| OLD | NEW |
| (Empty) |
| 1 // Copyright 2014 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #include "net/quic/crypto/chacha20_poly1305_decrypter.h" | |
| 6 | |
| 7 #include <memory> | |
| 8 | |
| 9 #include "net/quic/quic_flags.h" | |
| 10 #include "net/quic/quic_utils.h" | |
| 11 #include "net/quic/test_tools/quic_test_utils.h" | |
| 12 | |
| 13 using base::StringPiece; | |
| 14 using std::string; | |
| 15 | |
| 16 namespace { | |
| 17 | |
| 18 // The test vectors come from RFC 7539 Section 2.8.2. | |
| 19 | |
| 20 // Each test vector consists of six strings of lowercase hexadecimal digits. | |
| 21 // The strings may be empty (zero length). A test vector with a nullptr |key| | |
| 22 // marks the end of an array of test vectors. | |
| 23 struct TestVector { | |
| 24 // Input: | |
| 25 const char* key; | |
| 26 const char* iv; | |
| 27 const char* fixed; | |
| 28 const char* aad; | |
| 29 const char* ct; | |
| 30 | |
| 31 // Expected output: | |
| 32 const char* pt; // An empty string "" means decryption succeeded and | |
| 33 // the plaintext is zero-length. nullptr means decryption | |
| 34 // failed. | |
| 35 }; | |
| 36 | |
| 37 const TestVector test_vectors[] = { | |
| 38 {"808182838485868788898a8b8c8d8e8f" | |
| 39 "909192939495969798999a9b9c9d9e9f", | |
| 40 | |
| 41 "4041424344454647", | |
| 42 | |
| 43 "07000000", | |
| 44 | |
| 45 "50515253c0c1c2c3c4c5c6c7", | |
| 46 | |
| 47 "d31a8d34648e60db7b86afbc53ef7ec2" | |
| 48 "a4aded51296e08fea9e2b5a736ee62d6" | |
| 49 "3dbea45e8ca9671282fafb69da92728b" | |
| 50 "1a71de0a9e060b2905d6a5b67ecd3b36" | |
| 51 "92ddbd7f2d778b8c9803aee328091b58" | |
| 52 "fab324e4fad675945585808b4831d7bc" | |
| 53 "3ff4def08e4b7a9de576d26586cec64b" | |
| 54 "6116" | |
| 55 "1ae10b594f09e26a7e902ecb", // "d0600691" truncated | |
| 56 | |
| 57 "4c616469657320616e642047656e746c" | |
| 58 "656d656e206f662074686520636c6173" | |
| 59 "73206f66202739393a20496620492063" | |
| 60 "6f756c64206f6666657220796f75206f" | |
| 61 "6e6c79206f6e652074697020666f7220" | |
| 62 "746865206675747572652c2073756e73" | |
| 63 "637265656e20776f756c642062652069" | |
| 64 "742e"}, | |
| 65 // Modify the ciphertext (Poly1305 authenticator). | |
| 66 {"808182838485868788898a8b8c8d8e8f" | |
| 67 "909192939495969798999a9b9c9d9e9f", | |
| 68 | |
| 69 "4041424344454647", | |
| 70 | |
| 71 "07000000", | |
| 72 | |
| 73 "50515253c0c1c2c3c4c5c6c7", | |
| 74 | |
| 75 "d31a8d34648e60db7b86afbc53ef7ec2" | |
| 76 "a4aded51296e08fea9e2b5a736ee62d6" | |
| 77 "3dbea45e8ca9671282fafb69da92728b" | |
| 78 "1a71de0a9e060b2905d6a5b67ecd3b36" | |
| 79 "92ddbd7f2d778b8c9803aee328091b58" | |
| 80 "fab324e4fad675945585808b4831d7bc" | |
| 81 "3ff4def08e4b7a9de576d26586cec64b" | |
| 82 "6116" | |
| 83 "1ae10b594f09e26a7e902ecc", // "d0600691" truncated | |
| 84 | |
| 85 nullptr}, | |
| 86 // Modify the associated data. | |
| 87 {"808182838485868788898a8b8c8d8e8f" | |
| 88 "909192939495969798999a9b9c9d9e9f", | |
| 89 | |
| 90 "4041424344454647", | |
| 91 | |
| 92 "07000000", | |
| 93 | |
| 94 "60515253c0c1c2c3c4c5c6c7", | |
| 95 | |
| 96 "d31a8d34648e60db7b86afbc53ef7ec2" | |
| 97 "a4aded51296e08fea9e2b5a736ee62d6" | |
| 98 "3dbea45e8ca9671282fafb69da92728b" | |
| 99 "1a71de0a9e060b2905d6a5b67ecd3b36" | |
| 100 "92ddbd7f2d778b8c9803aee328091b58" | |
| 101 "fab324e4fad675945585808b4831d7bc" | |
| 102 "3ff4def08e4b7a9de576d26586cec64b" | |
| 103 "6116" | |
| 104 "1ae10b594f09e26a7e902ecb", // "d0600691" truncated | |
| 105 | |
| 106 nullptr}, | |
| 107 {nullptr}}; | |
| 108 | |
| 109 } // namespace | |
| 110 | |
| 111 namespace net { | |
| 112 namespace test { | |
| 113 | |
| 114 // DecryptWithNonce wraps the |Decrypt| method of |decrypter| to allow passing | |
| 115 // in an nonce and also to allocate the buffer needed for the plaintext. | |
| 116 QuicData* DecryptWithNonce(ChaCha20Poly1305Decrypter* decrypter, | |
| 117 StringPiece nonce, | |
| 118 StringPiece associated_data, | |
| 119 StringPiece ciphertext) { | |
| 120 QuicPathId path_id = kDefaultPathId; | |
| 121 QuicPacketNumber packet_number; | |
| 122 StringPiece nonce_prefix(nonce.data(), nonce.size() - sizeof(packet_number)); | |
| 123 decrypter->SetNoncePrefix(nonce_prefix); | |
| 124 memcpy(&packet_number, nonce.data() + nonce_prefix.size(), | |
| 125 sizeof(packet_number)); | |
| 126 path_id = static_cast<QuicPathId>( | |
| 127 packet_number >> 8 * (sizeof(packet_number) - sizeof(path_id))); | |
| 128 packet_number &= UINT64_C(0x00FFFFFFFFFFFFFF); | |
| 129 std::unique_ptr<char[]> output(new char[ciphertext.length()]); | |
| 130 size_t output_length = 0; | |
| 131 const bool success = decrypter->DecryptPacket( | |
| 132 path_id, packet_number, associated_data, ciphertext, output.get(), | |
| 133 &output_length, ciphertext.length()); | |
| 134 if (!success) { | |
| 135 return nullptr; | |
| 136 } | |
| 137 return new QuicData(output.release(), output_length, true); | |
| 138 } | |
| 139 | |
| 140 TEST(ChaCha20Poly1305DecrypterTest, Decrypt) { | |
| 141 for (size_t i = 0; test_vectors[i].key != nullptr; i++) { | |
| 142 // If not present then decryption is expected to fail. | |
| 143 bool has_pt = test_vectors[i].pt; | |
| 144 | |
| 145 // Decode the test vector. | |
| 146 string key = QuicUtils::HexDecode(test_vectors[i].key); | |
| 147 string iv = QuicUtils::HexDecode(test_vectors[i].iv); | |
| 148 string fixed = QuicUtils::HexDecode(test_vectors[i].fixed); | |
| 149 string aad = QuicUtils::HexDecode(test_vectors[i].aad); | |
| 150 string ct = QuicUtils::HexDecode(test_vectors[i].ct); | |
| 151 string pt; | |
| 152 if (has_pt) { | |
| 153 pt = QuicUtils::HexDecode(test_vectors[i].pt); | |
| 154 } | |
| 155 | |
| 156 ChaCha20Poly1305Decrypter decrypter; | |
| 157 ASSERT_TRUE(decrypter.SetKey(key)); | |
| 158 std::unique_ptr<QuicData> decrypted(DecryptWithNonce( | |
| 159 &decrypter, fixed + iv, | |
| 160 // This deliberately tests that the decrypter can handle an AAD that | |
| 161 // is set to nullptr, as opposed to a zero-length, non-nullptr pointer. | |
| 162 StringPiece(aad.length() ? aad.data() : nullptr, aad.length()), ct)); | |
| 163 if (!decrypted.get()) { | |
| 164 EXPECT_FALSE(has_pt); | |
| 165 continue; | |
| 166 } | |
| 167 EXPECT_TRUE(has_pt); | |
| 168 | |
| 169 EXPECT_EQ(12u, ct.size() - decrypted->length()); | |
| 170 ASSERT_EQ(pt.length(), decrypted->length()); | |
| 171 test::CompareCharArraysWithHexError("plaintext", decrypted->data(), | |
| 172 pt.length(), pt.data(), pt.length()); | |
| 173 } | |
| 174 } | |
| 175 | |
| 176 } // namespace test | |
| 177 } // namespace net | |
| OLD | NEW |