mirror of
https://github.com/yuzu-emu/mbedtls.git
synced 2024-12-29 01:55:39 +00:00
c48cb80b1f
Marked dirty memory ends up in the result buffer after encoding (due to the input having been marked dirty), and then the final comparison to make sure that we got what we expected was triggering the constant flow checker. Signed-off-by: Paul Elliott <paul.elliott@arm.com>
135 lines
3.5 KiB
Plaintext
135 lines
3.5 KiB
Plaintext
/* BEGIN_HEADER */
|
|
#include "mbedtls/base64.h"
|
|
#include <test/constant_flow.h>
|
|
/* END_HEADER */
|
|
|
|
/* BEGIN_DEPENDENCIES
|
|
* depends_on:MBEDTLS_BASE64_C
|
|
* END_DEPENDENCIES
|
|
*/
|
|
|
|
/* BEGIN_CASE */
|
|
void mbedtls_base64_encode( char * src_string, char * dst_string,
|
|
int dst_buf_size, int result )
|
|
{
|
|
unsigned char src_str[1000];
|
|
unsigned char dst_str[1000];
|
|
size_t len, src_len;
|
|
|
|
memset(src_str, 0x00, 1000);
|
|
memset(dst_str, 0x00, 1000);
|
|
|
|
strncpy( (char *) src_str, src_string, sizeof(src_str) - 1 );
|
|
src_len = strlen( (char *) src_str );
|
|
|
|
TEST_CF_SECRET( src_str, sizeof( src_str ) );
|
|
TEST_ASSERT( mbedtls_base64_encode( dst_str, dst_buf_size, &len, src_str, src_len) == result );
|
|
TEST_CF_PUBLIC( src_str, sizeof( src_str ) );
|
|
|
|
/* dest_str will have had tainted data copied to it, prevent the TEST_ASSERT below from triggering
|
|
CF failures by unmarking it. */
|
|
TEST_CF_PUBLIC( dst_str, len );
|
|
|
|
if( result == 0 )
|
|
{
|
|
TEST_ASSERT( strcmp( (char *) dst_str, dst_string ) == 0 );
|
|
}
|
|
}
|
|
/* END_CASE */
|
|
|
|
/* BEGIN_CASE */
|
|
void mbedtls_base64_decode( char * src_string, char * dst_string, int result )
|
|
{
|
|
unsigned char src_str[1000];
|
|
unsigned char dst_str[1000];
|
|
size_t len;
|
|
int res;
|
|
|
|
memset(src_str, 0x00, 1000);
|
|
memset(dst_str, 0x00, 1000);
|
|
|
|
strncpy( (char *) src_str, src_string, sizeof(src_str) - 1 );
|
|
res = mbedtls_base64_decode( dst_str, sizeof( dst_str ), &len, src_str, strlen( (char *) src_str ) );
|
|
TEST_ASSERT( res == result );
|
|
if( result == 0 )
|
|
{
|
|
TEST_ASSERT( strcmp( (char *) dst_str, dst_string ) == 0 );
|
|
}
|
|
}
|
|
/* END_CASE */
|
|
|
|
/* BEGIN_CASE */
|
|
void base64_encode_hex( data_t * src, char * dst, int dst_buf_size,
|
|
int result )
|
|
{
|
|
unsigned char *res = NULL;
|
|
size_t len;
|
|
|
|
res = mbedtls_test_zero_alloc( dst_buf_size );
|
|
|
|
TEST_CF_SECRET( src->x, src->len );
|
|
TEST_ASSERT( mbedtls_base64_encode( res, dst_buf_size, &len, src->x, src->len ) == result );
|
|
TEST_CF_PUBLIC( src->x, src->len );
|
|
|
|
/* res will have had tainted data copied to it, prevent the TEST_ASSERT below from triggering
|
|
CF failures by unmarking it. */
|
|
TEST_CF_PUBLIC( res, len );
|
|
|
|
if( result == 0 )
|
|
{
|
|
TEST_ASSERT( len == strlen( dst ) );
|
|
TEST_ASSERT( memcmp( dst, res, len ) == 0 );
|
|
}
|
|
|
|
exit:
|
|
mbedtls_free( res );
|
|
}
|
|
/* END_CASE */
|
|
|
|
/* BEGIN_CASE */
|
|
void base64_decode_hex( char * src, data_t * dst, int dst_buf_size,
|
|
int result )
|
|
{
|
|
unsigned char *res = NULL;
|
|
size_t len;
|
|
|
|
res = mbedtls_test_zero_alloc( dst_buf_size );
|
|
|
|
TEST_ASSERT( mbedtls_base64_decode( res, dst_buf_size, &len, (unsigned char *) src,
|
|
strlen( src ) ) == result );
|
|
if( result == 0 )
|
|
{
|
|
TEST_ASSERT( len == dst->len );
|
|
TEST_ASSERT( memcmp( dst->x, res, len ) == 0 );
|
|
}
|
|
|
|
exit:
|
|
mbedtls_free( res );
|
|
}
|
|
/* END_CASE */
|
|
|
|
/* BEGIN_CASE */
|
|
void base64_decode_hex_src( data_t * src, char * dst_ref, int result )
|
|
{
|
|
unsigned char dst[1000] = { 0 };
|
|
size_t len;
|
|
|
|
TEST_ASSERT( mbedtls_base64_decode( dst, sizeof( dst ), &len, src->x, src->len ) == result );
|
|
if( result == 0 )
|
|
{
|
|
TEST_ASSERT( len == strlen( dst_ref ) );
|
|
TEST_ASSERT( memcmp( dst, dst_ref, len ) == 0 );
|
|
}
|
|
|
|
exit:
|
|
;;
|
|
}
|
|
/* END_CASE */
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_SELF_TEST */
|
|
void base64_selftest( )
|
|
{
|
|
TEST_ASSERT( mbedtls_base64_self_test( 1 ) == 0 );
|
|
}
|
|
/* END_CASE */
|