[PATCH 2/2] webservices/tests: Add some tests for session dictionary size.

Connor McAdams cmcadams at codeweavers.com
Wed Apr 13 09:40:30 CDT 2022


Signed-off-by: Connor McAdams <cmcadams at codeweavers.com>
---

For a little context: Essentially, the session dictionary size represents
the count of characters (including null terminators) of all strings
currently in the session dictionary. On the reader side, once we've
exceeded the WS_CHANNEL_PROPERTY_MAX_SESSION_DICTIONARY_SIZE value, the
channel will fault.

---
 dlls/webservices/tests/channel.c | 363 ++++++++++++++++++++++++++++++-
 1 file changed, 356 insertions(+), 7 deletions(-)

diff --git a/dlls/webservices/tests/channel.c b/dlls/webservices/tests/channel.c
index 64d134bfaab..e3cadc7d344 100644
--- a/dlls/webservices/tests/channel.c
+++ b/dlls/webservices/tests/channel.c
@@ -19,6 +19,7 @@
 #include <stdio.h>
 #define COBJMACROS
 #include "windows.h"
+#include "winsock2.h"
 #include "webservices.h"
 #include "initguid.h"
 #include "netfw.h"
@@ -110,6 +111,12 @@ static void test_WsCreateChannel(void)
                                NULL );
     ok( hr == S_OK, "got %#lx\n", hr );
     ok( addr_version == WS_ADDRESSING_VERSION_1_0, "got %u\n", addr_version );
+
+    size = 0xdeadbeef;
+    hr = WsGetChannelProperty( channel, WS_CHANNEL_PROPERTY_MAX_SESSION_DICTIONARY_SIZE, &size, sizeof(size), NULL );
+    ok( hr == S_OK, "got %#lx\n", hr );
+    todo_wine ok( size == 2048, "got %lu\n", size );
+
     WsFreeChannel( channel );
 }
 
@@ -441,6 +448,8 @@ struct listener_info
     WS_CHANNEL_BINDING  binding;
     WS_CHANNEL_TYPE     type;
     void                (*server_func)( WS_CHANNEL * );
+    LPTHREAD_START_ROUTINE listener_proc;
+    ULONG                  dict_size;
 };
 
 static void server_message_read_write( WS_CHANNEL *channel )
@@ -779,6 +788,104 @@ static void client_duplex_session_async( const struct listener_info *info )
     WsFreeChannel( channel );
 }
 
+static const char *dict_str = "teststrteststrteteststrteststrteteststrteststrteteststrteststrteteststrteststrteteststrteststrteteststrteststrteststrteststr_";
+static const char *short_dict_str = "final_str";
+static void client_duplex_session_dict( const struct listener_info *info )
+{
+    WS_XML_STRING action = {6, (BYTE *)"action"}, ns = {2, (BYTE *)"ns"}, local_name;
+    const WS_MESSAGE_DESCRIPTION *descs[1];
+    WS_ELEMENT_DESCRIPTION desc_body;
+    ULONG size, cur_dict_bytes = 0;
+    WS_MESSAGE_DESCRIPTION desc;
+    WS_ENDPOINT_ADDRESS addr;
+    WS_CHANNEL_PROPERTY prop;
+    int dict_str_cnt = 0;
+    char elem_name[128];
+    WS_CHANNEL *channel;
+    WS_MESSAGE *msg;
+    INT32 val = -1;
+    WCHAR buf[64];
+    HRESULT hr;
+    DWORD err;
+
+    err = WaitForSingleObject( info->ready, 3000 );
+    ok( err == WAIT_OBJECT_0, "wait failed %lu\n", err );
+
+    size = info->dict_size;
+    prop.id = WS_CHANNEL_PROPERTY_MAX_SESSION_DICTIONARY_SIZE;
+    prop.value = &size;
+    prop.valueSize = sizeof(size);
+    hr = WsCreateChannel( info->type, info->binding, &prop, 1, NULL, &channel, NULL );
+    ok( hr == S_OK, "got %#lx\n", hr );
+
+    size = 0xdeadbeef;
+    hr = WsGetChannelProperty( channel, WS_CHANNEL_PROPERTY_MAX_SESSION_DICTIONARY_SIZE, &size, sizeof(size), NULL );
+    ok( hr == S_OK, "got %#lx\n", hr );
+    ok( size == info->dict_size, "got %lu\n", size );
+
+    hr = WsShutdownSessionChannel( channel, NULL, NULL );
+    ok( hr == WS_E_INVALID_OPERATION, "got %#lx\n", hr );
+
+    memset( &addr, 0, sizeof(addr) );
+    addr.url.length = wsprintfW( buf, L"net.tcp://localhost:%u", info->port );
+    addr.url.chars  = buf;
+    hr = WsOpenChannel( channel, &addr, NULL, NULL );
+    ok( hr == S_OK, "got %#lx\n", hr );
+
+    memset(&local_name, 0, sizeof(local_name));
+    desc_body.elementLocalName = &local_name;
+    desc_body.elementNs        = &ns;
+    desc_body.type             = WS_INT32_TYPE;
+    desc_body.typeDescription  = NULL;
+
+    desc.action                 = &action;
+    desc.bodyElementDescription = &desc_body;
+    descs[0] = &desc;
+
+    while (1)
+    {
+        hr = WsCreateMessageForChannel( channel, NULL, 0, &msg, NULL );
+        ok( hr == S_OK, "got %#lx\n", hr );
+
+        sprintf(elem_name, "%s%02x", dict_str, dict_str_cnt);
+        local_name.length = strlen(elem_name);
+        local_name.bytes = (BYTE *)elem_name;
+
+        hr = WsReceiveMessage( channel, msg, descs, 1, WS_RECEIVE_REQUIRED_MESSAGE, WS_READ_REQUIRED_VALUE,
+                               NULL, &val, sizeof(val), NULL, NULL, NULL );
+        ok( hr == S_OK, "got %#lx\n", hr );
+
+        WsFreeMessage( msg );
+
+        dict_str_cnt++;
+        cur_dict_bytes += strlen(elem_name) + 1;
+
+        if ((cur_dict_bytes + strlen(elem_name) + 1) > info->dict_size) break;
+    }
+
+    hr = WsCreateMessageForChannel( channel, NULL, 0, &msg, NULL );
+    ok( hr == S_OK, "got %#lx\n", hr );
+
+    local_name.length = strlen(short_dict_str);
+    local_name.bytes = (BYTE *)short_dict_str;
+    hr = WsReceiveMessage( channel, msg, descs, 1, WS_RECEIVE_REQUIRED_MESSAGE, WS_READ_REQUIRED_VALUE,
+                           NULL, &val, sizeof(val), NULL, NULL, NULL );
+    todo_wine ok( hr == WS_E_QUOTA_EXCEEDED, "got %#lx\n", hr);
+
+    WsFreeMessage( msg );
+
+    hr = WsShutdownSessionChannel( channel, NULL, NULL );
+    todo_wine ok( hr == WS_E_OBJECT_FAULTED, "got %#lx\n", hr );
+
+    hr = WsCloseChannel( channel, NULL, NULL );
+    ok( hr == S_OK, "got %#lx\n", hr );
+
+    err = WaitForSingleObject( info->done, 3000 );
+    ok( err == WAIT_OBJECT_0, "wait failed %lu\n", err );
+
+    WsFreeChannel( channel );
+}
+
 static void server_accept_channel( WS_CHANNEL *channel )
 {
     WS_XML_STRING localname = {9, (BYTE *)"localname"}, ns = {2, (BYTE *)"ns"}, action = {6, (BYTE *)"action"};
@@ -1024,9 +1131,245 @@ static DWORD CALLBACK listener_proc( void *arg )
     return 0;
 }
 
+static int write_size( char *buf, int size )
+{
+    if (size < 0x80)
+    {
+        buf[0] = size;
+        return 1;
+    }
+
+    buf[0] = (size & 0x7f) | 0x80;
+    if ((size >>= 7) < 0x80)
+    {
+        buf[1] = size;
+        return 2;
+    }
+    buf[1] = (size & 0x7f) | 0x80;
+    if ((size >>= 7) < 0x80)
+    {
+        buf[2] = size;
+        return 3;
+    }
+    buf[2] = (size & 0x7f) | 0x80;
+    if ((size >>= 7) < 0x80)
+    {
+        buf[3] = size;
+        return 4;
+    }
+    buf[3] = (size & 0x7f) | 0x80;
+
+    if ((size >>= 7) < 0x08)
+    {
+        buf[4] = size;
+        return 5;
+    }
+
+    return 0;
+}
+
+static const char send_record_begin[] = {
+    0x56, 0x02, 0x0b, 0x01, 0x61, 0x06, 0x0b, 0x01,
+    0x73, 0x04, 0x56, 0x08, 0x44, 0x0a, 0x1e, 0x00,
+    0x82, 0x99, 0x06, 0x61, 0x63, 0x74, 0x69, 0x6f,
+    0x6e, 0x44, 0x0c, 0x1e, 0x00, 0x82, 0x99
+};
+
+static const char send_record_middle[] = { 0x01, 0x56, 0x0e, 0x42 };
+static const char send_record_end[] = { 0x08, 0x02, 0x6e, 0x73, 0x89, 0xff, 0x01, 0x01 };
+
+static BOOL send_dict_str( int sock, char *addr, const char *str, int dict_str_count )
+{
+    char buf[512], dict_buf[256], body_buf[128], dict_size_buf[5];
+    int offset, dict_buf_size, body_buf_size, dict_size;
+
+    /* Session dictionary strings. */
+    offset = write_size( dict_buf, strlen(str) );
+    memcpy( dict_buf + offset, str, strlen(str) );
+    dict_buf_size = strlen(str) + offset;
+
+    dict_size = write_size( dict_size_buf, dict_buf_size );
+
+    /* Message body. */
+    memcpy( body_buf, send_record_begin, ARRAY_SIZE(send_record_begin) );
+    offset = ARRAY_SIZE(send_record_begin);
+
+    offset += write_size( body_buf + offset, strlen(addr) );
+    memcpy( body_buf + offset, addr, strlen(addr) );
+    offset += strlen(addr);
+
+    memcpy( body_buf + offset, send_record_middle, ARRAY_SIZE(send_record_middle) );
+    offset += ARRAY_SIZE(send_record_middle);
+
+    /* All session dictionary values are odd, i.e 0 == 1, 1 == 3, 2 == 5 */
+    offset += write_size( body_buf + offset, (dict_str_count << 1) + 1 );
+
+    memcpy( body_buf + offset, send_record_end, ARRAY_SIZE(send_record_end) );
+    body_buf_size = offset + ARRAY_SIZE(send_record_end);
+
+    /* Sized envelope record type */
+    buf[0] = 0x06;
+    offset = 1;
+    offset += write_size( buf + 1, body_buf_size + dict_buf_size + dict_size );
+    memcpy( buf + offset, dict_size_buf, dict_size );
+    offset += dict_size;
+    memcpy( buf + offset, dict_buf, dict_buf_size );
+    offset += dict_buf_size;
+    memcpy( buf + offset, body_buf, body_buf_size );
+    offset += body_buf_size;
+
+    if (send( sock, buf, offset, 0 ) != offset)
+    {
+        ok(0, "Failed to send message\n");
+        return FALSE;
+    }
+
+    return TRUE;
+}
+
+static const char preamble_begin[] = { 0x00, 0x01, 0x00, 0x01, 0x02, 0x02 };
+static const char preamble_end[] = { 0x03, 0x08, 0x0c };
+
+static BOOL send_preamble( int sock, char *host )
+{
+    char buf[256];
+    int offset;
+
+    memcpy(buf, preamble_begin, ARRAY_SIZE(preamble_begin));
+    offset = ARRAY_SIZE(preamble_begin);
+
+    offset += write_size( buf + offset, strlen(host) );
+    memcpy(buf + offset, host, strlen(host));
+    offset += strlen(host);
+
+    memcpy(buf + offset, preamble_end, ARRAY_SIZE(preamble_end));
+    offset += ARRAY_SIZE(preamble_end);
+    if (send( sock, buf, offset, 0 ) != offset)
+    {
+        ok(0, "Failed to send preamble\n");
+        return FALSE;
+    }
+
+    /* Receive ACK record. */
+    if ((recv( sock, buf, 1, 0 ) != 1) || buf[0] != 0x0b)
+    {
+        ok(0, "Failed to receive ACK record\n");
+        return FALSE;
+    }
+
+    return TRUE;
+}
+
+static BOOL recv_preamble( int sock, char *host )
+{
+    BOOL success = TRUE;
+    char buf[256], tmp_buf[5];
+    int tmp_size;
+
+    recv( sock, buf, ARRAY_SIZE(preamble_begin), 0 );
+    if (memcmp( buf, preamble_begin, ARRAY_SIZE(preamble_begin) ))
+    {
+        success = FALSE;
+        goto exit;
+    }
+
+    tmp_size = write_size( tmp_buf, strlen(host) );
+    recv( sock, buf, tmp_size, 0 );
+    if (memcmp( buf, tmp_buf, tmp_size ))
+    {
+        success = FALSE;
+        goto exit;
+    }
+
+    recv( sock, buf, strlen(host), 0 );
+    if (memcmp( buf, host, strlen(host) ))
+    {
+        success = FALSE;
+        goto exit;
+    }
+
+    recv( sock, buf, ARRAY_SIZE(preamble_end), 0 );
+    if (memcmp( buf, preamble_end, ARRAY_SIZE(preamble_end) ))
+    {
+        success = FALSE;
+        goto exit;
+    }
+
+    /* Send ACK record. */
+    buf[0] = 0x0b;
+    send( sock, buf, 1, 0 );
+
+exit:
+    ok( success, "Failed to receive proper preamble\n" );
+    return success;
+}
+
+static DWORD CALLBACK listener_socket_proc( void *arg )
+{
+    int res, c = -1, on = 1, dict_str_cnt = 0;
+    struct listener_info *info = arg;
+    char dict_str_buf[256], addr[64];
+    TIMEVAL timeval = { 0, 10000 };
+    ULONG cur_dict_bytes = 0;
+    struct sockaddr_in sa;
+    WSADATA wsa;
+    FD_SET set;
+    SOCKET s;
+
+    WSAStartup( MAKEWORD(1,1), &wsa );
+    if ((s = socket( AF_INET, SOCK_STREAM, 0 )) == INVALID_SOCKET) return 1;
+    setsockopt( s, SOL_SOCKET, SO_REUSEADDR, (char *)&on, sizeof(on) );
+
+    memset( &sa, 0, sizeof(sa) );
+    sa.sin_family           = AF_INET;
+    sa.sin_port             = htons( info->port );
+    sa.sin_addr.S_un.S_addr = inet_addr( "127.0.0.1" );
+    if (bind( s, (struct sockaddr *)&sa, sizeof(sa) ) < 0) return 1;
+
+    listen( s, 0 );
+    SetEvent( info->ready );
+    c = accept( s, NULL, NULL );
+
+    memset( addr, 0, ARRAY_SIZE(addr) );
+    sprintf( addr, "net.tcp://localhost:%u", info->port );
+
+    FD_ZERO( &set );
+    FD_SET( c, &set );
+    /* Windows tends to send a preamble immediately, Wine does not. */
+    if ((res = select( c + 1, &set, NULL, NULL, &timeval )) > 0)
+    {
+        if (!recv_preamble( c, addr )) goto exit;
+    }
+    else
+    {
+        if (!send_preamble( c, addr )) goto exit;
+    }
+
+    /* Now we begin sending out dictionary strings. */
+    while (1)
+    {
+        sprintf(dict_str_buf, "%s%02x", dict_str, dict_str_cnt);
+        send_dict_str( c, addr, dict_str_buf, dict_str_cnt );
+        dict_str_cnt++;
+        cur_dict_bytes += strlen(dict_str_buf) + 1;
+
+        if ((cur_dict_bytes + strlen(dict_str_buf) + 1) > info->dict_size) break;
+    }
+
+    send_dict_str( c, addr, short_dict_str, dict_str_cnt );
+
+exit:
+    shutdown( c, 2 );
+    closesocket( c );
+    closesocket( s );
+
+    SetEvent( info->done );
+    return 0;
+}
+
 static HANDLE start_listener( struct listener_info *info )
 {
-    HANDLE thread = CreateThread( NULL, 0, listener_proc, info, 0, NULL );
+    HANDLE thread = CreateThread( NULL, 0, info->listener_proc, info, 0, NULL );
     ok( thread != NULL, "failed to create listener thread %lu\n", GetLastError() );
     return thread;
 }
@@ -1164,15 +1507,19 @@ START_TEST(channel)
         WS_CHANNEL_TYPE    type;
         void               (*server_func)( WS_CHANNEL * );
         void               (*client_func)( const struct listener_info * );
+        LPTHREAD_START_ROUTINE listener_proc;
+        ULONG                  dict_size;
     }
     tests[] =
     {
-        { WS_UDP_CHANNEL_BINDING, WS_CHANNEL_TYPE_DUPLEX, server_message_read_write, client_message_read_write },
-        { WS_TCP_CHANNEL_BINDING, WS_CHANNEL_TYPE_DUPLEX_SESSION, server_duplex_session, client_duplex_session },
-        { WS_UDP_CHANNEL_BINDING, WS_CHANNEL_TYPE_DUPLEX, server_accept_channel, client_accept_channel },
-        { WS_TCP_CHANNEL_BINDING, WS_CHANNEL_TYPE_DUPLEX_SESSION, server_accept_channel, client_accept_channel },
-        { WS_TCP_CHANNEL_BINDING, WS_CHANNEL_TYPE_DUPLEX_SESSION, server_request_reply, client_request_reply },
-        { WS_TCP_CHANNEL_BINDING, WS_CHANNEL_TYPE_DUPLEX_SESSION, server_duplex_session, client_duplex_session_async },
+        { WS_UDP_CHANNEL_BINDING, WS_CHANNEL_TYPE_DUPLEX, server_message_read_write, client_message_read_write, listener_proc },
+        { WS_TCP_CHANNEL_BINDING, WS_CHANNEL_TYPE_DUPLEX_SESSION, server_duplex_session, client_duplex_session, listener_proc },
+        { WS_UDP_CHANNEL_BINDING, WS_CHANNEL_TYPE_DUPLEX, server_accept_channel, client_accept_channel, listener_proc },
+        { WS_TCP_CHANNEL_BINDING, WS_CHANNEL_TYPE_DUPLEX_SESSION, server_accept_channel, client_accept_channel, listener_proc },
+        { WS_TCP_CHANNEL_BINDING, WS_CHANNEL_TYPE_DUPLEX_SESSION, server_request_reply, client_request_reply, listener_proc },
+        { WS_TCP_CHANNEL_BINDING, WS_CHANNEL_TYPE_DUPLEX_SESSION, server_duplex_session, client_duplex_session_async, listener_proc },
+        { WS_TCP_CHANNEL_BINDING, WS_CHANNEL_TYPE_DUPLEX_SESSION, NULL, client_duplex_session_dict, listener_socket_proc, 2048 },
+        { WS_TCP_CHANNEL_BINDING, WS_CHANNEL_TYPE_DUPLEX_SESSION, NULL, client_duplex_session_dict, listener_socket_proc, 4096 },
     };
 
     if (firewall_enabled)
@@ -1206,6 +1553,8 @@ START_TEST(channel)
         info.binding     = tests[i].binding;
         info.type        = tests[i].type;
         info.server_func = tests[i].server_func;
+        info.listener_proc = tests[i].listener_proc;
+        info.dict_size     = tests[i].dict_size;
 
         thread = start_listener( &info );
         tests[i].client_func( &info );
-- 
2.25.1




More information about the wine-devel mailing list