Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(300)

Side by Side Diff: media/formats/webm/webm_crypto_helpers_unittest.cc

Issue 2174533002: Implement WebM subsample support (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Rebased Created 4 years, 3 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « media/formats/webm/webm_crypto_helpers.cc ('k') | no next file » | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
(Empty)
1 // Copyright 2016 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 #include "media/formats/webm/webm_crypto_helpers.h"
6
7 #include "testing/gmock/include/gmock/gmock.h"
8 #include "testing/gtest/include/gtest/gtest.h"
9
10 using ::testing::ElementsAre;
11
12 namespace {
13
14 const uint8_t kKeyId[] = {0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08};
15
16 } // namespace
17
18 namespace media {
19
20 inline bool operator==(const SubsampleEntry& lhs, const SubsampleEntry& rhs) {
21 return lhs.clear_bytes == rhs.clear_bytes &&
22 lhs.cypher_bytes == rhs.cypher_bytes;
23 }
24
25 TEST(WebMCryptoHelpersTest, EmptyData) {
26 std::unique_ptr<DecryptConfig> decrypt_config;
27 int data_offset;
28 ASSERT_FALSE(WebMCreateDecryptConfig(nullptr, 0, kKeyId, sizeof(kKeyId),
29 &decrypt_config, &data_offset));
30 }
31
32 TEST(WebMCryptoHelpersTest, ClearData) {
33 const uint8_t kData[] = {0x00, 0x0d, 0x0a, 0x0d, 0x0a};
34 std::unique_ptr<DecryptConfig> decrypt_config;
35 int data_offset;
36 ASSERT_TRUE(WebMCreateDecryptConfig(kData, sizeof(kData), kKeyId,
37 sizeof(kKeyId), &decrypt_config,
38 &data_offset));
39 EXPECT_EQ(1, data_offset);
40 EXPECT_FALSE(decrypt_config->is_encrypted());
41 }
42
43 TEST(WebMCryptoHelpersTest, EncryptedButNotEnoughBytes) {
44 const uint8_t kData[] = {0x01, 0x0d, 0x0a, 0x0d, 0x0a};
45 std::unique_ptr<DecryptConfig> decrypt_config;
46 int data_offset;
47 ASSERT_FALSE(WebMCreateDecryptConfig(kData, sizeof(kData), kKeyId,
48 sizeof(kKeyId), &decrypt_config,
49 &data_offset));
50 }
51
52 TEST(WebMCryptoHelpersTest, EncryptedNotPartitioned) {
53 const uint8_t kData[] = {
54 // Encrypted
55 0x01,
56 // IV
57 0x0d, 0x0a, 0x0d, 0x0a, 0x0d, 0x0a, 0x0d, 0x0a,
58 // Data
59 0x01, 0x02,
60 };
61 // Extracted from kData and zero extended to 16 bytes.
62 const uint8_t kExpectedIv[] = {
63 0x0d, 0x0a, 0x0d, 0x0a, 0x0d, 0x0a, 0x0d, 0x0a,
64 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
65 };
66 std::unique_ptr<DecryptConfig> decrypt_config;
67 int data_offset;
68 ASSERT_TRUE(WebMCreateDecryptConfig(kData, sizeof(kData), kKeyId,
69 sizeof(kKeyId), &decrypt_config,
70 &data_offset));
71 EXPECT_TRUE(decrypt_config->is_encrypted());
72 EXPECT_EQ(std::string(kKeyId, kKeyId + sizeof(kKeyId)),
73 decrypt_config->key_id());
74 EXPECT_EQ(std::string(kExpectedIv, kExpectedIv + sizeof(kExpectedIv)),
75 decrypt_config->iv());
76 EXPECT_TRUE(decrypt_config->subsamples().empty());
77 }
78
79 TEST(WebMCryptoHelpersTest, EncryptedPartitionedMissingNumPartitionField) {
80 const uint8_t kData[] = {
81 // Encrypted and Partitioned
82 0x03,
83 // IV
84 0x0d, 0x0a, 0x0d, 0x0a, 0x0d, 0x0a, 0x0d, 0x0a,
85 };
86 std::unique_ptr<DecryptConfig> decrypt_config;
87 int data_offset;
88 ASSERT_FALSE(WebMCreateDecryptConfig(kData, sizeof(kData), kKeyId,
89 sizeof(kKeyId), &decrypt_config,
90 &data_offset));
91 }
92
93 TEST(WebMCryptoHelpersTest, EncryptedPartitionedNotEnoughBytesForOffsets) {
94 const uint8_t kData[] = {
95 // Encrypted and Partitioned
96 0x03,
97 // IV
98 0x0d, 0x0a, 0x0d, 0x0a, 0x0d, 0x0a, 0x0d, 0x0a,
99 // Num partitions = 2
100 0x02,
101 // Partition 0 @ offset 3
102 0x00, 0x00, 0x00, 0x03,
103 };
104 std::unique_ptr<DecryptConfig> decrypt_config;
105 int data_offset;
106 ASSERT_FALSE(WebMCreateDecryptConfig(kData, sizeof(kData), kKeyId,
107 sizeof(kKeyId), &decrypt_config,
108 &data_offset));
109 }
110
111 TEST(WebMCryptoHelpersTest, EncryptedPartitionedNotEnoughBytesForData) {
112 const uint8_t kData[] = {
113 // Encrypted and Partitioned
114 0x03,
115 // IV
116 0x0d, 0x0a, 0x0d, 0x0a, 0x0d, 0x0a, 0x0d, 0x0a,
117 // Num partitions = 2
118 0x02,
119 // Partition 0 @ offset 3, partition 2 @ offset 5
120 0x00, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, 0x05,
121 // Should have more than 5 bytes of data
122 0x00, 0x01, 0x02, 0x03,
123 };
124 std::unique_ptr<DecryptConfig> decrypt_config;
125 int data_offset;
126 ASSERT_FALSE(WebMCreateDecryptConfig(kData, sizeof(kData), kKeyId,
127 sizeof(kKeyId), &decrypt_config,
128 &data_offset));
129 }
130
131 TEST(WebMCryptoHelpersTest, EncryptedPartitionedNotEnoughBytesForData2) {
132 const uint8_t kData[] = {
133 // Encrypted and Partitioned
134 0x03,
135 // IV
136 0x0d, 0x0a, 0x0d, 0x0a, 0x0d, 0x0a, 0x0d, 0x0a,
137 // Num partitions = 2
138 0x02,
139 // Partition 0 @ offset 3, partition 1 @ offset 5
140 0x00, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, 0x05,
141 // Should have more than 5 bytes of data
142 0x00, 0x01, 0x02, 0x03, 0x04,
143 };
144 std::unique_ptr<DecryptConfig> decrypt_config;
145 int data_offset;
146 ASSERT_FALSE(WebMCreateDecryptConfig(kData, sizeof(kData), kKeyId,
147 sizeof(kKeyId), &decrypt_config,
148 &data_offset));
149 }
150
151 TEST(WebMCryptoHelpersTest, EncryptedPartitionedDecreasingOffsets) {
152 const uint8_t kData[] = {
153 // Encrypted and Partitioned
154 0x03,
155 // IV
156 0x0d, 0x0a, 0x0d, 0x0a, 0x0d, 0x0a, 0x0d, 0x0a,
157 // Num partitions = 2
158 0x02,
159 // Partition 0 @ offset 3, partition 1 @ offset 2
160 0x00, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, 0x02,
161 // Should have more than 5 bytes of data
162 0x00, 0x01, 0x02, 0x03, 0x04,
163 };
164 std::unique_ptr<DecryptConfig> decrypt_config;
165 int data_offset;
166 ASSERT_FALSE(WebMCreateDecryptConfig(kData, sizeof(kData), kKeyId,
167 sizeof(kKeyId), &decrypt_config,
168 &data_offset));
169 }
170
171 TEST(WebMCryptoHelpersTest, EncryptedPartitionedEvenNumberOfPartitions) {
172 const uint8_t kData[] = {
173 // Encrypted and Partitioned
174 0x03,
175 // IV
176 0x0d, 0x0a, 0x0d, 0x0a, 0x0d, 0x0a, 0x0d, 0x0a,
177 // Num partitions = 2
178 0x02,
179 // Partition 0 @ offset 3, partition 1 @ offset 5
180 0x00, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, 0x05,
181 // Should have more than 5 bytes of data
182 0x00, 0x01, 0x02, 0x03, 0x04, 0x05,
183 };
184 // Extracted from kData and zero extended to 16 bytes.
185 const uint8_t kExpectedIv[] = {
186 0x0d, 0x0a, 0x0d, 0x0a, 0x0d, 0x0a, 0x0d, 0x0a,
187 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
188 };
189 std::unique_ptr<DecryptConfig> decrypt_config;
190 int data_offset;
191 ASSERT_TRUE(WebMCreateDecryptConfig(kData, sizeof(kData), kKeyId,
192 sizeof(kKeyId), &decrypt_config,
193 &data_offset));
194 EXPECT_TRUE(decrypt_config->is_encrypted());
195 EXPECT_EQ(std::string(kKeyId, kKeyId + sizeof(kKeyId)),
196 decrypt_config->key_id());
197 EXPECT_EQ(std::string(kExpectedIv, kExpectedIv + sizeof(kExpectedIv)),
198 decrypt_config->iv());
199 EXPECT_THAT(decrypt_config->subsamples(),
200 ElementsAre(SubsampleEntry(3, 2), SubsampleEntry(1, 0)));
201 EXPECT_EQ(18, data_offset);
202 }
203
204 TEST(WebMCryptoHelpersTest, EncryptedPartitionedOddNumberOfPartitions) {
205 const uint8_t kData[] = {
206 // Encrypted and Partitioned
207 0x03,
208 // IV
209 0x0d, 0x0a, 0x0d, 0x0a, 0x0d, 0x0a, 0x0d, 0x0a,
210 // Num partitions = 1
211 0x01,
212 // Partition 0 @ offset 3,
213 0x00, 0x00, 0x00, 0x03,
214 // Should have more than 3 bytes of data
215 0x00, 0x01, 0x02, 0x03, 0x04, 0x05,
216 };
217 // Extracted from kData and zero extended to 16 bytes.
218 const uint8_t kExpectedIv[] = {
219 0x0d, 0x0a, 0x0d, 0x0a, 0x0d, 0x0a, 0x0d, 0x0a,
220 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
221 };
222 std::unique_ptr<DecryptConfig> decrypt_config;
223 int data_offset;
224 ASSERT_TRUE(WebMCreateDecryptConfig(kData, sizeof(kData), kKeyId,
225 sizeof(kKeyId), &decrypt_config,
226 &data_offset));
227 EXPECT_TRUE(decrypt_config->is_encrypted());
228 EXPECT_EQ(std::string(kKeyId, kKeyId + sizeof(kKeyId)),
229 decrypt_config->key_id());
230 EXPECT_EQ(std::string(kExpectedIv, kExpectedIv + sizeof(kExpectedIv)),
231 decrypt_config->iv());
232 EXPECT_THAT(decrypt_config->subsamples(), ElementsAre(SubsampleEntry(3, 3)));
233 EXPECT_EQ(14, data_offset);
234 }
235
236 } // namespace media
OLDNEW
« no previous file with comments | « media/formats/webm/webm_crypto_helpers.cc ('k') | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698