7 @@
 
 #define MAX_URI_LENGTH (64)
 #define MAX_PERMISSION_LENGTH (5)
+#define MAX_ACL_LENGTH 100
 #define CREATE (1)
 #define READ (2)
 #define UPDATE (4)
@@ -71,7 +72,7 @@ typedef enum
  */
 static void deleteACL(OicSecAcl_t *acl)
 {
-    if (acl)
+    if (acl && MAX_ACL_LENGTH > acl->resourcesLen)
     {
         /* Clean Resources */
         for (size_t i = 0; i < (acl)->resourcesLen; i++)
@@ -214,7 +215,7 @@ static int InputACL(OicSecAcl_t *acl)
     //Set Resource.
     printf("Num. of Resource : \n");
     ret = scanf("%zu", &acl->resourcesLen);
-    if(-1 == ret)
+    if(-1 == ret || MAX_ACL_LENGTH < acl->resourcesLen)
     {
         printf("Error while input\n");
         return -1;
index 28fc7d7..66d6cb1 100644 (file)
@@ -19,7 +19,6 @@
 
  ******************************************************************/
 
-#include <oic_malloc.h>
 #include <gtest/gtest.h>
 #include "ckm_info.h"
 
@@ -153,13 +152,13 @@ TEST(CKMInfoTest, SetGetCAPrivateKey)
     ASSERT_EQ(PKI_SUCCESS, SetCAPrivateKey(&CKMInfoTest::privateKey));
 
     ByteArray privateKey = {0,0};
-    privateKey.data = (uint8_t*)OICMalloc(PRIVATE_KEY_SIZE);
+    uint8_t caPrivKey[PRIVATE_KEY_SIZE] = {0};
+
+    privateKey.data = caPrivKey;
     privateKey.len = PRIVATE_KEY_SIZE;
-    EXPECT_TRUE(NULL != privateKey.data);
 
     EXPECT_EQ(PKI_SUCCESS, GetCAPrivateKey(&privateKey));
     EXPECT_TRUE(0 == memcmp(CKMInfoTest::privateKey.data, privateKey.data, PRIVATE_KEY_SIZE));
-    OICFree(privateKey.data);
 }
 
 //SetGetCAPublicKey test
@@ -168,13 +167,13 @@ TEST(CKMInfoTest, SetGetCAPublicKey)
     ASSERT_EQ(PKI_SUCCESS, SetCAPublicKey(&CKMInfoTest::publicKey));
 
     ByteArray publicKey = {0,0};
-    publicKey.data = (uint8_t*)OICMalloc(PUBLIC_KEY_SIZE);
+    uint8_t caPubKey[PUBLIC_KEY_SIZE] = {0};
+
+    publicKey.data = caPubKey;
     publicKey.len = PUBLIC_KEY_SIZE;
-    EXPECT_TRUE(NULL != publicKey.data);
 
     EXPECT_EQ(PKI_SUCCESS, GetCAPublicKey(&publicKey));
     EXPECT_TRUE(0 == memcmp(CKMInfoTest::publicKey.data, publicKey.data, PUBLIC_KEY_SIZE));
-    OICFree(publicKey.data);
 }
 
 //SetGetCAName test
@@ -183,13 +182,13 @@ TEST(CKMInfoTest, SetGetCAName)
     ASSERT_EQ(PKI_SUCCESS, SetCAName(&CKMInfoTest::caName));
 
     ByteArray caName = {0,0};
-    caName.data = (uint8_t*)OICMalloc(ISSUER_NAME_SIZE);
+    uint8_t caIssName[PUBLIC_KEY_SIZE] = {0};
+
+    caName.data = caIssName;
     caName.len = ISSUER_NAME_SIZE;
-    EXPECT_TRUE(NULL != caName.data);
 
     EXPECT_EQ(PKI_SUCCESS, GetCAName(&caName));
     EXPECT_TRUE(0 == memcmp(CKMInfoTest::caName.data, caName.data, ISSUER_NAME_SIZE));
-    OICFree(caName.data);
 }
 
 //SetGetCKMInfo test
@@ -202,19 +201,20 @@ TEST(CKMInfoTest, SetGetCKMInfo)
     long serialNum = 0;
 
     ByteArray publicKey = {0,0};
-    publicKey.data = (uint8_t*)OICMalloc(PUBLIC_KEY_SIZE);
+    uint8_t caIssName[ISSUER_MAX_CERT_SIZE] = {0};
+    uint8_t caPubKey[PUBLIC_KEY_SIZE] = {0};
+    uint8_t caPrivKey[PRIVATE_KEY_SIZE] = {0};
+
+    publicKey.data = caPubKey;
     publicKey.len = PUBLIC_KEY_SIZE;
-    EXPECT_TRUE(NULL != publicKey.data);
 
     ByteArray privateKey = {0,0};
-    privateKey.data = (uint8_t*)OICMalloc(PRIVATE_KEY_SIZE);
+    privateKey.data = caPrivKey;
     privateKey.len = PRIVATE_KEY_SIZE;
-    EXPECT_TRUE(NULL != privateKey.data);
 
     ByteArray caName = {0,0};
-    caName.data = (uint8_t*)OICMalloc(ISSUER_NAME_SIZE);
+    caName.data = caIssName;
     caName.len = ISSUER_NAME_SIZE;
-    EXPECT_TRUE(NULL != caName.data);
 
     EXPECT_EQ(PKI_SUCCESS, GetCKMInfo(&nSn, &serialNum,
             &privateKey, &publicKey, &caName));
@@ -224,10 +224,6 @@ TEST(CKMInfoTest, SetGetCKMInfo)
     EXPECT_TRUE(0 == memcmp(CKMInfoTest::privateKey.data, privateKey.data, PRIVATE_KEY_SIZE));
     EXPECT_TRUE(0 == memcmp(CKMInfoTest::publicKey.data, publicKey.data, PUBLIC_KEY_SIZE));
     EXPECT_TRUE(0 == memcmp(CKMInfoTest::caName.data, caName.data, ISSUER_NAME_SIZE));
-
-    OICFree(publicKey.data);
-    OICFree(privateKey.data);
-    OICFree(caName.data);
 }
 
 //SetGetCACertificate test
@@ -236,13 +232,12 @@ TEST(CKMInfoTest, SetGetCACertificate)
     ASSERT_EQ(PKI_SUCCESS, SetCACertificate(&CKMInfoTest::derCode));
 
     ByteArray der = {0,0};
-    der.data = (uint8_t*)OICMalloc(CERT_LEN);
+    uint8_t caCert[CERT_LEN] = {0};
+    der.data = caCert;
     der.len = CERT_LEN;
     EXPECT_TRUE(NULL != der.data);
     EXPECT_EQ(PKI_SUCCESS, GetCACertificate(&der));
     EXPECT_TRUE(0 == memcmp(CKMInfoTest::derCode.data, der.data, CERT_LEN));
-
-    OICFree(der.data);
 }
 
 //SetGetCRLSerialNumber test