base64_test.c 7.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167
  1. /* LibTomCrypt, modular cryptographic library -- Tom St Denis
  2. *
  3. * LibTomCrypt is a library that provides various cryptographic
  4. * algorithms in a highly modular and flexible manner.
  5. *
  6. * The library is free for all purposes without any express
  7. * guarantee it works.
  8. */
  9. #include <tomcrypt_test.h>
  10. #if defined(LTC_BASE64) || defined(LTC_BASE64_URL)
  11. enum { insane = 0, strict = 1, relaxed = 2, invalid = 666 };
  12. int base64_test(void)
  13. {
  14. unsigned char in[64], tmp[64];
  15. char out[256];
  16. unsigned long x, l1, l2, slen1;
  17. const unsigned char special_case[] = {
  18. 0xbe, 0xe8, 0x92, 0x3c, 0xa2, 0x25, 0xf0, 0xf8,
  19. 0x91, 0xe4, 0xef, 0xab, 0x0b, 0x8c, 0xfd, 0xff,
  20. 0x14, 0xd0, 0x29, 0x9d, 0x00 };
  21. #if defined(LTC_BASE64)
  22. /*
  23. TEST CASES SOURCE:
  24. Network Working Group S. Josefsson
  25. Request for Comments: 4648 SJD
  26. Obsoletes: 3548 October 2006
  27. Category: Standards Track
  28. */
  29. const struct {
  30. const char* s;
  31. const char* b64;
  32. } cases[] = {
  33. {"", "" },
  34. {"f", "Zg==" },
  35. {"fo", "Zm8=" },
  36. {"foo", "Zm9v" },
  37. {"foob", "Zm9vYg==" },
  38. {"fooba", "Zm9vYmE=" },
  39. {"foobar", "Zm9vYmFy"},
  40. {(char*)special_case,"vuiSPKIl8PiR5O+rC4z9/xTQKZ0="}
  41. };
  42. #endif
  43. #ifdef LTC_BASE64_URL
  44. const struct {
  45. const char* s;
  46. int flag;
  47. } url_cases[] = {
  48. {"vuiSPKIl8PiR5O-rC4z9_xTQKZ0", strict}, /* 0 */
  49. {"vuiSPKIl8PiR5O-rC4z9_xTQKZ0=", strict},
  50. {"vuiS*PKIl8P*iR5O-rC4*z9_xTQKZ0", insane},
  51. {"vuiS*PKIl8P*iR5O-rC4*z9_xTQKZ0=", insane},
  52. {"vuiS*PKIl8P*iR5O-rC4*z9_xTQKZ0==", insane},
  53. {"vuiS*PKIl8P*iR5O-rC4*z9_xTQKZ0===", insane}, /* 5 */
  54. {"vuiS*PKIl8P*iR5O-rC4*z9_xTQKZ0====", insane},
  55. {"vuiS*=PKIl8P*iR5O-rC4*z9_xTQKZ0=", insane},
  56. {"vuiS*==PKIl8P*iR5O-rC4*z9_xTQKZ0=", insane},
  57. {"vuiS*==\xffPKIl8P*iR5O-rC4*z9_xTQKZ0=", insane},
  58. {"vuiS PKIl8P\niR5O-rC4\tz9_xTQKZ0", relaxed}, /* 10 */
  59. {"vuiS PKIl8P\niR5O-rC4\tz9_xTQKZ0=", relaxed},
  60. {"vuiS PKIl8P\niR5O-rC4\tz9_xTQKZ0==", relaxed},
  61. {"vuiS PKIl8P\niR5O-rC4\tz9_xTQKZ0===", relaxed},
  62. {"vuiS PKIl8P\niR5O-rC4\tz9_xTQKZ0====", relaxed},
  63. {"vuiS\rPKIl8P\niR5O-rC4\tz9_xTQKZ0=", relaxed}, /* 15 */
  64. {"vuiS\rPKIl8P\niR5O-rC4\tz9_xTQKZ0= = =\x00", relaxed},
  65. {"\nvuiS\rPKIl8P\niR5O-rC4\tz9_xTQKZ0=\n", relaxed},
  66. {"vuiSPKIl8PiR5O-rC4z9_xTQK", invalid},
  67. };
  68. for (x = 0; x < sizeof(url_cases)/sizeof(url_cases[0]); ++x) {
  69. slen1 = strlen(url_cases[x].s);
  70. l1 = sizeof(tmp);
  71. if(url_cases[x].flag == strict) {
  72. DO(base64url_strict_decode(url_cases[x].s, slen1, tmp, &l1));
  73. DO(do_compare_testvector(tmp, l1, special_case, sizeof(special_case) - 1, "base64url_strict_decode", x));
  74. DO(base64url_sane_decode(url_cases[x].s, slen1, tmp, &l1));
  75. DO(do_compare_testvector(tmp, l1, special_case, sizeof(special_case) - 1, "base64url_sane_decode/strict", x));
  76. DO(base64url_decode(url_cases[x].s, slen1, tmp, &l1));
  77. DO(do_compare_testvector(tmp, l1, special_case, sizeof(special_case) - 1, "base64url_decode/strict", x));
  78. }
  79. else if(url_cases[x].flag == relaxed) {
  80. DO(base64url_strict_decode(url_cases[x].s, slen1, tmp, &l1) == CRYPT_INVALID_PACKET ? CRYPT_OK : CRYPT_FAIL_TESTVECTOR);
  81. DO(base64url_sane_decode(url_cases[x].s, slen1, tmp, &l1));
  82. DO(do_compare_testvector(tmp, l1, special_case, sizeof(special_case) - 1, "base64url_sane_decode/relaxed", x));
  83. DO(base64url_decode(url_cases[x].s, slen1, tmp, &l1));
  84. DO(do_compare_testvector(tmp, l1, special_case, sizeof(special_case) - 1, "base64url_decode/relaxed", x));
  85. }
  86. else if(url_cases[x].flag == insane) {
  87. DO(base64url_strict_decode(url_cases[x].s, slen1, tmp, &l1) == CRYPT_INVALID_PACKET ? CRYPT_OK : CRYPT_FAIL_TESTVECTOR);
  88. DO(base64url_sane_decode(url_cases[x].s, slen1, tmp, &l1) == CRYPT_INVALID_PACKET ? CRYPT_OK : CRYPT_FAIL_TESTVECTOR);
  89. DO(base64url_decode(url_cases[x].s, slen1, tmp, &l1));
  90. DO(do_compare_testvector(tmp, l1, special_case, sizeof(special_case) - 1, "base64url_decode/insane", x));
  91. }
  92. else { /* invalid */
  93. DO(base64url_strict_decode(url_cases[x].s, slen1, tmp, &l1) == CRYPT_INVALID_PACKET ? CRYPT_OK : CRYPT_FAIL_TESTVECTOR);
  94. DO(base64url_sane_decode(url_cases[x].s, slen1, tmp, &l1) == CRYPT_INVALID_PACKET ? CRYPT_OK : CRYPT_FAIL_TESTVECTOR);
  95. DO(base64url_decode(url_cases[x].s, slen1, tmp, &l1) == CRYPT_INVALID_PACKET ? CRYPT_OK : CRYPT_FAIL_TESTVECTOR);
  96. }
  97. l2 = sizeof(out);
  98. if(x == 0) {
  99. DO(base64url_encode(tmp, l1, out, &l2));
  100. DO(do_compare_testvector(out, l2, url_cases[x].s, strlen(url_cases[x].s), "base64url_encode", x));
  101. }
  102. if(x == 1) {
  103. DO(base64url_strict_encode(tmp, l1, out, &l2));
  104. DO(do_compare_testvector(out, l2, url_cases[x].s, strlen(url_cases[x].s), "base64url_strict_encode", x));
  105. }
  106. }
  107. #endif
  108. #if defined(LTC_BASE64)
  109. for (x = 0; x < sizeof(cases)/sizeof(cases[0]); ++x) {
  110. memset(out, 0, sizeof(out));
  111. memset(tmp, 0, sizeof(tmp));
  112. slen1 = strlen(cases[x].s);
  113. l1 = sizeof(out);
  114. DO(base64_encode((unsigned char*)cases[x].s, slen1, out, &l1));
  115. DO(do_compare_testvector(out, l1, cases[x].b64, strlen(cases[x].b64), "base64_encode", x));
  116. l2 = sizeof(tmp);
  117. DO(base64_strict_decode(out, l1, tmp, &l2));
  118. DO(do_compare_testvector(tmp, l2, cases[x].s, slen1, "base64_strict_decode", x));
  119. DO(base64_sane_decode(out, l1, tmp, &l2));
  120. DO(do_compare_testvector(tmp, l2, cases[x].s, slen1, "base64_sane_decode", x));
  121. DO(base64_decode(out, l1, tmp, &l2));
  122. DO(do_compare_testvector(tmp, l2, cases[x].s, slen1, "base64_decode", x));
  123. }
  124. for (x = 0; x < 64; x++) {
  125. yarrow_read(in, x, &yarrow_prng);
  126. l1 = sizeof(out);
  127. DO(base64_encode(in, x, out, &l1));
  128. l2 = sizeof(tmp);
  129. DO(base64_decode(out, l1, tmp, &l2));
  130. DO(do_compare_testvector(tmp, x, in, x, "random base64", x));
  131. }
  132. x--;
  133. memmove(&out[11], &out[10], l1 - 10);
  134. l1++;
  135. l2 = sizeof(tmp);
  136. out[10] = 0;
  137. DO(base64_decode(out, l1, tmp, &l2));
  138. DO(compare_testvector(tmp, l2, in, l2, "insane base64 decoding (NUL)", -1));
  139. DO(base64_sane_decode(out, l1, tmp, &l2) == CRYPT_INVALID_PACKET ? CRYPT_OK : CRYPT_INVALID_PACKET);
  140. DO(base64_strict_decode(out, l1, tmp, &l2) == CRYPT_INVALID_PACKET ? CRYPT_OK : CRYPT_INVALID_PACKET);
  141. out[10] = 9; /* tab */
  142. DO(base64_decode(out, l1, tmp, &l2));
  143. DO(compare_testvector(tmp, l2, in, l2, "insane base64 decoding (TAB)", -1));
  144. DO(base64_sane_decode(out, l1, tmp, &l2));
  145. DO(compare_testvector(tmp, l2, in, l2, "relaxed base64 decoding (TAB)", -1));
  146. DO(base64_strict_decode(out, l1, tmp, &l2) == CRYPT_INVALID_PACKET ? CRYPT_OK : CRYPT_INVALID_PACKET);
  147. #endif
  148. return 0;
  149. }
  150. #endif
  151. /* ref: $Format:%D$ */
  152. /* git commit: $Format:%H$ */
  153. /* commit time: $Format:%ai$ */