open5gs/tests/crypt/base64-test.c

160 lines
4.5 KiB
C

/*
* Copyright (C) 2019 by Sukchan Lee <acetcom@gmail.com>
*
* This file is part of Open5GS.
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU Affero General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <https://www.gnu.org/licenses/>.
*/
#include "ogs-crypt.h"
#include "core/abts.h"
static struct {
const char *orig;
const char *enc;
} base64_tbl[] =
{
{"", ""},
{"H", "SA=="},
{"He", "SGU="},
{"Hel", "SGVs"},
{"Hell", "SGVsbA=="},
{"Hello", "SGVsbG8="},
{"Hello World", "SGVsbG8gV29ybGQ="},
{"\xff\xff\xff\xff", "/////w=="},
};
static int num_base64 = sizeof(base64_tbl) / sizeof(base64_tbl[0]);
static void base64_test1(abts_case *tc, void *data)
{
int i;
for (i = 0; i < num_base64; i++) {
char *enc;
int orig_len, enc_len, b64_len, b64_enc_len;
orig_len = strlen(base64_tbl[i].orig);
enc_len = strlen(base64_tbl[i].enc);
/* includes + 1 for term null */
b64_enc_len = ogs_base64_encode_len(orig_len);
ABTS_ASSERT(tc, "base 64 exp. length", (enc_len == (b64_enc_len - 1)));
enc = ogs_malloc(b64_enc_len);
b64_len = ogs_base64_encode(enc, base64_tbl[i].orig, orig_len);
ABTS_ASSERT(tc, "base 64 encoded length", (b64_enc_len == b64_len));
ABTS_ASSERT(tc, "base 64 encoded matches expected output",
(memcmp(enc, base64_tbl[i].enc, b64_enc_len) == 0));
ogs_free(enc);
}
}
struct decode_tests_st {
const char *name;
uint8_t *raw;
unsigned raw_size;
const char *pem;
unsigned pem_size;
int res;
};
struct decode_tests_st decode_tests[] = {
{
.name = "dec-rnd1",
.pem = "-----BEGIN dec-rnd1-----\n"
"9ppGioRpeiiD2lLNYC85eA==\n"
"-----END rnd1-----\n",
.raw = "\xf6\x9a\x46\x8a\x84\x69\x7a\x28\x83\xda\x52\xcd\x60\x2f\x39\x78",
.raw_size = 16,
.res = OGS_OK
},
{
.name = "dec-rnd2",
.pem = "-----BEGIN dec-rnd2-----\n"
"LJ/7hUZ3TtPIz2dlc5+YvELe+Q==\n"
"-----END rnd2-----\n",
.raw = "\x2c\x9f\xfb\x85\x46\x77\x4e\xd3\xc8\xcf\x67\x65\x73\x9f\x98\xbc\x42\xde\xf9",
.raw_size = 19,
.res = OGS_OK
},
{
.name = "dec-extra-chars",
.pem = "-----BEGIN dec-extra-chars----- \n\n"
"\n\n LJ/7hUZ3TtPIz2dlc5+YvELe+Q== \n"
" -----END rnd2----- \n ",
.raw = "\x2c\x9f\xfb\x85\x46\x77\x4e\xd3\xc8\xcf\x67\x65\x73\x9f\x98\xbc\x42\xde\xf9",
.raw_size = 19,
.res = OGS_OK
},
#if 0
{
.name = "dec-invalid-header",
.pem = "-----BEGIN dec-xxx-----\n"
"LJ/7hUZ3TtPIz2dlc5+YvELe+Q==\n"
"-----END rnd2-----\n",
.raw = "\x2c\x9f\xfb\x85\x46\x77\x4e\xd3\xc8\xcf\x67\x65\x73\x9f\x98\xbc\x42\xde\xf9",
.raw_size = 19,
.res = OGS_ERROR
},
{
.name = "leak1",
.pem = "-----BEGIN leak1-----E-\x00\x00-----END ",
.pem_size = 34,
.raw = "",
.raw_size = 0,
.res = OGS_ERROR
},
#endif
};
static void base64_test2(abts_case *tc, void *data)
{
int i, rv;
ogs_datum_t result;
for (i = 0; i < sizeof(decode_tests)/sizeof(decode_tests[0]); i++) {
if (!decode_tests[i].pem_size)
decode_tests[i].pem_size = strlen(decode_tests[i].pem);
rv = ogs_fbase64_decode(
decode_tests[i].name,
(const uint8_t *)decode_tests[i].pem, decode_tests[i].pem_size,
&result);
ABTS_INT_EQUAL(tc, decode_tests[i].res, rv);
if (result.size) {
ABTS_INT_EQUAL(tc, decode_tests[i].raw_size, result.size);
ABTS_TRUE(tc,
memcmp(decode_tests[i].raw, result.data, result.size) == 0);
}
if (result.data)
ogs_free(result.data);
}
}
abts_suite *test_base64(abts_suite *suite)
{
suite = ADD_SUITE(suite)
abts_run_test(suite, base64_test1, NULL);
abts_run_test(suite, base64_test2, NULL);
return suite;
}