mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-11 13:43:47 +01:00
fe3aca1491
* ADD new /src/common/crypto_rand.[ch] module. * ADD new /src/common/crypto_util.[ch] module (contains the memwipe() function, since all crypto_* modules need this). * FIXES part of #24658: https://bugs.torproject.org/24658
421 lines
11 KiB
C
421 lines
11 KiB
C
/* Copyright (c) 2010-2017, The Tor Project, Inc. */
|
|
/* See LICENSE for licensing information */
|
|
|
|
#include "orconfig.h"
|
|
#include "or.h"
|
|
|
|
#include "test.h"
|
|
|
|
#include "crypto_rand.h"
|
|
#define UTIL_FORMAT_PRIVATE
|
|
#include "util_format.h"
|
|
|
|
#define NS_MODULE util_format
|
|
|
|
static void
|
|
test_util_format_unaligned_accessors(void *ignored)
|
|
{
|
|
(void)ignored;
|
|
char buf[9] = "onionsoup"; // 6f6e696f6e736f7570
|
|
|
|
tt_u64_op(get_uint64(buf+1), OP_EQ,
|
|
tor_htonll(U64_LITERAL(0x6e696f6e736f7570)));
|
|
tt_uint_op(get_uint32(buf+1), OP_EQ, htonl(0x6e696f6e));
|
|
tt_uint_op(get_uint16(buf+1), OP_EQ, htons(0x6e69));
|
|
tt_uint_op(get_uint8(buf+1), OP_EQ, 0x6e);
|
|
|
|
set_uint8(buf+7, 0x61);
|
|
tt_mem_op(buf, OP_EQ, "onionsoap", 9);
|
|
|
|
set_uint16(buf+6, htons(0x746f));
|
|
tt_mem_op(buf, OP_EQ, "onionstop", 9);
|
|
|
|
set_uint32(buf+1, htonl(0x78696465));
|
|
tt_mem_op(buf, OP_EQ, "oxidestop", 9);
|
|
|
|
set_uint64(buf+1, tor_htonll(U64_LITERAL(0x6266757363617465)));
|
|
tt_mem_op(buf, OP_EQ, "obfuscate", 9);
|
|
done:
|
|
;
|
|
}
|
|
|
|
static void
|
|
test_util_format_base64_encode(void *ignored)
|
|
{
|
|
(void)ignored;
|
|
int res;
|
|
int i;
|
|
char *src;
|
|
char *dst;
|
|
|
|
src = tor_malloc_zero(256);
|
|
dst = tor_malloc_zero(1000);
|
|
|
|
for (i=0;i<256;i++) {
|
|
src[i] = (char)i;
|
|
}
|
|
|
|
res = base64_encode(NULL, 1, src, 1, 0);
|
|
tt_int_op(res, OP_EQ, -1);
|
|
|
|
res = base64_encode(dst, 1, NULL, 1, 0);
|
|
tt_int_op(res, OP_EQ, -1);
|
|
|
|
res = base64_encode(dst, 1, src, 10, 0);
|
|
tt_int_op(res, OP_EQ, -1);
|
|
|
|
res = base64_encode(dst, SSIZE_MAX-1, src, 1, 0);
|
|
tt_int_op(res, OP_EQ, -1);
|
|
|
|
res = base64_encode(dst, SSIZE_MAX-1, src, 10, 0);
|
|
tt_int_op(res, OP_EQ, -1);
|
|
|
|
res = base64_encode(dst, 1000, src, 256, 0);
|
|
tt_int_op(res, OP_EQ, 344);
|
|
tt_str_op(dst, OP_EQ, "AAECAwQFBgcICQoLDA0ODxAREhMUFRYXGBkaGxwdHh"
|
|
"8gISIjJCUmJygpKissLS4vMDEyMzQ1Njc4OTo7PD0+P0BBQkNERUZH"
|
|
"SElKS0xNTk9QUVJTVFVWV1hZWltcXV5fYGFiY2RlZmdoaWprbG1ub3"
|
|
"BxcnN0dXZ3eHl6e3x9fn+AgYKDhIWGh4iJiouMjY6PkJGSk5SVlpeY"
|
|
"mZqbnJ2en6ChoqOkpaanqKmqq6ytrq+wsbKztLW2t7i5uru8vb6/wM"
|
|
"HCw8TFxsfIycrLzM3Oz9DR0tPU1dbX2Nna29zd3t/g4eLj5OXm5+jp"
|
|
"6uvs7e7v8PHy8/T19vf4+fr7/P3+/w==");
|
|
|
|
res = base64_encode(dst, 1000, src, 256, BASE64_ENCODE_MULTILINE);
|
|
tt_int_op(res, OP_EQ, 350);
|
|
tt_str_op(dst, OP_EQ,
|
|
"AAECAwQFBgcICQoLDA0ODxAREhMUFRYXGBkaGxwdHh8gISIjJCUmJygpKissLS4v\n"
|
|
"MDEyMzQ1Njc4OTo7PD0+P0BBQkNERUZHSElKS0xNTk9QUVJTVFVWV1hZWltcXV5f\n"
|
|
"YGFiY2RlZmdoaWprbG1ub3BxcnN0dXZ3eHl6e3x9fn+AgYKDhIWGh4iJiouMjY6P\n"
|
|
"kJGSk5SVlpeYmZqbnJ2en6ChoqOkpaanqKmqq6ytrq+wsbKztLW2t7i5uru8vb6/\n"
|
|
"wMHCw8TFxsfIycrLzM3Oz9DR0tPU1dbX2Nna29zd3t/g4eLj5OXm5+jp6uvs7e7v\n"
|
|
"8PHy8/T19vf4+fr7/P3+/w==\n");
|
|
|
|
res = base64_encode(dst, 1000, src+1, 255, BASE64_ENCODE_MULTILINE);
|
|
tt_int_op(res, OP_EQ, 346);
|
|
|
|
for (i = 0;i<50;i++) {
|
|
src[i] = 0;
|
|
}
|
|
src[50] = (char)255;
|
|
src[51] = (char)255;
|
|
src[52] = (char)255;
|
|
src[53] = (char)255;
|
|
|
|
res = base64_encode(dst, 1000, src, 54, BASE64_ENCODE_MULTILINE);
|
|
tt_int_op(res, OP_EQ, 74);
|
|
|
|
res = base64_encode(dst, 1000, src+1, 53, BASE64_ENCODE_MULTILINE);
|
|
tt_int_op(res, OP_EQ, 74);
|
|
|
|
res = base64_encode(dst, 1000, src+2, 52, BASE64_ENCODE_MULTILINE);
|
|
tt_int_op(res, OP_EQ, 74);
|
|
|
|
res = base64_encode(dst, 1000, src+3, 51, BASE64_ENCODE_MULTILINE);
|
|
tt_int_op(res, OP_EQ, 70);
|
|
|
|
res = base64_encode(dst, 1000, src+4, 50, BASE64_ENCODE_MULTILINE);
|
|
tt_int_op(res, OP_EQ, 70);
|
|
|
|
res = base64_encode(dst, 1000, src+5, 49, BASE64_ENCODE_MULTILINE);
|
|
tt_int_op(res, OP_EQ, 70);
|
|
|
|
res = base64_encode(dst, 1000, src+6, 48, BASE64_ENCODE_MULTILINE);
|
|
tt_int_op(res, OP_EQ, 65);
|
|
|
|
res = base64_encode(dst, 1000, src+7, 47, BASE64_ENCODE_MULTILINE);
|
|
tt_int_op(res, OP_EQ, 65);
|
|
|
|
res = base64_encode(dst, 1000, src+8, 46, BASE64_ENCODE_MULTILINE);
|
|
tt_int_op(res, OP_EQ, 65);
|
|
|
|
done:
|
|
tor_free(src);
|
|
tor_free(dst);
|
|
}
|
|
|
|
static void
|
|
test_util_format_base64_decode_oddsize(void *ignored)
|
|
{
|
|
(void)ignored;
|
|
int res;
|
|
int i;
|
|
char *src;
|
|
char *dst, real_dst[7];
|
|
char expected[] = {0x65, 0x78, 0x61, 0x6D, 0x70, 0x6C, 0x65};
|
|
char real_src[] = "ZXhhbXBsZQ";
|
|
char expected40[] = "testing40characteroddsizebase64encoding!";
|
|
char src40[] = "dGVzdGluZzQwY2hhcmFjdGVyb2Rkc2l6ZWJhc2U2NGVuY29kaW5nIQ";
|
|
char pad40[] = "dGVzdGluZzQwY2hhcmFjdGVyb2Rkc2l6ZWJhc2U2NGVuY29kaW5nIQ==";
|
|
|
|
src = tor_malloc_zero(256);
|
|
dst = tor_malloc_zero(1000);
|
|
|
|
for (i=0;i<256;i++) {
|
|
src[i] = (char)i;
|
|
}
|
|
|
|
res = base64_decode(dst, 1, src, 5);
|
|
tt_int_op(res, OP_EQ, -1);
|
|
|
|
const char *s = "SGVsbG8gd29ybGQ";
|
|
res = base64_decode(dst, 1000, s, strlen(s));
|
|
tt_int_op(res, OP_EQ, 11);
|
|
tt_mem_op(dst, OP_EQ, "Hello world", 11);
|
|
|
|
s = "T3BhIG11bmRv";
|
|
res = base64_decode(dst, 9, s, strlen(s));
|
|
tt_int_op(res, OP_EQ, 9);
|
|
tt_mem_op(dst, OP_EQ, "Opa mundo", 9);
|
|
|
|
res = base64_decode(real_dst, sizeof(real_dst), real_src, 10);
|
|
tt_int_op(res, OP_EQ, 7);
|
|
tt_mem_op(real_dst, OP_EQ, expected, 7);
|
|
|
|
res = base64_decode(dst, 40, src40, strlen(src40));
|
|
tt_int_op(res, OP_EQ, 40);
|
|
tt_mem_op(dst, OP_EQ, expected40, 40);
|
|
|
|
res = base64_decode(dst, 40, pad40, strlen(pad40));
|
|
tt_int_op(res, OP_EQ, 40);
|
|
tt_mem_op(dst, OP_EQ, expected40, 40);
|
|
|
|
done:
|
|
tor_free(src);
|
|
tor_free(dst);
|
|
}
|
|
|
|
static void
|
|
test_util_format_base64_decode(void *ignored)
|
|
{
|
|
(void)ignored;
|
|
int res;
|
|
int i;
|
|
char *src;
|
|
char *dst, *real_dst;
|
|
uint8_t expected[] = {0x65, 0x78, 0x61, 0x6D, 0x70, 0x6C, 0x65};
|
|
char real_src[] = "ZXhhbXBsZQ==";
|
|
|
|
src = tor_malloc_zero(256);
|
|
dst = tor_malloc_zero(1000);
|
|
real_dst = tor_malloc_zero(10);
|
|
|
|
for (i=0;i<256;i++) {
|
|
src[i] = (char)i;
|
|
}
|
|
|
|
res = base64_decode(dst, 1, src, 100);
|
|
tt_int_op(res, OP_EQ, -1);
|
|
|
|
res = base64_decode(dst, 1, real_src, 10);
|
|
tt_int_op(res, OP_EQ, -1);
|
|
|
|
const char *s = "T3BhIG11bmRv";
|
|
res = base64_decode(dst, 9, s, strlen(s));
|
|
tt_int_op(res, OP_EQ, 9);
|
|
tt_mem_op(dst, OP_EQ, "Opa mundo", 9);
|
|
|
|
memset(dst, 0, 1000);
|
|
res = base64_decode(dst, 100, s, strlen(s));
|
|
tt_int_op(res, OP_EQ, 9);
|
|
tt_mem_op(dst, OP_EQ, "Opa mundo", 9);
|
|
|
|
s = "SGVsbG8gd29ybGQ=";
|
|
res = base64_decode(dst, 100, s, strlen(s));
|
|
tt_int_op(res, OP_EQ, 11);
|
|
tt_mem_op(dst, OP_EQ, "Hello world", 11);
|
|
|
|
res = base64_decode(real_dst, 10, real_src, 10);
|
|
tt_int_op(res, OP_EQ, 7);
|
|
tt_mem_op(real_dst, OP_EQ, expected, 7);
|
|
|
|
done:
|
|
tor_free(src);
|
|
tor_free(dst);
|
|
tor_free(real_dst);
|
|
}
|
|
|
|
static void
|
|
test_util_format_base16_decode(void *ignored)
|
|
{
|
|
(void)ignored;
|
|
int res;
|
|
int i;
|
|
char *src;
|
|
char *dst, *real_dst;
|
|
char expected[] = {0x65, 0x78, 0x61, 0x6D, 0x70, 0x6C, 0x65};
|
|
char real_src[] = "6578616D706C65";
|
|
|
|
src = tor_malloc_zero(256);
|
|
dst = tor_malloc_zero(1000);
|
|
real_dst = tor_malloc_zero(10);
|
|
|
|
for (i=0;i<256;i++) {
|
|
src[i] = (char)i;
|
|
}
|
|
|
|
res = base16_decode(dst, 3, src, 3);
|
|
tt_int_op(res, OP_EQ, -1);
|
|
|
|
res = base16_decode(dst, 1, src, 10);
|
|
tt_int_op(res, OP_EQ, -1);
|
|
|
|
res = base16_decode(dst, ((size_t)INT_MAX)+1, src, 10);
|
|
tt_int_op(res, OP_EQ, -1);
|
|
|
|
res = base16_decode(dst, 1000, "", 0);
|
|
tt_int_op(res, OP_EQ, 0);
|
|
|
|
res = base16_decode(dst, 1000, "aabc", 4);
|
|
tt_int_op(res, OP_EQ, 2);
|
|
tt_mem_op(dst, OP_EQ, "\xaa\xbc", 2);
|
|
|
|
res = base16_decode(dst, 1000, "aabcd", 6);
|
|
tt_int_op(res, OP_EQ, -1);
|
|
|
|
res = base16_decode(dst, 1000, "axxx", 4);
|
|
tt_int_op(res, OP_EQ, -1);
|
|
|
|
res = base16_decode(real_dst, 10, real_src, 14);
|
|
tt_int_op(res, OP_EQ, 7);
|
|
tt_mem_op(real_dst, OP_EQ, expected, 7);
|
|
|
|
done:
|
|
tor_free(src);
|
|
tor_free(dst);
|
|
tor_free(real_dst);
|
|
}
|
|
|
|
static void
|
|
test_util_format_base32_encode(void *arg)
|
|
{
|
|
(void) arg;
|
|
size_t real_dstlen = 32;
|
|
char *dst = tor_malloc_zero(real_dstlen);
|
|
|
|
/* Basic use case that doesn't require a source length correction. */
|
|
{
|
|
/* Length of 10 bytes. */
|
|
const char *src = "blahbleh12";
|
|
size_t srclen = strlen(src);
|
|
/* Expected result encoded base32. This was created using python as
|
|
* such (and same goes for all test case.):
|
|
*
|
|
* b = bytes("blahbleh12", 'utf-8')
|
|
* base64.b32encode(b)
|
|
* (result in lower case)
|
|
*/
|
|
const char *expected = "mjwgc2dcnrswqmjs";
|
|
|
|
base32_encode(dst, base32_encoded_size(srclen), src, srclen);
|
|
tt_mem_op(expected, OP_EQ, dst, strlen(expected));
|
|
/* Encode but to a larger size destination. */
|
|
memset(dst, 0, real_dstlen);
|
|
base32_encode(dst, real_dstlen, src, srclen);
|
|
tt_mem_op(expected, OP_EQ, dst, strlen(expected));
|
|
}
|
|
|
|
/* Non multiple of 5 for the source buffer length. */
|
|
{
|
|
/* Length of 8 bytes. */
|
|
const char *expected = "mjwgc2dcnrswq";
|
|
const char *src = "blahbleh";
|
|
size_t srclen = strlen(src);
|
|
|
|
memset(dst, 0, real_dstlen);
|
|
base32_encode(dst, base32_encoded_size(srclen), src, srclen);
|
|
tt_mem_op(expected, OP_EQ, dst, strlen(expected));
|
|
}
|
|
|
|
done:
|
|
tor_free(dst);
|
|
}
|
|
|
|
static void
|
|
test_util_format_base32_decode(void *arg)
|
|
{
|
|
(void) arg;
|
|
int ret;
|
|
size_t real_dstlen = 32;
|
|
char *dst = tor_malloc_zero(real_dstlen);
|
|
|
|
/* Basic use case. */
|
|
{
|
|
/* Length of 10 bytes. */
|
|
const char *expected = "blahbleh12";
|
|
/* Expected result encoded base32. */
|
|
const char *src = "mjwgc2dcnrswqmjs";
|
|
|
|
ret = base32_decode(dst, strlen(expected), src, strlen(src));
|
|
tt_int_op(ret, OP_EQ, 0);
|
|
tt_str_op(expected, OP_EQ, dst);
|
|
}
|
|
|
|
/* Non multiple of 5 for the source buffer length. */
|
|
{
|
|
/* Length of 8 bytes. */
|
|
const char *expected = "blahbleh";
|
|
const char *src = "mjwgc2dcnrswq";
|
|
|
|
ret = base32_decode(dst, strlen(expected), src, strlen(src));
|
|
tt_int_op(ret, OP_EQ, 0);
|
|
tt_mem_op(expected, OP_EQ, dst, strlen(expected));
|
|
}
|
|
|
|
/* Invalid values. */
|
|
{
|
|
/* Invalid character '#'. */
|
|
ret = base32_decode(dst, real_dstlen, "#abcde", 6);
|
|
tt_int_op(ret, OP_EQ, -1);
|
|
/* Make sure the destination buffer has been zeroed even on error. */
|
|
tt_int_op(tor_mem_is_zero(dst, real_dstlen), OP_EQ, 1);
|
|
}
|
|
|
|
done:
|
|
tor_free(dst);
|
|
}
|
|
|
|
static void
|
|
test_util_format_encoded_size(void *arg)
|
|
{
|
|
(void)arg;
|
|
uint8_t inbuf[256];
|
|
char outbuf[1024];
|
|
unsigned i;
|
|
|
|
crypto_rand((char *)inbuf, sizeof(inbuf));
|
|
for (i = 0; i <= sizeof(inbuf); ++i) {
|
|
/* XXXX (Once the return values are consistent, check them too.) */
|
|
|
|
base32_encode(outbuf, sizeof(outbuf), (char *)inbuf, i);
|
|
/* The "+ 1" below is an API inconsistency. */
|
|
tt_int_op(strlen(outbuf) + 1, OP_EQ, base32_encoded_size(i));
|
|
|
|
base64_encode(outbuf, sizeof(outbuf), (char *)inbuf, i, 0);
|
|
tt_int_op(strlen(outbuf), OP_EQ, base64_encode_size(i, 0));
|
|
base64_encode(outbuf, sizeof(outbuf), (char *)inbuf, i,
|
|
BASE64_ENCODE_MULTILINE);
|
|
tt_int_op(strlen(outbuf), OP_EQ,
|
|
base64_encode_size(i, BASE64_ENCODE_MULTILINE));
|
|
}
|
|
|
|
done:
|
|
;
|
|
}
|
|
|
|
struct testcase_t util_format_tests[] = {
|
|
{ "unaligned_accessors", test_util_format_unaligned_accessors, 0,
|
|
NULL, NULL },
|
|
{ "base64_encode", test_util_format_base64_encode, 0, NULL, NULL },
|
|
{ "base64_decode_oddsize", test_util_format_base64_decode_oddsize, 0,
|
|
NULL, NULL },
|
|
{ "base64_decode", test_util_format_base64_decode, 0, NULL, NULL },
|
|
{ "base16_decode", test_util_format_base16_decode, 0, NULL, NULL },
|
|
{ "base32_encode", test_util_format_base32_encode, 0,
|
|
NULL, NULL },
|
|
{ "base32_decode", test_util_format_base32_decode, 0,
|
|
NULL, NULL },
|
|
{ "encoded_size", test_util_format_encoded_size, 0, NULL, NULL },
|
|
END_OF_TESTCASES
|
|
};
|
|
|