mirror of
https://github.com/yuzu-emu/mbedtls.git
synced 2024-11-30 11:24:14 +01:00
d3e5dd3f3a
digits is also a local variable in host_test.function, leading to compilers complaining about that shadowing the global variable in test_suite_base64.function. Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
201 lines
5.4 KiB
Plaintext
201 lines
5.4 KiB
Plaintext
/* BEGIN_HEADER */
|
|
#include "mbedtls/base64.h"
|
|
#include "base64_invasive.h"
|
|
#include <test/constant_flow.h>
|
|
|
|
#if defined(MBEDTLS_TEST_HOOKS)
|
|
static const char base64_digits[] =
|
|
"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/";
|
|
#endif /* MBEDTLS_TEST_HOOKS */
|
|
|
|
/* END_HEADER */
|
|
|
|
/* BEGIN_DEPENDENCIES
|
|
* depends_on:MBEDTLS_BASE64_C
|
|
* END_DEPENDENCIES
|
|
*/
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_TEST_HOOKS */
|
|
void mask_of_range( int low_arg, int high_arg )
|
|
{
|
|
unsigned char low = low_arg, high = high_arg;
|
|
unsigned c;
|
|
for( c = 0; c <= 0xff; c++ )
|
|
{
|
|
mbedtls_test_set_step( c );
|
|
TEST_CF_SECRET( &c, sizeof( c ) );
|
|
unsigned char m = mbedtls_base64_mask_of_range( low, high, c );
|
|
TEST_CF_PUBLIC( &c, sizeof( c ) );
|
|
TEST_CF_PUBLIC( &m, sizeof( m ) );
|
|
if( low <= c && c <= high )
|
|
TEST_EQUAL( m, 0xff );
|
|
else
|
|
TEST_EQUAL( m, 0 );
|
|
}
|
|
}
|
|
/* END_CASE */
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_TEST_HOOKS */
|
|
void enc_chars( )
|
|
{
|
|
for( unsigned value = 0; value < 64; value++ )
|
|
{
|
|
mbedtls_test_set_step( value );
|
|
TEST_CF_SECRET( &value, sizeof( value ) );
|
|
unsigned char digit = mbedtls_base64_enc_char( value );
|
|
TEST_CF_PUBLIC( &value, sizeof( value ) );
|
|
TEST_CF_PUBLIC( &digit, sizeof( digit ) );
|
|
TEST_EQUAL( digit, base64_digits[value] );
|
|
}
|
|
}
|
|
/* END_CASE */
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_TEST_HOOKS */
|
|
void dec_chars( )
|
|
{
|
|
char *p;
|
|
signed char expected;
|
|
|
|
for( unsigned c = 0; c <= 0xff; c++ )
|
|
{
|
|
mbedtls_test_set_step( c );
|
|
/* base64_digits is 0-terminated. sizeof()-1 excludes the trailing 0. */
|
|
p = memchr( base64_digits, c, sizeof( base64_digits ) - 1 );
|
|
if( p == NULL )
|
|
expected = -1;
|
|
else
|
|
expected = p - base64_digits;
|
|
TEST_CF_SECRET( &c, sizeof( c ) );
|
|
signed char actual = mbedtls_base64_dec_value( c );
|
|
TEST_CF_PUBLIC( &c, sizeof( c ) );
|
|
TEST_CF_PUBLIC( &actual, sizeof( actual ) );
|
|
TEST_EQUAL( actual, expected );
|
|
}
|
|
}
|
|
/* END_CASE */
|
|
|
|
/* BEGIN_CASE */
|
|
void mbedtls_base64_encode( char * src_string, char * dst_string,
|
|
int dst_buf_size, int result )
|
|
{
|
|
unsigned char src_str[1000];
|
|
unsigned char dst_str[1000];
|
|
size_t len, src_len;
|
|
|
|
memset(src_str, 0x00, 1000);
|
|
memset(dst_str, 0x00, 1000);
|
|
|
|
strncpy( (char *) src_str, src_string, sizeof(src_str) - 1 );
|
|
src_len = strlen( (char *) src_str );
|
|
|
|
TEST_CF_SECRET( src_str, sizeof( src_str ) );
|
|
TEST_ASSERT( mbedtls_base64_encode( dst_str, dst_buf_size, &len, src_str, src_len) == result );
|
|
TEST_CF_PUBLIC( src_str, sizeof( src_str ) );
|
|
|
|
/* dest_str will have had tainted data copied to it, prevent the TEST_ASSERT below from triggering
|
|
CF failures by unmarking it. */
|
|
TEST_CF_PUBLIC( dst_str, len );
|
|
|
|
if( result == 0 )
|
|
{
|
|
TEST_ASSERT( strcmp( (char *) dst_str, dst_string ) == 0 );
|
|
}
|
|
}
|
|
/* END_CASE */
|
|
|
|
/* BEGIN_CASE */
|
|
void mbedtls_base64_decode( char * src_string, char * dst_string, int result )
|
|
{
|
|
unsigned char src_str[1000];
|
|
unsigned char dst_str[1000];
|
|
size_t len;
|
|
int res;
|
|
|
|
memset(src_str, 0x00, 1000);
|
|
memset(dst_str, 0x00, 1000);
|
|
|
|
strncpy( (char *) src_str, src_string, sizeof(src_str) - 1 );
|
|
res = mbedtls_base64_decode( dst_str, sizeof( dst_str ), &len, src_str, strlen( (char *) src_str ) );
|
|
TEST_ASSERT( res == result );
|
|
if( result == 0 )
|
|
{
|
|
TEST_ASSERT( strcmp( (char *) dst_str, dst_string ) == 0 );
|
|
}
|
|
}
|
|
/* END_CASE */
|
|
|
|
/* BEGIN_CASE */
|
|
void base64_encode_hex( data_t * src, char * dst, int dst_buf_size,
|
|
int result )
|
|
{
|
|
unsigned char *res = NULL;
|
|
size_t len;
|
|
|
|
res = mbedtls_test_zero_alloc( dst_buf_size );
|
|
|
|
TEST_CF_SECRET( src->x, src->len );
|
|
TEST_ASSERT( mbedtls_base64_encode( res, dst_buf_size, &len, src->x, src->len ) == result );
|
|
TEST_CF_PUBLIC( src->x, src->len );
|
|
|
|
/* res will have had tainted data copied to it, prevent the TEST_ASSERT below from triggering
|
|
CF failures by unmarking it. */
|
|
TEST_CF_PUBLIC( res, len );
|
|
|
|
if( result == 0 )
|
|
{
|
|
TEST_ASSERT( len == strlen( dst ) );
|
|
TEST_ASSERT( memcmp( dst, res, len ) == 0 );
|
|
}
|
|
|
|
exit:
|
|
mbedtls_free( res );
|
|
}
|
|
/* END_CASE */
|
|
|
|
/* BEGIN_CASE */
|
|
void base64_decode_hex( char * src, data_t * dst, int dst_buf_size,
|
|
int result )
|
|
{
|
|
unsigned char *res = NULL;
|
|
size_t len;
|
|
|
|
res = mbedtls_test_zero_alloc( dst_buf_size );
|
|
|
|
TEST_ASSERT( mbedtls_base64_decode( res, dst_buf_size, &len, (unsigned char *) src,
|
|
strlen( src ) ) == result );
|
|
if( result == 0 )
|
|
{
|
|
TEST_ASSERT( len == dst->len );
|
|
TEST_ASSERT( memcmp( dst->x, res, len ) == 0 );
|
|
}
|
|
|
|
exit:
|
|
mbedtls_free( res );
|
|
}
|
|
/* END_CASE */
|
|
|
|
/* BEGIN_CASE */
|
|
void base64_decode_hex_src( data_t * src, char * dst_ref, int result )
|
|
{
|
|
unsigned char dst[1000] = { 0 };
|
|
size_t len;
|
|
|
|
TEST_ASSERT( mbedtls_base64_decode( dst, sizeof( dst ), &len, src->x, src->len ) == result );
|
|
if( result == 0 )
|
|
{
|
|
TEST_ASSERT( len == strlen( dst_ref ) );
|
|
TEST_ASSERT( memcmp( dst, dst_ref, len ) == 0 );
|
|
}
|
|
|
|
exit:
|
|
;;
|
|
}
|
|
/* END_CASE */
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_SELF_TEST */
|
|
void base64_selftest( )
|
|
{
|
|
TEST_ASSERT( mbedtls_base64_self_test( 1 ) == 0 );
|
|
}
|
|
/* END_CASE */
|