blob: c0548956ef3658bb4fa261712f01ef48a757cfef [file] [log] [blame]
Paul Bakker33b43f12013-08-20 11:48:36 +02001/* BEGIN_HEADER */
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +00002#include "mbedtls/base64.h"
Paul Elliott448d5462021-02-24 15:32:42 +00003#include <test/constant_flow.h>
Paul Bakker33b43f12013-08-20 11:48:36 +02004/* END_HEADER */
Paul Bakker367dae42009-06-28 21:50:27 +00005
Paul Bakker33b43f12013-08-20 11:48:36 +02006/* BEGIN_DEPENDENCIES
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02007 * depends_on:MBEDTLS_BASE64_C
Paul Bakker33b43f12013-08-20 11:48:36 +02008 * END_DEPENDENCIES
9 */
Paul Bakker5690efc2011-05-26 13:16:06 +000010
Gilles Peskinea64417a2021-08-03 12:38:55 +020011/* BEGIN_CASE depends_on:MBEDTLS_TEST_HOOKS */
12void mask_of_range( int low_arg, int high_arg )
13{
14 unsigned char low = low_arg, high = high_arg;
15 unsigned c;
16 for( c = 0; c <= 0xff; c++ )
17 {
18 mbedtls_test_set_step( c );
19 TEST_CF_SECRET( &c, sizeof( c ) );
20 unsigned char m = mbedtls_base64_mask_of_range( low, high, c );
21 TEST_CF_PUBLIC( &c, sizeof( c ) );
Gilles Peskine27298782021-08-03 17:41:49 +020022 TEST_CF_PUBLIC( &m, sizeof( m ) );
Gilles Peskinea64417a2021-08-03 12:38:55 +020023 if( low <= c && c <= high )
24 TEST_EQUAL( m, 0xff );
25 else
26 TEST_EQUAL( m, 0 );
27 }
28}
29/* END_CASE */
30
31/* BEGIN_CASE depends_on:MBEDTLS_TEST_HOOKS */
32void enc_chars( char *chars )
33{
34 for( unsigned value = 0; value < 64; value++ )
35 {
36 mbedtls_test_set_step( value );
37 TEST_CF_SECRET( &value, sizeof( value ) );
38 unsigned char digit = mbedtls_base64_enc_char( value );
39 TEST_CF_PUBLIC( &value, sizeof( value ) );
40 TEST_CF_PUBLIC( &digit, sizeof( digit ) );
41 TEST_EQUAL( digit, chars[value] );
42 }
43}
44/* END_CASE */
45
46/* BEGIN_CASE depends_on:MBEDTLS_TEST_HOOKS */
47void dec_chars( char *chars )
48{
49 char *p;
50 const size_t chars_len = strlen( chars );
51 signed char expected;
52
53 for( unsigned c = 0; c <= 0xff; c++ )
54 {
55 mbedtls_test_set_step( c );
56 p = memchr( chars, c, chars_len );
57 if( p == NULL )
58 expected = -1;
59 else
60 expected = p - chars;
61 TEST_CF_SECRET( &c, sizeof( c ) );
62 signed char actual = mbedtls_base64_dec_value( c );
63 TEST_CF_PUBLIC( &c, sizeof( c ) );
64 TEST_CF_PUBLIC( &actual, sizeof( actual ) );
65 TEST_EQUAL( actual, expected );
66 }
67}
68/* END_CASE */
69
Paul Bakker33b43f12013-08-20 11:48:36 +020070/* BEGIN_CASE */
Azim Khanf1aaec92017-05-30 14:23:15 +010071void mbedtls_base64_encode( char * src_string, char * dst_string,
72 int dst_buf_size, int result )
Paul Bakker367dae42009-06-28 21:50:27 +000073{
74 unsigned char src_str[1000];
75 unsigned char dst_str[1000];
Paul Elliott448d5462021-02-24 15:32:42 +000076 size_t len, src_len;
Paul Bakker367dae42009-06-28 21:50:27 +000077
78 memset(src_str, 0x00, 1000);
79 memset(dst_str, 0x00, 1000);
80
Paul Bakkerdd0aae92014-04-17 16:06:37 +020081 strncpy( (char *) src_str, src_string, sizeof(src_str) - 1 );
Paul Elliott448d5462021-02-24 15:32:42 +000082 src_len = strlen( (char *) src_str );
83
84 TEST_CF_SECRET( src_str, sizeof( src_str ) );
85 TEST_ASSERT( mbedtls_base64_encode( dst_str, dst_buf_size, &len, src_str, src_len) == result );
86 TEST_CF_PUBLIC( src_str, sizeof( src_str ) );
87
Paul Elliottc48cb802021-03-02 22:48:40 +000088 /* dest_str will have had tainted data copied to it, prevent the TEST_ASSERT below from triggering
89 CF failures by unmarking it. */
90 TEST_CF_PUBLIC( dst_str, len );
91
Paul Bakker33b43f12013-08-20 11:48:36 +020092 if( result == 0 )
Paul Bakker5946fd92009-07-11 15:29:30 +000093 {
Paul Bakker33b43f12013-08-20 11:48:36 +020094 TEST_ASSERT( strcmp( (char *) dst_str, dst_string ) == 0 );
Paul Bakker5946fd92009-07-11 15:29:30 +000095 }
Paul Bakker367dae42009-06-28 21:50:27 +000096}
Paul Bakker33b43f12013-08-20 11:48:36 +020097/* END_CASE */
Paul Bakker367dae42009-06-28 21:50:27 +000098
Paul Bakker33b43f12013-08-20 11:48:36 +020099/* BEGIN_CASE */
Azim Khanf1aaec92017-05-30 14:23:15 +0100100void mbedtls_base64_decode( char * src_string, char * dst_string, int result )
Paul Bakker367dae42009-06-28 21:50:27 +0000101{
102 unsigned char src_str[1000];
103 unsigned char dst_str[1000];
Manuel Pégourié-Gonnardba561362015-06-02 16:30:35 +0100104 size_t len;
Manuel Pégourié-Gonnard64938c62014-10-15 21:45:39 +0200105 int res;
Paul Bakker367dae42009-06-28 21:50:27 +0000106
107 memset(src_str, 0x00, 1000);
108 memset(dst_str, 0x00, 1000);
Paul Bakkerdd0aae92014-04-17 16:06:37 +0200109
110 strncpy( (char *) src_str, src_string, sizeof(src_str) - 1 );
Manuel Pégourié-Gonnardba561362015-06-02 16:30:35 +0100111 res = mbedtls_base64_decode( dst_str, sizeof( dst_str ), &len, src_str, strlen( (char *) src_str ) );
Paul Bakker94b916c2014-04-17 16:07:20 +0200112 TEST_ASSERT( res == result );
Paul Bakker33b43f12013-08-20 11:48:36 +0200113 if( result == 0 )
Paul Bakker5946fd92009-07-11 15:29:30 +0000114 {
Paul Bakker33b43f12013-08-20 11:48:36 +0200115 TEST_ASSERT( strcmp( (char *) dst_str, dst_string ) == 0 );
Paul Bakker5946fd92009-07-11 15:29:30 +0000116 }
Paul Bakker367dae42009-06-28 21:50:27 +0000117}
Paul Bakker33b43f12013-08-20 11:48:36 +0200118/* END_CASE */
Paul Bakker3d360822009-07-05 11:29:38 +0000119
Paul Bakkerd5983182014-07-04 13:50:31 +0200120/* BEGIN_CASE */
Azim Khan5fcca462018-06-29 11:05:32 +0100121void base64_encode_hex( data_t * src, char * dst, int dst_buf_size,
Paul Bakkerd5983182014-07-04 13:50:31 +0200122 int result )
123{
Azim Khand30ca132017-06-09 04:32:58 +0100124 unsigned char *res = NULL;
125 size_t len;
Paul Bakkerd5983182014-07-04 13:50:31 +0200126
Ronald Cron690f3eb2020-06-10 10:42:18 +0200127 res = mbedtls_test_zero_alloc( dst_buf_size );
Paul Bakkerd5983182014-07-04 13:50:31 +0200128
Paul Elliott448d5462021-02-24 15:32:42 +0000129 TEST_CF_SECRET( src->x, src->len );
Azim Khand30ca132017-06-09 04:32:58 +0100130 TEST_ASSERT( mbedtls_base64_encode( res, dst_buf_size, &len, src->x, src->len ) == result );
Paul Elliott448d5462021-02-24 15:32:42 +0000131 TEST_CF_PUBLIC( src->x, src->len );
132
Paul Elliottc48cb802021-03-02 22:48:40 +0000133 /* res will have had tainted data copied to it, prevent the TEST_ASSERT below from triggering
134 CF failures by unmarking it. */
135 TEST_CF_PUBLIC( res, len );
136
Paul Bakkerd5983182014-07-04 13:50:31 +0200137 if( result == 0 )
138 {
139 TEST_ASSERT( len == strlen( dst ) );
140 TEST_ASSERT( memcmp( dst, res, len ) == 0 );
141 }
Paul Bakker6697b6c2014-07-04 18:35:50 +0200142
Paul Bakkerbd51b262014-07-10 15:26:12 +0200143exit:
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200144 mbedtls_free( res );
Paul Bakkerd5983182014-07-04 13:50:31 +0200145}
146/* END_CASE */
147
148/* BEGIN_CASE */
Azim Khan5fcca462018-06-29 11:05:32 +0100149void base64_decode_hex( char * src, data_t * dst, int dst_buf_size,
Paul Bakkerd5983182014-07-04 13:50:31 +0200150 int result )
151{
Azim Khand30ca132017-06-09 04:32:58 +0100152 unsigned char *res = NULL;
153 size_t len;
Paul Bakkerd5983182014-07-04 13:50:31 +0200154
Ronald Cron690f3eb2020-06-10 10:42:18 +0200155 res = mbedtls_test_zero_alloc( dst_buf_size );
Paul Bakkerd5983182014-07-04 13:50:31 +0200156
Manuel Pégourié-Gonnardba561362015-06-02 16:30:35 +0100157 TEST_ASSERT( mbedtls_base64_decode( res, dst_buf_size, &len, (unsigned char *) src,
Paul Bakkerd5983182014-07-04 13:50:31 +0200158 strlen( src ) ) == result );
159 if( result == 0 )
160 {
Azim Khand30ca132017-06-09 04:32:58 +0100161 TEST_ASSERT( len == dst->len );
162 TEST_ASSERT( memcmp( dst->x, res, len ) == 0 );
Paul Bakkerd5983182014-07-04 13:50:31 +0200163 }
Paul Bakker6697b6c2014-07-04 18:35:50 +0200164
Paul Bakkerbd51b262014-07-10 15:26:12 +0200165exit:
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200166 mbedtls_free( res );
Paul Bakkerd5983182014-07-04 13:50:31 +0200167}
168/* END_CASE */
169
Manuel Pégourié-Gonnard64938c62014-10-15 21:45:39 +0200170/* BEGIN_CASE */
Azim Khan5fcca462018-06-29 11:05:32 +0100171void base64_decode_hex_src( data_t * src, char * dst_ref, int result )
Manuel Pégourié-Gonnard64938c62014-10-15 21:45:39 +0200172{
173 unsigned char dst[1000] = { 0 };
Azim Khand30ca132017-06-09 04:32:58 +0100174 size_t len;
Manuel Pégourié-Gonnard64938c62014-10-15 21:45:39 +0200175
Azim Khand30ca132017-06-09 04:32:58 +0100176 TEST_ASSERT( mbedtls_base64_decode( dst, sizeof( dst ), &len, src->x, src->len ) == result );
Manuel Pégourié-Gonnard64938c62014-10-15 21:45:39 +0200177 if( result == 0 )
178 {
179 TEST_ASSERT( len == strlen( dst_ref ) );
180 TEST_ASSERT( memcmp( dst, dst_ref, len ) == 0 );
181 }
182
183exit:
Azim Khand30ca132017-06-09 04:32:58 +0100184 ;;
Manuel Pégourié-Gonnard64938c62014-10-15 21:45:39 +0200185}
186/* END_CASE */
187
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200188/* BEGIN_CASE depends_on:MBEDTLS_SELF_TEST */
Azim Khanf1aaec92017-05-30 14:23:15 +0100189void base64_selftest( )
Paul Bakker3d360822009-07-05 11:29:38 +0000190{
Andres AG93012e82016-09-09 09:10:28 +0100191 TEST_ASSERT( mbedtls_base64_self_test( 1 ) == 0 );
Paul Bakker3d360822009-07-05 11:29:38 +0000192}
Paul Bakker33b43f12013-08-20 11:48:36 +0200193/* END_CASE */