b494a193db
* Proper encapsulation * known_hosts2 backend extended (storing PEM) * New backend storing each host certificate in a file
113 lines
2.6 KiB
C
113 lines
2.6 KiB
C
/**
|
|
* FreeRDP: A Remote Desktop Protocol Implementation
|
|
*
|
|
* Copyright 2014 Thincast Technologies GmbH
|
|
* Copyright 2014 Hardening <contact@hardening-consulting.com>
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
#include <freerdp/crypto/crypto.h>
|
|
|
|
struct Encode64test
|
|
{
|
|
const char* input;
|
|
size_t len;
|
|
const char* output;
|
|
};
|
|
|
|
static const struct Encode64test encodeTests[] = {
|
|
{ "\x00", 1, "AA==" },
|
|
{ "\x00\x00", 2, "AAA=" },
|
|
{ "\x00\x00\x00", 3, "AAAA" },
|
|
{ "0123456", 7, "MDEyMzQ1Ng==" },
|
|
{ "90123456", 8, "OTAxMjM0NTY=" },
|
|
{ "890123456", 9, "ODkwMTIzNDU2" },
|
|
{ "7890123456", 10, "Nzg5MDEyMzQ1Ng==" },
|
|
|
|
{ NULL, -1, NULL }, /* /!\ last one /!\ */
|
|
};
|
|
|
|
int TestBase64(int argc, char* argv[])
|
|
{
|
|
int i, testNb = 0;
|
|
size_t outLen;
|
|
BYTE* decoded;
|
|
WINPR_UNUSED(argc);
|
|
WINPR_UNUSED(argv);
|
|
testNb++;
|
|
fprintf(stderr, "%d:encode base64...", testNb);
|
|
|
|
for (i = 0; encodeTests[i].input; i++)
|
|
{
|
|
char* encoded = crypto_base64_encode((const BYTE*)encodeTests[i].input, encodeTests[i].len);
|
|
|
|
if (strcmp(encodeTests[i].output, encoded))
|
|
{
|
|
fprintf(stderr, "ko, error for string %d\n", i);
|
|
return -1;
|
|
}
|
|
|
|
free(encoded);
|
|
}
|
|
|
|
fprintf(stderr, "ok\n");
|
|
testNb++;
|
|
fprintf(stderr, "%d:decode base64...", testNb);
|
|
|
|
for (i = 0; encodeTests[i].input; i++)
|
|
{
|
|
crypto_base64_decode(encodeTests[i].output, strlen(encodeTests[i].output), &decoded,
|
|
&outLen);
|
|
|
|
if (!decoded || (outLen != encodeTests[i].len) ||
|
|
memcmp(encodeTests[i].input, decoded, outLen))
|
|
{
|
|
fprintf(stderr, "ko, error for string %d\n", i);
|
|
return -1;
|
|
}
|
|
|
|
free(decoded);
|
|
}
|
|
|
|
fprintf(stderr, "ok\n");
|
|
testNb++;
|
|
fprintf(stderr, "%d:decode base64 errors...", testNb);
|
|
crypto_base64_decode("000", 3, &decoded, &outLen);
|
|
|
|
if (decoded)
|
|
{
|
|
fprintf(stderr, "ko, badly padded string\n");
|
|
return -1;
|
|
}
|
|
|
|
crypto_base64_decode("0=00", 4, &decoded, &outLen);
|
|
|
|
if (decoded)
|
|
{
|
|
fprintf(stderr, "ko, = in a wrong place\n");
|
|
return -1;
|
|
}
|
|
|
|
crypto_base64_decode("00=0", 4, &decoded, &outLen);
|
|
|
|
if (decoded)
|
|
{
|
|
fprintf(stderr, "ko, = in a wrong place\n");
|
|
return -1;
|
|
}
|
|
|
|
fprintf(stderr, "ok\n");
|
|
return 0;
|
|
}
|