test_suite_base64.function 3.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134
  1. /* BEGIN_HEADER */
  2. #include "mbedtls/base64.h"
  3. /* END_HEADER */
  4. /* BEGIN_DEPENDENCIES
  5. * depends_on:MBEDTLS_BASE64_C
  6. * END_DEPENDENCIES
  7. */
  8. /* BEGIN_CASE */
  9. void mbedtls_base64_encode( char * src_string, char * dst_string,
  10. int dst_buf_size, int result )
  11. {
  12. unsigned char src_str[1000];
  13. unsigned char dst_str[1000];
  14. size_t len, src_len;
  15. memset(src_str, 0x00, 1000);
  16. memset(dst_str, 0x00, 1000);
  17. strncpy( (char *) src_str, src_string, sizeof(src_str) - 1 );
  18. src_len = strlen( (char *) src_str );
  19. TEST_CF_SECRET( src_str, sizeof( src_str ) );
  20. TEST_ASSERT( mbedtls_base64_encode( dst_str, dst_buf_size, &len, src_str, src_len) == result );
  21. TEST_CF_PUBLIC( src_str, sizeof( src_str ) );
  22. /* dest_str will have had tainted data copied to it, prevent the TEST_ASSERT below from triggering
  23. CF failures by unmarking it. */
  24. TEST_CF_PUBLIC( dst_str, len );
  25. if( result == 0 )
  26. {
  27. TEST_ASSERT( strcmp( (char *) dst_str, dst_string ) == 0 );
  28. }
  29. }
  30. /* END_CASE */
  31. /* BEGIN_CASE */
  32. void mbedtls_base64_decode( char * src_string, char * dst_string, int result )
  33. {
  34. unsigned char src_str[1000];
  35. unsigned char dst_str[1000];
  36. size_t len;
  37. int res;
  38. memset(src_str, 0x00, 1000);
  39. memset(dst_str, 0x00, 1000);
  40. strncpy( (char *) src_str, src_string, sizeof(src_str) - 1 );
  41. res = mbedtls_base64_decode( dst_str, sizeof( dst_str ), &len, src_str, strlen( (char *) src_str ) );
  42. TEST_ASSERT( res == result );
  43. if( result == 0 )
  44. {
  45. TEST_ASSERT( strcmp( (char *) dst_str, dst_string ) == 0 );
  46. }
  47. }
  48. /* END_CASE */
  49. /* BEGIN_CASE */
  50. void base64_encode_hex( data_t * src, char * dst, int dst_buf_size,
  51. int result )
  52. {
  53. unsigned char *res = NULL;
  54. size_t len;
  55. res = zero_alloc( dst_buf_size );
  56. TEST_CF_SECRET( src->x, src->len );
  57. TEST_ASSERT( mbedtls_base64_encode( res, dst_buf_size, &len, src->x, src->len ) == result );
  58. TEST_CF_PUBLIC( src->x, src->len );
  59. /* res will have had tainted data copied to it, prevent the TEST_ASSERT below from triggering
  60. CF failures by unmarking it. */
  61. TEST_CF_PUBLIC( res, len );
  62. if( result == 0 )
  63. {
  64. TEST_ASSERT( len == strlen( dst ) );
  65. TEST_ASSERT( memcmp( dst, res, len ) == 0 );
  66. }
  67. exit:
  68. mbedtls_free( res );
  69. }
  70. /* END_CASE */
  71. /* BEGIN_CASE */
  72. void base64_decode_hex( char * src, data_t * dst, int dst_buf_size,
  73. int result )
  74. {
  75. unsigned char *res = NULL;
  76. size_t len;
  77. res = zero_alloc( dst_buf_size );
  78. TEST_ASSERT( mbedtls_base64_decode( res, dst_buf_size, &len, (unsigned char *) src,
  79. strlen( src ) ) == result );
  80. if( result == 0 )
  81. {
  82. TEST_ASSERT( len == dst->len );
  83. TEST_ASSERT( memcmp( dst->x, res, len ) == 0 );
  84. }
  85. exit:
  86. mbedtls_free( res );
  87. }
  88. /* END_CASE */
  89. /* BEGIN_CASE */
  90. void base64_decode_hex_src( data_t * src, char * dst_ref, int result )
  91. {
  92. unsigned char dst[1000] = { 0 };
  93. size_t len;
  94. TEST_ASSERT( mbedtls_base64_decode( dst, sizeof( dst ), &len, src->x, src->len ) == result );
  95. if( result == 0 )
  96. {
  97. TEST_ASSERT( len == strlen( dst_ref ) );
  98. TEST_ASSERT( memcmp( dst, dst_ref, len ) == 0 );
  99. }
  100. exit:
  101. ;;
  102. }
  103. /* END_CASE */
  104. /* BEGIN_CASE depends_on:MBEDTLS_SELF_TEST */
  105. void base64_selftest( )
  106. {
  107. TEST_ASSERT( mbedtls_base64_self_test( 1 ) == 0 );
  108. }
  109. /* END_CASE */