-
Notifications
You must be signed in to change notification settings - Fork 31
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CBMC Proof Failure Fixes #55
Conversation
test/cbmc/proofs/SigV4_GenerateHTTPAuthorization/SigV4_GenerateHTTPAuthorization_harness.c
Outdated
Show resolved
Hide resolved
@@ -75,6 +75,7 @@ void harness() | |||
__CPROVER_assume( pHttpParams->pathLen < MAX_URI_LEN ); | |||
__CPROVER_assume( pHttpParams->queryLen < MAX_QUERY_LEN ); | |||
__CPROVER_assume( pHttpParams->headersLen < MAX_HEADERS_LEN ); | |||
__CPROVER_assume( pHttpParams->pPayload != NULL ); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The payload can be NULL, no? If it's NULL, then it just uses the empty string.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Has it been handled in the code separately that if payload is NULL then we should substitute it with empty string or the application provided hash functions will take care of it?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I tested it locally before the release and the library should handle it
…eHTTPAuthorization_harness.c Co-authored-by: Oscar Michael Abrina <[email protected]>
This PR updates the GenerateHTTPAuthHeader API CBMC Proof after the payload optimization changes.
By submitting this pull request, I confirm that my contribution is made under the terms of the MIT license.