blob: b593633ce5b2bc7bb27f267cc2c97681b1818b14 [file] [log] [blame]
// Copyright 2012 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "base/base64.h"
#include "base/numerics/checked_math.h"
#include "base/test/gtest_util.h"
#include "testing/gmock/include/gmock/gmock.h"
#include "testing/gtest/include/gtest/gtest.h"
#include "third_party/modp_b64/modp_b64.h"
namespace base {
TEST(Base64Test, Basic) {
const std::string kText = "hello world";
const std::string kBase64Text = "aGVsbG8gd29ybGQ=";
std::string encoded;
std::string decoded;
bool ok;
Base64Encode(kText, &encoded);
EXPECT_EQ(kBase64Text, encoded);
ok = Base64Decode(encoded, &decoded);
EXPECT_TRUE(ok);
EXPECT_EQ(kText, decoded);
}
TEST(Base64Test, Binary) {
const uint8_t kData[] = {0x00, 0x01, 0xFE, 0xFF};
std::string binary_encoded = Base64Encode(kData);
// Check that encoding the same data through the StringPiece interface gives
// the same results.
std::string string_piece_encoded;
Base64Encode(StringPiece(reinterpret_cast<const char*>(kData), sizeof(kData)),
&string_piece_encoded);
EXPECT_EQ(binary_encoded, string_piece_encoded);
EXPECT_THAT(Base64Decode(binary_encoded),
testing::Optional(testing::ElementsAreArray(kData)));
EXPECT_FALSE(Base64Decode("invalid base64!"));
std::string encoded_with_prefix = "PREFIX";
Base64EncodeAppend(kData, &encoded_with_prefix);
EXPECT_EQ(encoded_with_prefix, "PREFIX" + binary_encoded);
}
TEST(Base64Test, InPlace) {
const std::string kText = "hello world";
const std::string kBase64Text = "aGVsbG8gd29ybGQ=";
std::string text(kText);
Base64Encode(text, &text);
EXPECT_EQ(kBase64Text, text);
bool ok = Base64Decode(text, &text);
EXPECT_TRUE(ok);
EXPECT_EQ(text, kText);
}
TEST(Base64Test, Overflow) {
// `Base64Encode` makes the input larger, which means inputs whose base64
// output overflows `size_t`. Actually allocating a span of this size will
// likely fail, but we test it with a fake span and assume a correct
// implementation will check for overflow before touching the input.
//
// Note that, with or without an overflow check, the function will still
// crash. This test is only meaningful because `EXPECT_CHECK_DEATH` looks for
// a `CHECK`-based failure.
uint8_t b;
auto large_span = base::make_span(&b, MODP_B64_MAX_INPUT_LEN + 1);
EXPECT_CHECK_DEATH(Base64Encode(large_span));
std::string output = "PREFIX";
EXPECT_CHECK_DEATH(Base64EncodeAppend(large_span, &output));
// `modp_b64_encode_len` is a macro, so check `MODP_B64_MAX_INPUT_LEN` is
// correct be verifying the computation doesn't overflow.
base::CheckedNumeric<size_t> max_len = MODP_B64_MAX_INPUT_LEN;
EXPECT_TRUE(modp_b64_encode_len(max_len).IsValid());
}
} // namespace base