|  | @@ -51,20 +51,20 @@
 | 
	
		
			
				|  |  |  static int
 | 
	
		
			
				|  |  |  test_parse_http_response(char *buf, int len, struct mg_response_info *ri)
 | 
	
		
			
				|  |  |  {
 | 
	
		
			
				|  |  | -	char *s = malloc(len);
 | 
	
		
			
				|  |  | -	memcpy(s, buf, len);
 | 
	
		
			
				|  |  | +        char *s = (char*)malloc(len);
 | 
	
		
			
				|  |  | +        memcpy(s, buf, (size_t)len);
 | 
	
		
			
				|  |  |  	int r = parse_http_response(s, len, ri);
 | 
	
		
			
				|  |  | -	//	free(s); -- leak is intentional in the test
 | 
	
		
			
				|  |  | +        free(s);
 | 
	
		
			
				|  |  |  	return r;
 | 
	
		
			
				|  |  |  }
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  static int
 | 
	
		
			
				|  |  |  test_parse_http_request(char *buf, int len, struct mg_request_info *ri)
 | 
	
		
			
				|  |  |  {
 | 
	
		
			
				|  |  | -	char *s = malloc(len);
 | 
	
		
			
				|  |  | -	memcpy(s, buf, len);
 | 
	
		
			
				|  |  | +        char *s = (char*)malloc(len);
 | 
	
		
			
				|  |  | +        memcpy(s, buf, (size_t)len);
 | 
	
		
			
				|  |  |  	int r = parse_http_request(s, len, ri);
 | 
	
		
			
				|  |  | -	//	free(s); -- leak is intentional in the test
 | 
	
		
			
				|  |  | +        free(s);
 | 
	
		
			
				|  |  |  	return r;
 | 
	
		
			
				|  |  |  }
 | 
	
		
			
				|  |  |  
 | 
	
	
		
			
				|  | @@ -128,22 +128,28 @@ START_TEST(test_parse_http_message)
 | 
	
		
			
				|  |  |  	ck_assert_int_eq(-1, test_parse_http_request(space, 2, &ri));
 | 
	
		
			
				|  |  |  	ck_assert_int_eq(-1, test_parse_http_response(space, 2, &respi));
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -	/* req1 is a valid request */
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +        /* req1 minus 1 byte at the end is incomplete */
 | 
	
		
			
				|  |  | +        ck_assert_int_eq(0, get_http_header_len(req1, lenreq1 - 1));
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +        /* req1 minus 1 byte at the start is complete but invalid */
 | 
	
		
			
				|  |  | +        ck_assert_int_eq(lenreq1 - 1, get_http_header_len(req1 + 1, lenreq1 - 1));
 | 
	
		
			
				|  |  | +        ck_assert_int_eq(-1, test_parse_http_request(req1 + 1, lenreq1 - 1, &ri));
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +        /* req1 is a valid request */
 | 
	
		
			
				|  |  |  	ck_assert_int_eq(lenreq1, get_http_header_len(req1, lenreq1));
 | 
	
		
			
				|  |  | -	ck_assert_int_eq(lenreq1, test_parse_http_request(req1, lenreq1, &ri));
 | 
	
		
			
				|  |  | +        ck_assert_int_eq(-1, test_parse_http_response(req1, lenreq1, &respi));
 | 
	
		
			
				|  |  | +        /* use "test_parse_*" to keep the req string unmodified, but then ri.*
 | 
	
		
			
				|  |  | +         * points to invalid memory. Use "parse_*" to access ri.*, but then
 | 
	
		
			
				|  |  | +         * the req string gets modified and can no longer be used */
 | 
	
		
			
				|  |  | +        ck_assert_int_eq(lenreq1, parse_http_request(req1, lenreq1, &ri));
 | 
	
		
			
				|  |  |  	ck_assert_str_eq("1.1", ri.http_version);
 | 
	
		
			
				|  |  |  	ck_assert_int_eq(0, ri.num_headers);
 | 
	
		
			
				|  |  | -	ck_assert_int_eq(-1, test_parse_http_response(req1, lenreq1, &respi));
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -	/* req1 minus 1 byte at the end is incomplete */
 | 
	
		
			
				|  |  | -	ck_assert_int_eq(0, get_http_header_len(req1, lenreq1 - 1));
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -	/* req1 minus 1 byte at the start is complete but invalid */
 | 
	
		
			
				|  |  | -	ck_assert_int_eq(lenreq1 - 1, get_http_header_len(req1 + 1, lenreq1 - 1));
 | 
	
		
			
				|  |  | -	ck_assert_int_eq(-1, test_parse_http_request(req1 + 1, lenreq1 - 1, &ri));
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -	/* req2 is a complete, but invalid request */
 | 
	
		
			
				|  |  | +        /* req2 is a complete, but invalid request */
 | 
	
		
			
				|  |  |  	ck_assert_int_eq(lenreq2, get_http_header_len(req2, lenreq2));
 | 
	
		
			
				|  |  |  	ck_assert_int_eq(-1, test_parse_http_request(req2, lenreq2, &ri));
 | 
	
		
			
				|  |  |  
 | 
	
	
		
			
				|  | @@ -162,10 +168,10 @@ START_TEST(test_parse_http_message)
 | 
	
		
			
				|  |  |  	/* req5 is a complete and valid request (also somewhat malformed,
 | 
	
		
			
				|  |  |  	 * since it uses \n\n instead of \r\n\r\n) */
 | 
	
		
			
				|  |  |  	ck_assert_int_eq(lenreq5, get_http_header_len(req5, lenreq5));
 | 
	
		
			
				|  |  | -	ck_assert_int_eq(lenreq5, test_parse_http_request(req5, lenreq5, &ri));
 | 
	
		
			
				|  |  | +        ck_assert_int_eq(-1, test_parse_http_response(req5, lenreq5, &respi));
 | 
	
		
			
				|  |  | +        ck_assert_int_eq(lenreq5, parse_http_request(req5, lenreq5, &ri));
 | 
	
		
			
				|  |  |  	ck_assert_str_eq("GET", ri.request_method);
 | 
	
		
			
				|  |  |  	ck_assert_str_eq("1.0", ri.http_version);
 | 
	
		
			
				|  |  | -	ck_assert_int_eq(-1, test_parse_http_response(req5, lenreq5, &respi));
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  	/* req6 is incomplete */
 | 
	
	
		
			
				|  | @@ -187,13 +193,13 @@ START_TEST(test_parse_http_message)
 | 
	
		
			
				|  |  |  	/* req9 is a valid response */
 | 
	
		
			
				|  |  |  	ck_assert_int_eq(lenreq9, get_http_header_len(req9, lenreq9));
 | 
	
		
			
				|  |  |  	ck_assert_int_eq(-1, test_parse_http_request(req9, lenreq9, &ri));
 | 
	
		
			
				|  |  | -	ck_assert_int_eq(lenreq9, test_parse_http_response(req9, lenreq9, &respi));
 | 
	
		
			
				|  |  | +        ck_assert_int_eq(lenreq9, parse_http_response(req9, lenreq9, &respi));
 | 
	
		
			
				|  |  |  	ck_assert_int_eq(1, respi.num_headers);
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  	/* req10 is a valid request */
 | 
	
		
			
				|  |  |  	ck_assert_int_eq(lenreq10, get_http_header_len(req10, lenreq10));
 | 
	
		
			
				|  |  | -	ck_assert_int_eq(lenreq10, test_parse_http_request(req10, lenreq10, &ri));
 | 
	
		
			
				|  |  | +        ck_assert_int_eq(lenreq10, parse_http_request(req10, lenreq10, &ri));
 | 
	
		
			
				|  |  |  	ck_assert_str_eq("1.1", ri.http_version);
 | 
	
		
			
				|  |  |  	ck_assert_int_eq(2, ri.num_headers);
 | 
	
		
			
				|  |  |  	ck_assert_str_eq("A", ri.http_headers[0].name);
 |