Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(11)

Side by Side Diff: net/quic/crypto/chacha20_poly1305_rfc7539_encrypter_test.cc

Issue 1918953003: Landing Recent QUIC changes until 4/22/2016 14:55 UTC (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Deleted SpdyFramerTests missed while mergeing 120451808 Created 4 years, 7 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
(Empty)
1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 #include "net/quic/crypto/chacha20_poly1305_rfc7539_encrypter.h"
6
7 #include <stdint.h>
8 #include <memory>
9
10 #include "net/quic/crypto/chacha20_poly1305_rfc7539_decrypter.h"
11 #include "net/quic/test_tools/quic_test_utils.h"
12
13 using base::StringPiece;
14 using std::string;
15
16 namespace {
17
18 // The test vectors come from RFC 7539 Section 2.8.2.
19
20 // Each test vector consists of five strings of lowercase hexadecimal digits.
21 // The strings may be empty (zero length). A test vector with a nullptr |key|
22 // marks the end of an array of test vectors.
23 struct TestVector {
24 const char* key;
25 const char* pt;
26 const char* iv;
27 const char* fixed;
28 const char* aad;
29 const char* ct;
30 };
31
32 const TestVector test_vectors[] = {
33 {
34 "808182838485868788898a8b8c8d8e8f"
35 "909192939495969798999a9b9c9d9e9f",
36
37 "4c616469657320616e642047656e746c"
38 "656d656e206f662074686520636c6173"
39 "73206f66202739393a20496620492063"
40 "6f756c64206f6666657220796f75206f"
41 "6e6c79206f6e652074697020666f7220"
42 "746865206675747572652c2073756e73"
43 "637265656e20776f756c642062652069"
44 "742e",
45
46 "4041424344454647",
47
48 "07000000",
49
50 "50515253c0c1c2c3c4c5c6c7",
51
52 "d31a8d34648e60db7b86afbc53ef7ec2"
53 "a4aded51296e08fea9e2b5a736ee62d6"
54 "3dbea45e8ca9671282fafb69da92728b"
55 "1a71de0a9e060b2905d6a5b67ecd3b36"
56 "92ddbd7f2d778b8c9803aee328091b58"
57 "fab324e4fad675945585808b4831d7bc"
58 "3ff4def08e4b7a9de576d26586cec64b"
59 "6116"
60 "1ae10b594f09e26a7e902ecb", // "d0600691" truncated
61 },
62 {nullptr}};
63
64 } // namespace
65
66 namespace net {
67 namespace test {
68
69 // EncryptWithNonce wraps the |Encrypt| method of |encrypter| to allow passing
70 // in an nonce and also to allocate the buffer needed for the ciphertext.
71 QuicData* EncryptWithNonce(ChaCha20Poly1305Rfc7539Encrypter* encrypter,
72 StringPiece nonce,
73 StringPiece associated_data,
74 StringPiece plaintext) {
75 size_t ciphertext_size = encrypter->GetCiphertextSize(plaintext.length());
76 std::unique_ptr<char[]> ciphertext(new char[ciphertext_size]);
77
78 if (!encrypter->Encrypt(nonce, associated_data, plaintext,
79 reinterpret_cast<unsigned char*>(ciphertext.get()))) {
80 return nullptr;
81 }
82
83 return new QuicData(ciphertext.release(), ciphertext_size, true);
84 }
85
86 TEST(ChaCha20Poly1305Rfc7539EncrypterTest, EncryptThenDecrypt) {
87 if (!ChaCha20Poly1305Rfc7539Encrypter::IsSupported()) {
88 VLOG(1) << "ChaCha20+Poly1305 not supported. Test skipped.";
89 return;
90 }
91
92 ChaCha20Poly1305Rfc7539Encrypter encrypter;
93 ChaCha20Poly1305Rfc7539Decrypter decrypter;
94
95 string key;
96 DecodeHexString(test_vectors[0].key, &key);
97 ASSERT_TRUE(encrypter.SetKey(key));
98 ASSERT_TRUE(decrypter.SetKey(key));
99 ASSERT_TRUE(encrypter.SetNoncePrefix("abcd"));
100 ASSERT_TRUE(decrypter.SetNoncePrefix("abcd"));
101
102 QuicPathId path_id = 0x42;
103 QuicPacketNumber packet_number = UINT64_C(0x123456789ABC);
104 string associated_data = "associated_data";
105 string plaintext = "plaintext";
106 char encrypted[1024];
107 size_t len;
108 ASSERT_TRUE(encrypter.EncryptPacket(path_id, packet_number, associated_data,
109 plaintext, encrypted, &len,
110 arraysize(encrypted)));
111 StringPiece ciphertext(encrypted, len);
112 char decrypted[1024];
113 ASSERT_TRUE(decrypter.DecryptPacket(path_id, packet_number, associated_data,
114 ciphertext, decrypted, &len,
115 arraysize(decrypted)));
116 }
117
118 TEST(ChaCha20Poly1305Rfc7539EncrypterTest, Encrypt) {
119 if (!ChaCha20Poly1305Rfc7539Encrypter::IsSupported()) {
120 VLOG(1) << "ChaCha20+Poly1305 not supported. Test skipped.";
121 return;
122 }
123
124 for (size_t i = 0; test_vectors[i].key != nullptr; i++) {
125 // Decode the test vector.
126 string key;
127 string pt;
128 string iv;
129 string fixed;
130 string aad;
131 string ct;
132 ASSERT_TRUE(DecodeHexString(test_vectors[i].key, &key));
133 ASSERT_TRUE(DecodeHexString(test_vectors[i].pt, &pt));
134 ASSERT_TRUE(DecodeHexString(test_vectors[i].iv, &iv));
135 ASSERT_TRUE(DecodeHexString(test_vectors[i].fixed, &fixed));
136 ASSERT_TRUE(DecodeHexString(test_vectors[i].aad, &aad));
137 ASSERT_TRUE(DecodeHexString(test_vectors[i].ct, &ct));
138
139 ChaCha20Poly1305Rfc7539Encrypter encrypter;
140 ASSERT_TRUE(encrypter.SetKey(key));
141 std::unique_ptr<QuicData> encrypted(EncryptWithNonce(
142 &encrypter, fixed + iv,
143 // This deliberately tests that the encrypter can handle an AAD that
144 // is set to nullptr, as opposed to a zero-length, non-nullptr pointer.
145 StringPiece(aad.length() ? aad.data() : nullptr, aad.length()), pt));
146 ASSERT_TRUE(encrypted.get());
147 EXPECT_EQ(12u, ct.size() - pt.size());
148 EXPECT_EQ(12u, encrypted->length() - pt.size());
149
150 test::CompareCharArraysWithHexError("ciphertext", encrypted->data(),
151 encrypted->length(), ct.data(),
152 ct.length());
153 }
154 }
155
156 TEST(ChaCha20Poly1305Rfc7539EncrypterTest, GetMaxPlaintextSize) {
157 if (!ChaCha20Poly1305Rfc7539Encrypter::IsSupported()) {
158 VLOG(1) << "ChaCha20+Poly1305 not supported. Test skipped.";
159 return;
160 }
161
162 ChaCha20Poly1305Rfc7539Encrypter encrypter;
163 EXPECT_EQ(1000u, encrypter.GetMaxPlaintextSize(1012));
164 EXPECT_EQ(100u, encrypter.GetMaxPlaintextSize(112));
165 EXPECT_EQ(10u, encrypter.GetMaxPlaintextSize(22));
166 }
167
168 TEST(ChaCha20Poly1305Rfc7539EncrypterTest, GetCiphertextSize) {
169 if (!ChaCha20Poly1305Rfc7539Encrypter::IsSupported()) {
170 VLOG(1) << "ChaCha20+Poly1305 not supported. Test skipped.";
171 return;
172 }
173
174 ChaCha20Poly1305Rfc7539Encrypter encrypter;
175 EXPECT_EQ(1012u, encrypter.GetCiphertextSize(1000));
176 EXPECT_EQ(112u, encrypter.GetCiphertextSize(100));
177 EXPECT_EQ(22u, encrypter.GetCiphertextSize(10));
178 }
179
180 } // namespace test
181 } // namespace net
OLDNEW
« no previous file with comments | « net/quic/crypto/chacha20_poly1305_rfc7539_encrypter.cc ('k') | net/quic/crypto/crypto_protocol.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698