| Index: net/quic/crypto/chacha20_poly1305_encrypter_test.cc
|
| diff --git a/net/quic/crypto/chacha20_poly1305_encrypter_test.cc b/net/quic/crypto/chacha20_poly1305_encrypter_test.cc
|
| deleted file mode 100644
|
| index c4b13d85131f171fff00aca606fadebc21bbcaba..0000000000000000000000000000000000000000
|
| --- a/net/quic/crypto/chacha20_poly1305_encrypter_test.cc
|
| +++ /dev/null
|
| @@ -1,154 +0,0 @@
|
| -// Copyright 2014 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#include "net/quic/crypto/chacha20_poly1305_encrypter.h"
|
| -
|
| -#include <memory>
|
| -
|
| -#include "net/quic/crypto/chacha20_poly1305_decrypter.h"
|
| -#include "net/quic/quic_utils.h"
|
| -#include "net/quic/test_tools/quic_test_utils.h"
|
| -
|
| -using base::StringPiece;
|
| -using std::string;
|
| -
|
| -namespace {
|
| -
|
| -// The test vectors come from RFC 7539 Section 2.8.2.
|
| -
|
| -// Each test vector consists of five strings of lowercase hexadecimal digits.
|
| -// The strings may be empty (zero length). A test vector with a nullptr |key|
|
| -// marks the end of an array of test vectors.
|
| -struct TestVector {
|
| - const char* key;
|
| - const char* pt;
|
| - const char* iv;
|
| - const char* fixed;
|
| - const char* aad;
|
| - const char* ct;
|
| -};
|
| -
|
| -const TestVector test_vectors[] = {
|
| - {
|
| - "808182838485868788898a8b8c8d8e8f"
|
| - "909192939495969798999a9b9c9d9e9f",
|
| -
|
| - "4c616469657320616e642047656e746c"
|
| - "656d656e206f662074686520636c6173"
|
| - "73206f66202739393a20496620492063"
|
| - "6f756c64206f6666657220796f75206f"
|
| - "6e6c79206f6e652074697020666f7220"
|
| - "746865206675747572652c2073756e73"
|
| - "637265656e20776f756c642062652069"
|
| - "742e",
|
| -
|
| - "4041424344454647",
|
| -
|
| - "07000000",
|
| -
|
| - "50515253c0c1c2c3c4c5c6c7",
|
| -
|
| - "d31a8d34648e60db7b86afbc53ef7ec2"
|
| - "a4aded51296e08fea9e2b5a736ee62d6"
|
| - "3dbea45e8ca9671282fafb69da92728b"
|
| - "1a71de0a9e060b2905d6a5b67ecd3b36"
|
| - "92ddbd7f2d778b8c9803aee328091b58"
|
| - "fab324e4fad675945585808b4831d7bc"
|
| - "3ff4def08e4b7a9de576d26586cec64b"
|
| - "6116"
|
| - "1ae10b594f09e26a7e902ecb", // "d0600691" truncated
|
| - },
|
| - {nullptr}};
|
| -
|
| -} // namespace
|
| -
|
| -namespace net {
|
| -namespace test {
|
| -
|
| -// EncryptWithNonce wraps the |Encrypt| method of |encrypter| to allow passing
|
| -// in an nonce and also to allocate the buffer needed for the ciphertext.
|
| -QuicData* EncryptWithNonce(ChaCha20Poly1305Encrypter* encrypter,
|
| - StringPiece nonce,
|
| - StringPiece associated_data,
|
| - StringPiece plaintext) {
|
| - size_t ciphertext_size = encrypter->GetCiphertextSize(plaintext.length());
|
| - std::unique_ptr<char[]> ciphertext(new char[ciphertext_size]);
|
| -
|
| - if (!encrypter->Encrypt(nonce, associated_data, plaintext,
|
| - reinterpret_cast<unsigned char*>(ciphertext.get()))) {
|
| - return nullptr;
|
| - }
|
| -
|
| - return new QuicData(ciphertext.release(), ciphertext_size, true);
|
| -}
|
| -
|
| -TEST(ChaCha20Poly1305EncrypterTest, EncryptThenDecrypt) {
|
| - ChaCha20Poly1305Encrypter encrypter;
|
| - ChaCha20Poly1305Decrypter decrypter;
|
| -
|
| - string key = QuicUtils::HexDecode(test_vectors[0].key);
|
| - ASSERT_TRUE(encrypter.SetKey(key));
|
| - ASSERT_TRUE(decrypter.SetKey(key));
|
| - ASSERT_TRUE(encrypter.SetNoncePrefix("abcd"));
|
| - ASSERT_TRUE(decrypter.SetNoncePrefix("abcd"));
|
| -
|
| - QuicPathId path_id = 0x42;
|
| - QuicPacketNumber packet_number = UINT64_C(0x123456789ABC);
|
| - string associated_data = "associated_data";
|
| - string plaintext = "plaintext";
|
| - char encrypted[1024];
|
| - size_t len;
|
| - ASSERT_TRUE(encrypter.EncryptPacket(path_id, packet_number, associated_data,
|
| - plaintext, encrypted, &len,
|
| - arraysize(encrypted)));
|
| - StringPiece ciphertext(encrypted, len);
|
| - char decrypted[1024];
|
| - ASSERT_TRUE(decrypter.DecryptPacket(path_id, packet_number, associated_data,
|
| - ciphertext, decrypted, &len,
|
| - arraysize(decrypted)));
|
| -}
|
| -
|
| -TEST(ChaCha20Poly1305EncrypterTest, Encrypt) {
|
| - for (size_t i = 0; test_vectors[i].key != nullptr; i++) {
|
| - // Decode the test vector.
|
| - string key = QuicUtils::HexDecode(test_vectors[i].key);
|
| - string pt = QuicUtils::HexDecode(test_vectors[i].pt);
|
| - string iv = QuicUtils::HexDecode(test_vectors[i].iv);
|
| - string fixed = QuicUtils::HexDecode(test_vectors[i].fixed);
|
| - string aad = QuicUtils::HexDecode(test_vectors[i].aad);
|
| - string ct = QuicUtils::HexDecode(test_vectors[i].ct);
|
| -
|
| - ChaCha20Poly1305Encrypter encrypter;
|
| - ASSERT_TRUE(encrypter.SetKey(key));
|
| - std::unique_ptr<QuicData> encrypted(EncryptWithNonce(
|
| - &encrypter, fixed + iv,
|
| - // This deliberately tests that the encrypter can handle an AAD that
|
| - // is set to nullptr, as opposed to a zero-length, non-nullptr pointer.
|
| - StringPiece(aad.length() ? aad.data() : nullptr, aad.length()), pt));
|
| - ASSERT_TRUE(encrypted.get());
|
| - EXPECT_EQ(12u, ct.size() - pt.size());
|
| - EXPECT_EQ(12u, encrypted->length() - pt.size());
|
| -
|
| - test::CompareCharArraysWithHexError("ciphertext", encrypted->data(),
|
| - encrypted->length(), ct.data(),
|
| - ct.length());
|
| - }
|
| -}
|
| -
|
| -TEST(ChaCha20Poly1305EncrypterTest, GetMaxPlaintextSize) {
|
| - ChaCha20Poly1305Encrypter encrypter;
|
| - EXPECT_EQ(1000u, encrypter.GetMaxPlaintextSize(1012));
|
| - EXPECT_EQ(100u, encrypter.GetMaxPlaintextSize(112));
|
| - EXPECT_EQ(10u, encrypter.GetMaxPlaintextSize(22));
|
| -}
|
| -
|
| -TEST(ChaCha20Poly1305EncrypterTest, GetCiphertextSize) {
|
| - ChaCha20Poly1305Encrypter encrypter;
|
| - EXPECT_EQ(1012u, encrypter.GetCiphertextSize(1000));
|
| - EXPECT_EQ(112u, encrypter.GetCiphertextSize(100));
|
| - EXPECT_EQ(22u, encrypter.GetCiphertextSize(10));
|
| -}
|
| -
|
| -} // namespace test
|
| -} // namespace net
|
|
|