| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include <string> | 5 #include <string> |
| 6 #include <vector> | 6 #include <vector> |
| 7 | 7 |
| 8 #include "base/basictypes.h" | 8 #include "base/basictypes.h" |
| 9 #include "base/bind.h" | 9 #include "base/bind.h" |
| 10 #include "media/base/decoder_buffer.h" | 10 #include "media/base/decoder_buffer.h" |
| 11 #include "media/base/decrypt_config.h" | 11 #include "media/base/decrypt_config.h" |
| 12 #include "media/base/mock_filters.h" | 12 #include "media/base/mock_filters.h" |
| 13 #include "media/crypto/aes_decryptor.h" | 13 #include "media/crypto/aes_decryptor.h" |
| 14 #include "media/webm/webm_constants.h" | 14 #include "media/webm/webm_constants.h" |
| 15 #include "testing/gmock/include/gmock/gmock.h" | 15 #include "testing/gmock/include/gmock/gmock.h" |
| 16 #include "testing/gtest/include/gtest/gtest.h" | 16 #include "testing/gtest/include/gtest/gtest.h" |
| 17 | 17 |
| 18 using ::testing::_; | 18 using ::testing::_; |
| 19 using ::testing::Gt; | 19 using ::testing::Gt; |
| 20 using ::testing::IsNull; | 20 using ::testing::IsNull; |
| 21 using ::testing::NotNull; | 21 using ::testing::NotNull; |
| 22 using ::testing::SaveArg; | 22 using ::testing::SaveArg; |
| 23 using ::testing::StrNe; | 23 using ::testing::StrNe; |
| 24 | 24 |
| 25 namespace media { | 25 namespace media { |
| 26 | 26 |
| 27 MATCHER_P2(ArrayEq, array, size, "") { |
| 28 return !memcmp(arg, array, size); |
| 29 } |
| 30 |
| 27 // |encrypted_data| is encrypted from |plain_text| using |key|. |key_id| is | 31 // |encrypted_data| is encrypted from |plain_text| using |key|. |key_id| is |
| 28 // used to distinguish |key|. | 32 // used to distinguish |key|. |
| 29 struct WebmEncryptedData { | 33 struct WebmEncryptedData { |
| 30 uint8 plain_text[32]; | 34 uint8 plain_text[32]; |
| 31 int plain_text_size; | 35 int plain_text_size; |
| 32 uint8 key_id[32]; | 36 uint8 key_id[32]; |
| 33 int key_id_size; | 37 int key_id_size; |
| 34 uint8 key[32]; | 38 uint8 key[32]; |
| 35 int key_size; | 39 int key_size; |
| 36 uint8 encrypted_data[64]; | 40 uint8 encrypted_data[64]; |
| (...skipping 15 matching lines...) Expand all Loading... |
| 52 }, 20, | 56 }, 20, |
| 53 // key | 57 // key |
| 54 { 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1a, 0x1b, | 58 { 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1a, 0x1b, |
| 55 0x1c, 0x1d, 0x1e, 0x1f, 0x20, 0x21, 0x22, 0x23 | 59 0x1c, 0x1d, 0x1e, 0x1f, 0x20, 0x21, 0x22, 0x23 |
| 56 }, 16, | 60 }, 16, |
| 57 // encrypted_data | 61 // encrypted_data |
| 58 { 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, | 62 { 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, |
| 59 0xff, 0xf0, 0xd1, 0x12, 0xd5, 0x24, 0x81, 0x96, | 63 0xff, 0xf0, 0xd1, 0x12, 0xd5, 0x24, 0x81, 0x96, |
| 60 0x55, 0x1b, 0x68, 0x9f, 0x38, 0x91, 0x85 | 64 0x55, 0x1b, 0x68, 0x9f, 0x38, 0x91, 0x85 |
| 61 }, 23 | 65 }, 23 |
| 62 }, | 66 }, { |
| 63 { | |
| 64 // plaintext | 67 // plaintext |
| 65 "Changed Original data.", 22, | 68 "Changed Original data.", 22, |
| 66 // key_id | 69 // key_id |
| 67 { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 70 { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, |
| 68 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, | 71 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, |
| 69 0x10, 0x11, 0x12, 0x13 | 72 0x10, 0x11, 0x12, 0x13 |
| 70 }, 20, | 73 }, 20, |
| 71 // key | 74 // key |
| 72 { 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1a, 0x1b, | 75 { 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1a, 0x1b, |
| 73 0x1c, 0x1d, 0x1e, 0x1f, 0x20, 0x21, 0x22, 0x23 | 76 0x1c, 0x1d, 0x1e, 0x1f, 0x20, 0x21, 0x22, 0x23 |
| 74 }, 16, | 77 }, 16, |
| 75 // encrypted_data | 78 // encrypted_data |
| 76 { 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 79 { 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| 77 0x00, 0x57, 0x66, 0xf4, 0x12, 0x1a, 0xed, 0xb5, | 80 0x00, 0x57, 0x66, 0xf4, 0x12, 0x1a, 0xed, 0xb5, |
| 78 0x79, 0x1c, 0x8e, 0x25, 0xd7, 0x17, 0xe7, 0x5e, | 81 0x79, 0x1c, 0x8e, 0x25, 0xd7, 0x17, 0xe7, 0x5e, |
| 79 0x16, 0xe3, 0x40, 0x08, 0x27, 0x11, 0xe9 | 82 0x16, 0xe3, 0x40, 0x08, 0x27, 0x11, 0xe9 |
| 80 }, 31 | 83 }, 31 |
| 81 }, | 84 }, { |
| 82 { | |
| 83 // plaintext | 85 // plaintext |
| 84 "Original data.", 14, | 86 "Original data.", 14, |
| 85 // key_id | 87 // key_id |
| 86 { 0x24, 0x25, 0x26, 0x27, 0x28, 0x29, 0x2a, 0x2b, | 88 { 0x24, 0x25, 0x26, 0x27, 0x28, 0x29, 0x2a, 0x2b, |
| 87 0x2c, 0x2d, 0x2e, 0x2f, 0x30 | 89 0x2c, 0x2d, 0x2e, 0x2f, 0x30 |
| 88 }, 13, | 90 }, 13, |
| 89 // key | 91 // key |
| 90 { 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37, 0x38, | 92 { 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37, 0x38, |
| 91 0x39, 0x3a, 0x3b, 0x3c, 0x3d, 0x3e, 0x3f, 0x40 | 93 0x39, 0x3a, 0x3b, 0x3c, 0x3d, 0x3e, 0x3f, 0x40 |
| 92 }, 16, | 94 }, 16, |
| 93 // encrypted_data | 95 // encrypted_data |
| 94 { 0x01, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 96 { 0x01, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| 95 0x00, 0x9c, 0x71, 0x26, 0x57, 0x3e, 0x25, 0x37, | 97 0x00, 0x9c, 0x71, 0x26, 0x57, 0x3e, 0x25, 0x37, |
| 96 0xf7, 0x31, 0x81, 0x19, 0x64, 0xce, 0xbc | 98 0xf7, 0x31, 0x81, 0x19, 0x64, 0xce, 0xbc |
| 97 }, 23 | 99 }, 23 |
| 98 }, | 100 }, { |
| 99 { | |
| 100 // plaintext | 101 // plaintext |
| 101 "Changed Original data.", 22, | 102 "Changed Original data.", 22, |
| 102 // key_id | 103 // key_id |
| 103 { 0x24, 0x25, 0x26, 0x27, 0x28, 0x29, 0x2a, 0x2b, | 104 { 0x24, 0x25, 0x26, 0x27, 0x28, 0x29, 0x2a, 0x2b, |
| 104 0x2c, 0x2d, 0x2e, 0x2f, 0x30 | 105 0x2c, 0x2d, 0x2e, 0x2f, 0x30 |
| 105 }, 13, | 106 }, 13, |
| 106 // key | 107 // key |
| 107 { 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37, 0x38, | 108 { 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37, 0x38, |
| 108 0x39, 0x3a, 0x3b, 0x3c, 0x3d, 0x3e, 0x3f, 0x40 | 109 0x39, 0x3a, 0x3b, 0x3c, 0x3d, 0x3e, 0x3f, 0x40 |
| 109 }, 16, | 110 }, 16, |
| 110 // encrypted_data | 111 // encrypted_data |
| 111 { 0x00, 0x43, 0x68, 0x61, 0x6e, 0x67, 0x65, 0x64, | 112 { 0x00, 0x43, 0x68, 0x61, 0x6e, 0x67, 0x65, 0x64, |
| 112 0x20, 0x4f, 0x72, 0x69, 0x67, 0x69, 0x6e, 0x61, | 113 0x20, 0x4f, 0x72, 0x69, 0x67, 0x69, 0x6e, 0x61, |
| 113 0x6c, 0x20, 0x64, 0x61, 0x74, 0x61, 0x2e | 114 0x6c, 0x20, 0x64, 0x61, 0x74, 0x61, 0x2e |
| 114 }, 23 | 115 }, 23 |
| 115 } | 116 } |
| 116 }; | 117 }; |
| 117 | 118 |
| 118 | |
| 119 | |
| 120 static const uint8 kWebmWrongSizedKey[] = { 0x20, 0x20 }; | 119 static const uint8 kWebmWrongSizedKey[] = { 0x20, 0x20 }; |
| 121 | 120 |
| 122 static const uint8 kSubsampleOriginalData[] = "Original subsample data."; | 121 static const uint8 kSubsampleOriginalData[] = "Original subsample data."; |
| 123 static const int kSubsampleOriginalDataSize = 24; | 122 static const int kSubsampleOriginalDataSize = 24; |
| 124 | 123 |
| 125 static const uint8 kSubsampleKeyId[] = { 0x00, 0x01, 0x02, 0x03 }; | 124 static const uint8 kSubsampleKeyId[] = { 0x00, 0x01, 0x02, 0x03 }; |
| 126 | 125 |
| 127 static const uint8 kSubsampleKey[] = { | 126 static const uint8 kSubsampleKey[] = { |
| 128 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, | 127 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, |
| 129 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13 | 128 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13 |
| (...skipping 104 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 234 : decryptor_(&client_), | 233 : decryptor_(&client_), |
| 235 decrypt_cb_(base::Bind(&AesDecryptorTest::BufferDecrypted, | 234 decrypt_cb_(base::Bind(&AesDecryptorTest::BufferDecrypted, |
| 236 base::Unretained(this))), | 235 base::Unretained(this))), |
| 237 subsample_entries_(kSubsampleEntries, | 236 subsample_entries_(kSubsampleEntries, |
| 238 kSubsampleEntries + arraysize(kSubsampleEntries)) { | 237 kSubsampleEntries + arraysize(kSubsampleEntries)) { |
| 239 } | 238 } |
| 240 | 239 |
| 241 protected: | 240 protected: |
| 242 void GenerateKeyRequest(const uint8* key_id, int key_id_size) { | 241 void GenerateKeyRequest(const uint8* key_id, int key_id_size) { |
| 243 EXPECT_CALL(client_, KeyMessageMock(kClearKeySystem, StrNe(""), | 242 EXPECT_CALL(client_, KeyMessageMock(kClearKeySystem, StrNe(""), |
| 244 NotNull(), Gt(0), "")) | 243 ArrayEq(key_id, key_id_size), |
| 244 key_id_size, "")) |
| 245 .WillOnce(SaveArg<1>(&session_id_string_)); | 245 .WillOnce(SaveArg<1>(&session_id_string_)); |
| 246 EXPECT_TRUE(decryptor_.GenerateKeyRequest(kClearKeySystem, "", | 246 EXPECT_TRUE(decryptor_.GenerateKeyRequest(kClearKeySystem, "", |
| 247 key_id, key_id_size)); | 247 key_id, key_id_size)); |
| 248 } | 248 } |
| 249 | 249 |
| 250 void AddKeyAndExpectToSucceed(const uint8* key_id, int key_id_size, | 250 void AddKeyAndExpectToSucceed(const uint8* key_id, int key_id_size, |
| 251 const uint8* key, int key_size) { | 251 const uint8* key, int key_size) { |
| 252 EXPECT_CALL(client_, KeyAdded(kClearKeySystem, session_id_string_)); | 252 EXPECT_CALL(client_, KeyAdded(kClearKeySystem, session_id_string_)); |
| 253 decryptor_.AddKey(kClearKeySystem, key, key_size, key_id, key_id_size, | 253 decryptor_.AddKey(kClearKeySystem, key, key_size, key_id, key_id_size, |
| 254 session_id_string_); | 254 session_id_string_); |
| (...skipping 53 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 308 decryptor_.Decrypt(Decryptor::kVideo, encrypted, decrypt_cb_); | 308 decryptor_.Decrypt(Decryptor::kVideo, encrypted, decrypt_cb_); |
| 309 } | 309 } |
| 310 | 310 |
| 311 MockDecryptorClient client_; | 311 MockDecryptorClient client_; |
| 312 AesDecryptor decryptor_; | 312 AesDecryptor decryptor_; |
| 313 std::string session_id_string_; | 313 std::string session_id_string_; |
| 314 AesDecryptor::DecryptCB decrypt_cb_; | 314 AesDecryptor::DecryptCB decrypt_cb_; |
| 315 std::vector<SubsampleEntry> subsample_entries_; | 315 std::vector<SubsampleEntry> subsample_entries_; |
| 316 }; | 316 }; |
| 317 | 317 |
| 318 TEST_F(AesDecryptorTest, GenerateKeyRequestWithNullInitData) { |
| 319 EXPECT_FALSE(decryptor_.GenerateKeyRequest(kClearKeySystem, "", NULL, 0)); |
| 320 } |
| 321 |
| 318 TEST_F(AesDecryptorTest, NormalWebMDecryption) { | 322 TEST_F(AesDecryptorTest, NormalWebMDecryption) { |
| 319 const WebmEncryptedData& frame = kWebmEncryptedFrames[0]; | 323 const WebmEncryptedData& frame = kWebmEncryptedFrames[0]; |
| 320 GenerateKeyRequest(frame.key_id, frame.key_id_size); | 324 GenerateKeyRequest(frame.key_id, frame.key_id_size); |
| 321 AddKeyAndExpectToSucceed(frame.key_id, frame.key_id_size, | 325 AddKeyAndExpectToSucceed(frame.key_id, frame.key_id_size, |
| 322 frame.key, frame.key_size); | 326 frame.key, frame.key_size); |
| 323 scoped_refptr<DecoderBuffer> encrypted_data = | 327 scoped_refptr<DecoderBuffer> encrypted_data = |
| 324 CreateWebMEncryptedBuffer(frame.encrypted_data, | 328 CreateWebMEncryptedBuffer(frame.encrypted_data, |
| 325 frame.encrypted_data_size, | 329 frame.encrypted_data_size, |
| 326 frame.key_id, frame.key_id_size); | 330 frame.key_id, frame.key_id_size); |
| 327 ASSERT_NO_FATAL_FAILURE(DecryptAndExpectToSucceed(encrypted_data, | 331 ASSERT_NO_FATAL_FAILURE(DecryptAndExpectToSucceed(encrypted_data, |
| (...skipping 254 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 582 scoped_refptr<DecoderBuffer> encrypted_data = CreateSubsampleEncryptedBuffer( | 586 scoped_refptr<DecoderBuffer> encrypted_data = CreateSubsampleEncryptedBuffer( |
| 583 kSubsampleData, arraysize(kSubsampleData), | 587 kSubsampleData, arraysize(kSubsampleData), |
| 584 kSubsampleKeyId, arraysize(kSubsampleKeyId), | 588 kSubsampleKeyId, arraysize(kSubsampleKeyId), |
| 585 kSubsampleIv, arraysize(kSubsampleIv), | 589 kSubsampleIv, arraysize(kSubsampleIv), |
| 586 0, | 590 0, |
| 587 entries); | 591 entries); |
| 588 ASSERT_NO_FATAL_FAILURE(DecryptAndExpectToFail(encrypted_data)); | 592 ASSERT_NO_FATAL_FAILURE(DecryptAndExpectToFail(encrypted_data)); |
| 589 } | 593 } |
| 590 | 594 |
| 591 } // namespace media | 595 } // namespace media |
| OLD | NEW |