Line data Source code
1 : /* Copyright (c) 2010-2021, The Tor Project, Inc. */
2 : /* See LICENSE for licensing information */
3 :
4 : #include "orconfig.h"
5 : #include "core/or/or.h"
6 :
7 : #include "test/test.h"
8 :
9 : #include "lib/crypt_ops/crypto_rand.h"
10 : #include "lib/encoding/binascii.h"
11 :
12 : static void
13 1 : test_util_format_unaligned_accessors(void *ignored)
14 : {
15 1 : (void)ignored;
16 1 : char buf[9] = "onionsoup"; // 6f6e696f6e736f7570
17 :
18 1 : tt_u64_op(get_uint64(buf+1), OP_EQ,
19 : tor_htonll(UINT64_C(0x6e696f6e736f7570)));
20 1 : tt_uint_op(get_uint32(buf+1), OP_EQ, htonl(0x6e696f6e));
21 1 : tt_uint_op(get_uint16(buf+1), OP_EQ, htons(0x6e69));
22 1 : tt_uint_op(get_uint8(buf+1), OP_EQ, 0x6e);
23 :
24 1 : set_uint8(buf+7, 0x61);
25 1 : tt_mem_op(buf, OP_EQ, "onionsoap", 9);
26 :
27 1 : set_uint16(buf+6, htons(0x746f));
28 1 : tt_mem_op(buf, OP_EQ, "onionstop", 9);
29 :
30 1 : set_uint32(buf+1, htonl(0x78696465));
31 1 : tt_mem_op(buf, OP_EQ, "oxidestop", 9);
32 :
33 1 : set_uint64(buf+1, tor_htonll(UINT64_C(0x6266757363617465)));
34 1 : tt_mem_op(buf, OP_EQ, "obfuscate", 9);
35 1 : done:
36 1 : ;
37 1 : }
38 :
39 : static void
40 1 : test_util_format_base64_encode(void *ignored)
41 : {
42 1 : (void)ignored;
43 1 : int res;
44 1 : int i;
45 1 : char *src;
46 1 : char *dst;
47 :
48 1 : src = tor_malloc_zero(256);
49 1 : dst = tor_malloc_zero(1000);
50 :
51 258 : for (i=0;i<256;i++) {
52 256 : src[i] = (char)i;
53 : }
54 :
55 1 : res = base64_encode(NULL, 1, src, 1, 0);
56 1 : tt_int_op(res, OP_EQ, -1);
57 :
58 1 : res = base64_encode(dst, 1, NULL, 1, 0);
59 1 : tt_int_op(res, OP_EQ, -1);
60 :
61 1 : res = base64_encode(dst, 1, src, 10, 0);
62 1 : tt_int_op(res, OP_EQ, -1);
63 :
64 1 : res = base64_encode(dst, SSIZE_MAX-1, src, 1, 0);
65 1 : tt_int_op(res, OP_EQ, -1);
66 :
67 1 : res = base64_encode(dst, SSIZE_MAX-1, src, 10, 0);
68 1 : tt_int_op(res, OP_EQ, -1);
69 :
70 1 : res = base64_encode(dst, 1000, src, 256, 0);
71 1 : tt_int_op(res, OP_EQ, 344);
72 1 : tt_str_op(dst, OP_EQ, "AAECAwQFBgcICQoLDA0ODxAREhMUFRYXGBkaGxwdHh"
73 : "8gISIjJCUmJygpKissLS4vMDEyMzQ1Njc4OTo7PD0+P0BBQkNERUZH"
74 : "SElKS0xNTk9QUVJTVFVWV1hZWltcXV5fYGFiY2RlZmdoaWprbG1ub3"
75 : "BxcnN0dXZ3eHl6e3x9fn+AgYKDhIWGh4iJiouMjY6PkJGSk5SVlpeY"
76 : "mZqbnJ2en6ChoqOkpaanqKmqq6ytrq+wsbKztLW2t7i5uru8vb6/wM"
77 : "HCw8TFxsfIycrLzM3Oz9DR0tPU1dbX2Nna29zd3t/g4eLj5OXm5+jp"
78 : "6uvs7e7v8PHy8/T19vf4+fr7/P3+/w==");
79 :
80 1 : res = base64_encode(dst, 1000, src, 256, BASE64_ENCODE_MULTILINE);
81 1 : tt_int_op(res, OP_EQ, 350);
82 1 : tt_str_op(dst, OP_EQ,
83 : "AAECAwQFBgcICQoLDA0ODxAREhMUFRYXGBkaGxwdHh8gISIjJCUmJygpKissLS4v\n"
84 : "MDEyMzQ1Njc4OTo7PD0+P0BBQkNERUZHSElKS0xNTk9QUVJTVFVWV1hZWltcXV5f\n"
85 : "YGFiY2RlZmdoaWprbG1ub3BxcnN0dXZ3eHl6e3x9fn+AgYKDhIWGh4iJiouMjY6P\n"
86 : "kJGSk5SVlpeYmZqbnJ2en6ChoqOkpaanqKmqq6ytrq+wsbKztLW2t7i5uru8vb6/\n"
87 : "wMHCw8TFxsfIycrLzM3Oz9DR0tPU1dbX2Nna29zd3t/g4eLj5OXm5+jp6uvs7e7v\n"
88 : "8PHy8/T19vf4+fr7/P3+/w==\n");
89 :
90 1 : res = base64_encode(dst, 1000, src+1, 255, BASE64_ENCODE_MULTILINE);
91 1 : tt_int_op(res, OP_EQ, 346);
92 :
93 51 : for (i = 0;i<50;i++) {
94 50 : src[i] = 0;
95 : }
96 1 : src[50] = (char)255;
97 1 : src[51] = (char)255;
98 1 : src[52] = (char)255;
99 1 : src[53] = (char)255;
100 :
101 1 : res = base64_encode(dst, 1000, src, 54, BASE64_ENCODE_MULTILINE);
102 1 : tt_int_op(res, OP_EQ, 74);
103 :
104 1 : res = base64_encode(dst, 1000, src+1, 53, BASE64_ENCODE_MULTILINE);
105 1 : tt_int_op(res, OP_EQ, 74);
106 :
107 1 : res = base64_encode(dst, 1000, src+2, 52, BASE64_ENCODE_MULTILINE);
108 1 : tt_int_op(res, OP_EQ, 74);
109 :
110 1 : res = base64_encode(dst, 1000, src+3, 51, BASE64_ENCODE_MULTILINE);
111 1 : tt_int_op(res, OP_EQ, 70);
112 :
113 1 : res = base64_encode(dst, 1000, src+4, 50, BASE64_ENCODE_MULTILINE);
114 1 : tt_int_op(res, OP_EQ, 70);
115 :
116 1 : res = base64_encode(dst, 1000, src+5, 49, BASE64_ENCODE_MULTILINE);
117 1 : tt_int_op(res, OP_EQ, 70);
118 :
119 1 : res = base64_encode(dst, 1000, src+6, 48, BASE64_ENCODE_MULTILINE);
120 1 : tt_int_op(res, OP_EQ, 65);
121 :
122 1 : res = base64_encode(dst, 1000, src+7, 47, BASE64_ENCODE_MULTILINE);
123 1 : tt_int_op(res, OP_EQ, 65);
124 :
125 1 : res = base64_encode(dst, 1000, src+8, 46, BASE64_ENCODE_MULTILINE);
126 1 : tt_int_op(res, OP_EQ, 65);
127 :
128 1 : done:
129 1 : tor_free(src);
130 1 : tor_free(dst);
131 1 : }
132 :
133 : static void
134 1 : test_util_format_base64_decode_oddsize(void *ignored)
135 : {
136 1 : (void)ignored;
137 1 : int res;
138 1 : int i;
139 1 : char *src;
140 1 : char *dst, real_dst[7];
141 1 : char expected[] = {0x65, 0x78, 0x61, 0x6D, 0x70, 0x6C, 0x65};
142 1 : char real_src[] = "ZXhhbXBsZQ";
143 1 : char expected40[] = "testing40characteroddsizebase64encoding!";
144 1 : char src40[] = "dGVzdGluZzQwY2hhcmFjdGVyb2Rkc2l6ZWJhc2U2NGVuY29kaW5nIQ";
145 1 : char pad40[] = "dGVzdGluZzQwY2hhcmFjdGVyb2Rkc2l6ZWJhc2U2NGVuY29kaW5nIQ==";
146 :
147 1 : src = tor_malloc_zero(256);
148 1 : dst = tor_malloc_zero(1000);
149 :
150 258 : for (i=0;i<256;i++) {
151 256 : src[i] = (char)i;
152 : }
153 :
154 1 : res = base64_decode(dst, 1, src, 5);
155 1 : tt_int_op(res, OP_EQ, -1);
156 :
157 1 : const char *s = "SGVsbG8gd29ybGQ";
158 1 : res = base64_decode(dst, 1000, s, strlen(s));
159 1 : tt_int_op(res, OP_EQ, 11);
160 1 : tt_mem_op(dst, OP_EQ, "Hello world", 11);
161 :
162 1 : s = "T3BhIG11bmRv";
163 1 : res = base64_decode(dst, 9, s, strlen(s));
164 1 : tt_int_op(res, OP_EQ, 9);
165 1 : tt_mem_op(dst, OP_EQ, "Opa mundo", 9);
166 :
167 1 : res = base64_decode(real_dst, sizeof(real_dst), real_src, 10);
168 1 : tt_int_op(res, OP_EQ, 7);
169 1 : tt_mem_op(real_dst, OP_EQ, expected, 7);
170 :
171 1 : res = base64_decode(dst, 40, src40, strlen(src40));
172 1 : tt_int_op(res, OP_EQ, 40);
173 1 : tt_mem_op(dst, OP_EQ, expected40, 40);
174 :
175 1 : res = base64_decode(dst, 40, pad40, strlen(pad40));
176 1 : tt_int_op(res, OP_EQ, 40);
177 1 : tt_mem_op(dst, OP_EQ, expected40, 40);
178 :
179 1 : done:
180 1 : tor_free(src);
181 1 : tor_free(dst);
182 1 : }
183 :
184 : static void
185 1 : test_util_format_base64_decode(void *ignored)
186 : {
187 1 : (void)ignored;
188 1 : int res;
189 1 : int i;
190 1 : char *src;
191 1 : char *dst, *real_dst;
192 1 : uint8_t expected[] = {0x65, 0x78, 0x61, 0x6D, 0x70, 0x6C, 0x65};
193 1 : char real_src[] = "ZXhhbXBsZQ==";
194 :
195 1 : src = tor_malloc_zero(256);
196 1 : dst = tor_malloc_zero(1000);
197 1 : real_dst = tor_malloc_zero(10);
198 :
199 258 : for (i=0;i<256;i++) {
200 256 : src[i] = (char)i;
201 : }
202 :
203 1 : res = base64_decode(dst, 1, src, 100);
204 1 : tt_int_op(res, OP_EQ, -1);
205 :
206 1 : res = base64_decode(dst, 1, real_src, 10);
207 1 : tt_int_op(res, OP_EQ, -1);
208 :
209 1 : const char *s = "T3BhIG11bmRv";
210 1 : res = base64_decode(dst, 9, s, strlen(s));
211 1 : tt_int_op(res, OP_EQ, 9);
212 1 : tt_mem_op(dst, OP_EQ, "Opa mundo", 9);
213 :
214 1 : memset(dst, 0, 1000);
215 1 : res = base64_decode(dst, 100, s, strlen(s));
216 1 : tt_int_op(res, OP_EQ, 9);
217 1 : tt_mem_op(dst, OP_EQ, "Opa mundo", 9);
218 :
219 1 : s = "SGVsbG8gd29ybGQ=";
220 1 : res = base64_decode(dst, 100, s, strlen(s));
221 1 : tt_int_op(res, OP_EQ, 11);
222 1 : tt_mem_op(dst, OP_EQ, "Hello world", 11);
223 :
224 1 : res = base64_decode(real_dst, 10, real_src, 10);
225 1 : tt_int_op(res, OP_EQ, 7);
226 1 : tt_mem_op(real_dst, OP_EQ, expected, 7);
227 :
228 1 : done:
229 1 : tor_free(src);
230 1 : tor_free(dst);
231 1 : tor_free(real_dst);
232 1 : }
233 :
234 : static void
235 1 : test_util_format_base16_decode(void *ignored)
236 : {
237 1 : (void)ignored;
238 1 : int res;
239 1 : int i;
240 1 : char *src;
241 1 : char *dst, *real_dst;
242 1 : char expected[] = {0x65, 0x78, 0x61, 0x6D, 0x70, 0x6C, 0x65};
243 1 : char real_src[] = "6578616D706C65";
244 :
245 1 : src = tor_malloc_zero(256);
246 1 : dst = tor_malloc_zero(1000);
247 1 : real_dst = tor_malloc_zero(10);
248 :
249 258 : for (i=0;i<256;i++) {
250 256 : src[i] = (char)i;
251 : }
252 :
253 1 : res = base16_decode(dst, 3, src, 3);
254 1 : tt_int_op(res, OP_EQ, -1);
255 :
256 1 : res = base16_decode(dst, 1, src, 10);
257 1 : tt_int_op(res, OP_EQ, -1);
258 :
259 1 : res = base16_decode(dst, ((size_t)INT_MAX)+1, src, 10);
260 1 : tt_int_op(res, OP_EQ, -1);
261 :
262 1 : res = base16_decode(dst, 1000, "", 0);
263 1 : tt_int_op(res, OP_EQ, 0);
264 :
265 1 : res = base16_decode(dst, 1000, "aabc", 4);
266 1 : tt_int_op(res, OP_EQ, 2);
267 1 : tt_mem_op(dst, OP_EQ, "\xaa\xbc", 2);
268 :
269 1 : res = base16_decode(dst, 1000, "aabcd", 6);
270 1 : tt_int_op(res, OP_EQ, -1);
271 :
272 1 : res = base16_decode(dst, 1000, "axxx", 4);
273 1 : tt_int_op(res, OP_EQ, -1);
274 :
275 1 : res = base16_decode(real_dst, 10, real_src, 14);
276 1 : tt_int_op(res, OP_EQ, 7);
277 1 : tt_mem_op(real_dst, OP_EQ, expected, 7);
278 :
279 1 : done:
280 1 : tor_free(src);
281 1 : tor_free(dst);
282 1 : tor_free(real_dst);
283 1 : }
284 :
285 : static void
286 1 : test_util_format_base32_encode(void *arg)
287 : {
288 1 : (void) arg;
289 1 : size_t real_dstlen = 32;
290 1 : char *dst = tor_malloc_zero(real_dstlen);
291 :
292 : /* Basic use case that doesn't require a source length correction. */
293 : {
294 : /* Length of 10 bytes. */
295 1 : const char *src = "blahbleh12";
296 1 : size_t srclen = strlen(src);
297 : /* Expected result encoded base32. This was created using python as
298 : * such (and same goes for all test case.):
299 : *
300 : * b = bytes("blahbleh12", 'utf-8')
301 : * base64.b32encode(b)
302 : * (result in lower case)
303 : */
304 1 : const char *expected = "mjwgc2dcnrswqmjs";
305 :
306 1 : base32_encode(dst, base32_encoded_size(srclen), src, srclen);
307 1 : tt_mem_op(expected, OP_EQ, dst, strlen(expected));
308 : /* Encode but to a larger size destination. */
309 1 : memset(dst, 0, real_dstlen);
310 1 : base32_encode(dst, real_dstlen, src, srclen);
311 1 : tt_mem_op(expected, OP_EQ, dst, strlen(expected));
312 : }
313 :
314 : /* Non multiple of 5 for the source buffer length. */
315 : {
316 : /* Length of 8 bytes. */
317 1 : const char *expected = "mjwgc2dcnrswq";
318 1 : const char *src = "blahbleh";
319 1 : size_t srclen = strlen(src);
320 :
321 1 : memset(dst, 0, real_dstlen);
322 1 : base32_encode(dst, base32_encoded_size(srclen), src, srclen);
323 1 : tt_mem_op(expected, OP_EQ, dst, strlen(expected));
324 : }
325 :
326 1 : done:
327 1 : tor_free(dst);
328 1 : }
329 :
330 : static void
331 1 : test_util_format_base32_decode(void *arg)
332 : {
333 1 : (void) arg;
334 1 : int ret;
335 1 : size_t real_dstlen = 32;
336 1 : char *dst = tor_malloc_zero(real_dstlen);
337 :
338 : /* Basic use case. */
339 : {
340 : /* Length of 10 bytes. */
341 1 : const char *expected = "blahbleh12";
342 : /* Expected result encoded base32. */
343 1 : const char *src = "mjwgc2dcnrswqmjs";
344 :
345 1 : ret = base32_decode(dst, strlen(expected), src, strlen(src));
346 1 : tt_int_op(ret, OP_EQ, 10);
347 1 : tt_str_op(expected, OP_EQ, dst);
348 : }
349 :
350 : /* Non multiple of 5 for the source buffer length. */
351 : {
352 : /* Length of 8 bytes. */
353 1 : const char *expected = "blahbleh";
354 1 : const char *src = "mjwgc2dcnrswq";
355 :
356 1 : ret = base32_decode(dst, strlen(expected), src, strlen(src));
357 1 : tt_int_op(ret, OP_EQ, 8);
358 1 : tt_mem_op(expected, OP_EQ, dst, strlen(expected));
359 : }
360 :
361 : /* Invalid values. */
362 : {
363 : /* Invalid character '#'. */
364 1 : ret = base32_decode(dst, real_dstlen, "#abcde", 6);
365 1 : tt_int_op(ret, OP_EQ, -1);
366 : /* Make sure the destination buffer has been zeroed even on error. */
367 1 : tt_int_op(fast_mem_is_zero(dst, real_dstlen), OP_EQ, 1);
368 : }
369 :
370 1 : done:
371 1 : tor_free(dst);
372 1 : }
373 :
374 : static void
375 1 : test_util_format_encoded_size(void *arg)
376 : {
377 1 : (void)arg;
378 1 : uint8_t inbuf[256];
379 1 : char outbuf[1024];
380 1 : unsigned i;
381 :
382 1 : crypto_rand((char *)inbuf, sizeof(inbuf));
383 259 : for (i = 0; i <= sizeof(inbuf); ++i) {
384 : /* XXXX (Once the return values are consistent, check them too.) */
385 :
386 257 : base32_encode(outbuf, sizeof(outbuf), (char *)inbuf, i);
387 : /* The "+ 1" below is an API inconsistency. */
388 257 : tt_int_op(strlen(outbuf) + 1, OP_EQ, base32_encoded_size(i));
389 :
390 257 : base64_encode(outbuf, sizeof(outbuf), (char *)inbuf, i, 0);
391 257 : tt_int_op(strlen(outbuf), OP_EQ, base64_encode_size(i, 0));
392 257 : tt_int_op(i, OP_LE, base64_decode_maxsize(strlen(outbuf)));
393 :
394 257 : base64_encode(outbuf, sizeof(outbuf), (char *)inbuf, i,
395 : BASE64_ENCODE_MULTILINE);
396 257 : tt_int_op(strlen(outbuf), OP_EQ,
397 : base64_encode_size(i, BASE64_ENCODE_MULTILINE));
398 257 : tt_int_op(i, OP_LE, base64_decode_maxsize(strlen(outbuf)));
399 : }
400 :
401 1 : done:
402 1 : ;
403 1 : }
404 :
405 : struct testcase_t util_format_tests[] = {
406 : { "unaligned_accessors", test_util_format_unaligned_accessors, 0,
407 : NULL, NULL },
408 : { "base64_encode", test_util_format_base64_encode, 0, NULL, NULL },
409 : { "base64_decode_oddsize", test_util_format_base64_decode_oddsize, 0,
410 : NULL, NULL },
411 : { "base64_decode", test_util_format_base64_decode, 0, NULL, NULL },
412 : { "base16_decode", test_util_format_base16_decode, 0, NULL, NULL },
413 : { "base32_encode", test_util_format_base32_encode, 0,
414 : NULL, NULL },
415 : { "base32_decode", test_util_format_base32_decode, 0,
416 : NULL, NULL },
417 : { "encoded_size", test_util_format_encoded_size, 0, NULL, NULL },
418 : END_OF_TESTCASES
419 : };
|