Index: crypto/encryptor_unittest.cc |
diff --git a/crypto/encryptor_unittest.cc b/crypto/encryptor_unittest.cc |
index 7f2caf9f7e2374720fb67e5d8478a9ed8a0f9282..d6a1a56835b8fde87bea4b7b4ca78c9e368a4b6e 100644 |
--- a/crypto/encryptor_unittest.cc |
+++ b/crypto/encryptor_unittest.cc |
@@ -35,6 +35,52 @@ TEST(EncryptorTest, EncryptDecrypt) { |
EXPECT_EQ(plaintext, decypted); |
} |
+TEST(EncryptorTest, DecryptWrongKey) { |
+ scoped_ptr<crypto::SymmetricKey> key( |
+ crypto::SymmetricKey::DeriveKeyFromPassword( |
+ crypto::SymmetricKey::AES, "password", "saltiest", 1000, 256)); |
+ EXPECT_TRUE(NULL != key.get()); |
+ |
+ scoped_ptr<crypto::SymmetricKey> wrong_key( |
+ crypto::SymmetricKey::DeriveKeyFromPassword( |
+ crypto::SymmetricKey::AES, "wrongword", "sweetest", 1000, 256)); |
+ EXPECT_TRUE(NULL != wrong_key.get()); |
+ |
+ crypto::Encryptor encryptor; |
+ // The IV must be exactly as long as the cipher block size. |
+ std::string iv("the iv: 16 bytes"); |
+ EXPECT_EQ(16U, iv.size()); |
+ EXPECT_TRUE(encryptor.Init(key.get(), crypto::Encryptor::CBC, iv)); |
+ |
+ std::string plaintext("this is the plaintext"); |
+ std::string ciphertext; |
+ EXPECT_TRUE(encryptor.Encrypt(plaintext, &ciphertext)); |
+ |
+ EXPECT_LT(0U, ciphertext.size()); |
wtc
2012/04/23 21:46:41
I suggest removing this line because the new test
xhwang
2012/04/23 21:54:05
Done.
|
+ |
+ static const unsigned char expected_ciphertext[] = { |
+ 0x7D, 0x67, 0x5B, 0x53, 0xE6, 0xD8, 0x0F, 0x27, |
+ 0x74, 0xB1, 0x90, 0xFE, 0x6E, 0x58, 0x4A, 0xA0, |
+ 0x0E, 0x35, 0xE3, 0x01, 0xC0, 0xFE, 0x9A, 0xD8, |
+ 0x48, 0x1D, 0x42, 0xB0, 0xBA, 0x21, 0xB2, 0x0C |
+ }; |
+ |
+ ASSERT_EQ(arraysize(expected_ciphertext), ciphertext.size()); |
+ for (size_t i = 0; i < ciphertext.size(); ++i) { |
+ ASSERT_EQ(expected_ciphertext[i], |
+ static_cast<unsigned char>(ciphertext[i])); |
+ } |
+ |
+ crypto::Encryptor decryptor; |
+ EXPECT_TRUE(decryptor.Init(wrong_key.get(), crypto::Encryptor::CBC, iv)); |
+ std::string decypted; |
+ // TODO(wtc): On Linux, Encryptor::Decrypt() doesn't always return false when |
+ // wrong key is provided. See crbug.com/124434. Remove #if when bug is fixed. |
+#if !defined(USE_NSS) |
+ EXPECT_FALSE(decryptor.Decrypt(ciphertext, &decypted)); |
+#endif |
+} |
+ |
// CTR mode encryption is only implemented using NSS. |
#if defined(USE_NSS) |