Index: net/quic/crypto/chacha20_poly1305_rfc7539_decrypter_test.cc |
diff --git a/net/quic/crypto/chacha20_poly1305_rfc7539_decrypter_test.cc b/net/quic/crypto/chacha20_poly1305_rfc7539_decrypter_test.cc |
deleted file mode 100644 |
index bc09d3e14a13a178cd4636791995fb0eacf3362f..0000000000000000000000000000000000000000 |
--- a/net/quic/crypto/chacha20_poly1305_rfc7539_decrypter_test.cc |
+++ /dev/null |
@@ -1,185 +0,0 @@ |
-// Copyright 2014 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-#include "net/quic/crypto/chacha20_poly1305_rfc7539_decrypter.h" |
- |
-#include <memory> |
- |
-#include "net/quic/quic_flags.h" |
-#include "net/quic/test_tools/quic_test_utils.h" |
- |
-using base::StringPiece; |
-using std::string; |
- |
-namespace { |
- |
-// The test vectors come from RFC 7539 Section 2.8.2. |
- |
-// Each test vector consists of six strings of lowercase hexadecimal digits. |
-// The strings may be empty (zero length). A test vector with a nullptr |key| |
-// marks the end of an array of test vectors. |
-struct TestVector { |
- // Input: |
- const char* key; |
- const char* iv; |
- const char* fixed; |
- const char* aad; |
- const char* ct; |
- |
- // Expected output: |
- const char* pt; // An empty string "" means decryption succeeded and |
- // the plaintext is zero-length. NULL means decryption |
- // failed. |
-}; |
- |
-const TestVector test_vectors[] = { |
- {"808182838485868788898a8b8c8d8e8f" |
- "909192939495969798999a9b9c9d9e9f", |
- |
- "4041424344454647", |
- |
- "07000000", |
- |
- "50515253c0c1c2c3c4c5c6c7", |
- |
- "d31a8d34648e60db7b86afbc53ef7ec2" |
- "a4aded51296e08fea9e2b5a736ee62d6" |
- "3dbea45e8ca9671282fafb69da92728b" |
- "1a71de0a9e060b2905d6a5b67ecd3b36" |
- "92ddbd7f2d778b8c9803aee328091b58" |
- "fab324e4fad675945585808b4831d7bc" |
- "3ff4def08e4b7a9de576d26586cec64b" |
- "6116" |
- "1ae10b594f09e26a7e902ecb", // "d0600691" truncated |
- |
- "4c616469657320616e642047656e746c" |
- "656d656e206f662074686520636c6173" |
- "73206f66202739393a20496620492063" |
- "6f756c64206f6666657220796f75206f" |
- "6e6c79206f6e652074697020666f7220" |
- "746865206675747572652c2073756e73" |
- "637265656e20776f756c642062652069" |
- "742e"}, |
- // Modify the ciphertext (Poly1305 authenticator). |
- {"808182838485868788898a8b8c8d8e8f" |
- "909192939495969798999a9b9c9d9e9f", |
- |
- "4041424344454647", |
- |
- "07000000", |
- |
- "50515253c0c1c2c3c4c5c6c7", |
- |
- "d31a8d34648e60db7b86afbc53ef7ec2" |
- "a4aded51296e08fea9e2b5a736ee62d6" |
- "3dbea45e8ca9671282fafb69da92728b" |
- "1a71de0a9e060b2905d6a5b67ecd3b36" |
- "92ddbd7f2d778b8c9803aee328091b58" |
- "fab324e4fad675945585808b4831d7bc" |
- "3ff4def08e4b7a9de576d26586cec64b" |
- "6116" |
- "1ae10b594f09e26a7e902ecc", // "d0600691" truncated |
- |
- nullptr}, |
- // Modify the associated data. |
- {"808182838485868788898a8b8c8d8e8f" |
- "909192939495969798999a9b9c9d9e9f", |
- |
- "4041424344454647", |
- |
- "07000000", |
- |
- "60515253c0c1c2c3c4c5c6c7", |
- |
- "d31a8d34648e60db7b86afbc53ef7ec2" |
- "a4aded51296e08fea9e2b5a736ee62d6" |
- "3dbea45e8ca9671282fafb69da92728b" |
- "1a71de0a9e060b2905d6a5b67ecd3b36" |
- "92ddbd7f2d778b8c9803aee328091b58" |
- "fab324e4fad675945585808b4831d7bc" |
- "3ff4def08e4b7a9de576d26586cec64b" |
- "6116" |
- "1ae10b594f09e26a7e902ecb", // "d0600691" truncated |
- |
- nullptr}, |
- {nullptr}}; |
- |
-} // namespace |
- |
-namespace net { |
-namespace test { |
- |
-// DecryptWithNonce wraps the |Decrypt| method of |decrypter| to allow passing |
-// in an nonce and also to allocate the buffer needed for the plaintext. |
-QuicData* DecryptWithNonce(ChaCha20Poly1305Rfc7539Decrypter* decrypter, |
- StringPiece nonce, |
- StringPiece associated_data, |
- StringPiece ciphertext) { |
- QuicPathId path_id = kDefaultPathId; |
- QuicPacketNumber packet_number; |
- StringPiece nonce_prefix(nonce.data(), nonce.size() - sizeof(packet_number)); |
- decrypter->SetNoncePrefix(nonce_prefix); |
- memcpy(&packet_number, nonce.data() + nonce_prefix.size(), |
- sizeof(packet_number)); |
- path_id = static_cast<QuicPathId>( |
- packet_number >> 8 * (sizeof(packet_number) - sizeof(path_id))); |
- packet_number &= UINT64_C(0x00FFFFFFFFFFFFFF); |
- std::unique_ptr<char[]> output(new char[ciphertext.length()]); |
- size_t output_length = 0; |
- const bool success = decrypter->DecryptPacket( |
- path_id, packet_number, associated_data, ciphertext, output.get(), |
- &output_length, ciphertext.length()); |
- if (!success) { |
- return nullptr; |
- } |
- return new QuicData(output.release(), output_length, true); |
-} |
- |
-TEST(ChaCha20Poly1305Rfc7539DecrypterTest, Decrypt) { |
- if (!ChaCha20Poly1305Rfc7539Decrypter::IsSupported()) { |
- VLOG(1) << "ChaCha20+Poly1305 not supported. Test skipped."; |
- return; |
- } |
- for (size_t i = 0; test_vectors[i].key != nullptr; i++) { |
- // If not present then decryption is expected to fail. |
- bool has_pt = test_vectors[i].pt; |
- |
- // Decode the test vector. |
- string key; |
- string iv; |
- string fixed; |
- string aad; |
- string ct; |
- string pt; |
- ASSERT_TRUE(DecodeHexString(test_vectors[i].key, &key)); |
- ASSERT_TRUE(DecodeHexString(test_vectors[i].iv, &iv)); |
- ASSERT_TRUE(DecodeHexString(test_vectors[i].fixed, &fixed)); |
- ASSERT_TRUE(DecodeHexString(test_vectors[i].aad, &aad)); |
- ASSERT_TRUE(DecodeHexString(test_vectors[i].ct, &ct)); |
- if (has_pt) { |
- ASSERT_TRUE(DecodeHexString(test_vectors[i].pt, &pt)); |
- } |
- |
- ChaCha20Poly1305Rfc7539Decrypter decrypter; |
- ASSERT_TRUE(decrypter.SetKey(key)); |
- std::unique_ptr<QuicData> decrypted(DecryptWithNonce( |
- &decrypter, fixed + iv, |
- // This deliberately tests that the decrypter can handle an AAD that |
- // is set to nullptr, as opposed to a zero-length, non-nullptr pointer. |
- StringPiece(aad.length() ? aad.data() : nullptr, aad.length()), ct)); |
- if (!decrypted.get()) { |
- EXPECT_FALSE(has_pt); |
- continue; |
- } |
- EXPECT_TRUE(has_pt); |
- |
- EXPECT_EQ(12u, ct.size() - decrypted->length()); |
- ASSERT_EQ(pt.length(), decrypted->length()); |
- test::CompareCharArraysWithHexError("plaintext", decrypted->data(), |
- pt.length(), pt.data(), pt.length()); |
- } |
-} |
- |
-} // namespace test |
-} // namespace net |