Index: content/child/webcrypto/test/aes_gcm_unittest.cc |
diff --git a/content/child/webcrypto/test/aes_gcm_unittest.cc b/content/child/webcrypto/test/aes_gcm_unittest.cc |
new file mode 100644 |
index 0000000000000000000000000000000000000000..20d5e9e6806bf1f633e96f9ded58d6a0c7f43074 |
--- /dev/null |
+++ b/content/child/webcrypto/test/aes_gcm_unittest.cc |
@@ -0,0 +1,270 @@ |
+// Copyright 2014 The Chromium Authors. All rights reserved. |
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+ |
+#include "base/stl_util.h" |
+#include "content/child/webcrypto/algorithm_dispatch.h" |
+#include "content/child/webcrypto/crypto_data.h" |
+#include "content/child/webcrypto/status.h" |
+#include "content/child/webcrypto/test/test_helpers.h" |
+#include "content/child/webcrypto/webcrypto_util.h" |
+#include "testing/gtest/include/gtest/gtest.h" |
+#include "third_party/WebKit/public/platform/WebCryptoAlgorithmParams.h" |
+#include "third_party/WebKit/public/platform/WebCryptoKeyAlgorithm.h" |
+ |
+namespace content { |
+ |
+namespace webcrypto { |
+ |
+namespace { |
+ |
+// Creates an AES-GCM algorithm. |
+blink::WebCryptoAlgorithm CreateAesGcmAlgorithm( |
+ const std::vector<uint8_t>& iv, |
+ const std::vector<uint8_t>& additional_data, |
+ unsigned int tag_length_bits) { |
+ EXPECT_TRUE(SupportsAesGcm()); |
+ return blink::WebCryptoAlgorithm::adoptParamsAndCreate( |
+ blink::WebCryptoAlgorithmIdAesGcm, |
+ new blink::WebCryptoAesGcmParams(vector_as_array(&iv), |
+ iv.size(), |
+ true, |
+ vector_as_array(&additional_data), |
+ additional_data.size(), |
+ true, |
+ tag_length_bits)); |
+} |
+ |
+blink::WebCryptoAlgorithm CreateAesGcmKeyGenAlgorithm( |
+ unsigned short key_length_bits) { |
+ EXPECT_TRUE(SupportsAesGcm()); |
+ return CreateAesKeyGenAlgorithm(blink::WebCryptoAlgorithmIdAesGcm, |
+ key_length_bits); |
+} |
+ |
+Status AesGcmEncrypt(const blink::WebCryptoKey& key, |
+ const std::vector<uint8_t>& iv, |
+ const std::vector<uint8_t>& additional_data, |
+ unsigned int tag_length_bits, |
+ const std::vector<uint8_t>& plain_text, |
+ std::vector<uint8_t>* cipher_text, |
+ std::vector<uint8_t>* authentication_tag) { |
+ EXPECT_TRUE(SupportsAesGcm()); |
+ blink::WebCryptoAlgorithm algorithm = |
+ CreateAesGcmAlgorithm(iv, additional_data, tag_length_bits); |
+ |
+ std::vector<uint8_t> output; |
+ Status status = Encrypt(algorithm, key, CryptoData(plain_text), &output); |
+ if (status.IsError()) |
+ return status; |
+ |
+ if ((tag_length_bits % 8) != 0) { |
+ EXPECT_TRUE(false) << "Encrypt should have failed."; |
+ return Status::OperationError(); |
+ } |
+ |
+ size_t tag_length_bytes = tag_length_bits / 8; |
+ |
+ if (tag_length_bytes > output.size()) { |
+ EXPECT_TRUE(false) << "tag length is larger than output"; |
+ return Status::OperationError(); |
+ } |
+ |
+ // The encryption result is cipher text with authentication tag appended. |
+ cipher_text->assign(output.begin(), |
+ output.begin() + (output.size() - tag_length_bytes)); |
+ authentication_tag->assign(output.begin() + cipher_text->size(), |
+ output.end()); |
+ |
+ return Status::Success(); |
+} |
+ |
+Status AesGcmDecrypt(const blink::WebCryptoKey& key, |
+ const std::vector<uint8_t>& iv, |
+ const std::vector<uint8_t>& additional_data, |
+ unsigned int tag_length_bits, |
+ const std::vector<uint8_t>& cipher_text, |
+ const std::vector<uint8_t>& authentication_tag, |
+ std::vector<uint8_t>* plain_text) { |
+ EXPECT_TRUE(SupportsAesGcm()); |
+ blink::WebCryptoAlgorithm algorithm = |
+ CreateAesGcmAlgorithm(iv, additional_data, tag_length_bits); |
+ |
+ // Join cipher text and authentication tag. |
+ std::vector<uint8_t> cipher_text_with_tag; |
+ cipher_text_with_tag.reserve(cipher_text.size() + authentication_tag.size()); |
+ cipher_text_with_tag.insert( |
+ cipher_text_with_tag.end(), cipher_text.begin(), cipher_text.end()); |
+ cipher_text_with_tag.insert(cipher_text_with_tag.end(), |
+ authentication_tag.begin(), |
+ authentication_tag.end()); |
+ |
+ return Decrypt(algorithm, key, CryptoData(cipher_text_with_tag), plain_text); |
+} |
+ |
+TEST(WebCryptoAesGcmTest, GenerateKeyBadLength) { |
+ if (!SupportsAesGcm()) { |
+ LOG(WARNING) << "AES GCM not supported, skipping tests"; |
+ return; |
+ } |
+ |
+ const unsigned short kKeyLen[] = {0, 127, 257}; |
+ blink::WebCryptoKey key = blink::WebCryptoKey::createNull(); |
+ for (size_t i = 0; i < ARRAYSIZE_UNSAFE(kKeyLen); ++i) { |
+ SCOPED_TRACE(i); |
+ EXPECT_EQ(Status::ErrorGenerateKeyLength(), |
+ GenerateSecretKey( |
+ CreateAesGcmKeyGenAlgorithm(kKeyLen[i]), true, 0, &key)); |
+ } |
+} |
+ |
+TEST(WebCryptoAesGcmTest, ImportExportJwk) { |
+ // Some Linux test runners may not have a new enough version of NSS. |
+ if (!SupportsAesGcm()) { |
+ LOG(WARNING) << "AES GCM not supported, skipping tests"; |
+ return; |
+ } |
+ |
+ const blink::WebCryptoAlgorithm algorithm = |
+ CreateAlgorithm(blink::WebCryptoAlgorithmIdAesGcm); |
+ |
+ // AES-GCM 128 |
+ ImportExportJwkSymmetricKey( |
+ 128, |
+ algorithm, |
+ blink::WebCryptoKeyUsageEncrypt | blink::WebCryptoKeyUsageDecrypt, |
+ "A128GCM"); |
+ |
+ // AES-GCM 256 |
+ ImportExportJwkSymmetricKey( |
+ 256, algorithm, blink::WebCryptoKeyUsageDecrypt, "A256GCM"); |
+} |
+ |
+// TODO(eroman): |
+// * Test decryption when the tag length exceeds input size |
+// * Test decryption with empty input |
+// * Test decryption with tag length of 0. |
+TEST(WebCryptoAesGcmTest, SampleSets) { |
+ // Some Linux test runners may not have a new enough version of NSS. |
+ if (!SupportsAesGcm()) { |
+ LOG(WARNING) << "AES GCM not supported, skipping tests"; |
+ return; |
+ } |
+ |
+ scoped_ptr<base::ListValue> tests; |
+ ASSERT_TRUE(ReadJsonTestFileToList("aes_gcm.json", &tests)); |
+ |
+ // Note that WebCrypto appends the authentication tag to the ciphertext. |
+ for (size_t test_index = 0; test_index < tests->GetSize(); ++test_index) { |
+ SCOPED_TRACE(test_index); |
+ base::DictionaryValue* test; |
+ ASSERT_TRUE(tests->GetDictionary(test_index, &test)); |
+ |
+ const std::vector<uint8_t> test_key = GetBytesFromHexString(test, "key"); |
+ const std::vector<uint8_t> test_iv = GetBytesFromHexString(test, "iv"); |
+ const std::vector<uint8_t> test_additional_data = |
+ GetBytesFromHexString(test, "additional_data"); |
+ const std::vector<uint8_t> test_plain_text = |
+ GetBytesFromHexString(test, "plain_text"); |
+ const std::vector<uint8_t> test_authentication_tag = |
+ GetBytesFromHexString(test, "authentication_tag"); |
+ const unsigned int test_tag_size_bits = test_authentication_tag.size() * 8; |
+ const std::vector<uint8_t> test_cipher_text = |
+ GetBytesFromHexString(test, "cipher_text"); |
+ |
+ blink::WebCryptoKey key = ImportSecretKeyFromRaw( |
+ test_key, |
+ CreateAlgorithm(blink::WebCryptoAlgorithmIdAesGcm), |
+ blink::WebCryptoKeyUsageEncrypt | blink::WebCryptoKeyUsageDecrypt); |
+ |
+ // Verify exported raw key is identical to the imported data |
+ std::vector<uint8_t> raw_key; |
+ EXPECT_EQ(Status::Success(), |
+ ExportKey(blink::WebCryptoKeyFormatRaw, key, &raw_key)); |
+ |
+ EXPECT_BYTES_EQ(test_key, raw_key); |
+ |
+ // Test encryption. |
+ std::vector<uint8_t> cipher_text; |
+ std::vector<uint8_t> authentication_tag; |
+ EXPECT_EQ(Status::Success(), |
+ AesGcmEncrypt(key, |
+ test_iv, |
+ test_additional_data, |
+ test_tag_size_bits, |
+ test_plain_text, |
+ &cipher_text, |
+ &authentication_tag)); |
+ |
+ EXPECT_BYTES_EQ(test_cipher_text, cipher_text); |
+ EXPECT_BYTES_EQ(test_authentication_tag, authentication_tag); |
+ |
+ // Test decryption. |
+ std::vector<uint8_t> plain_text; |
+ EXPECT_EQ(Status::Success(), |
+ AesGcmDecrypt(key, |
+ test_iv, |
+ test_additional_data, |
+ test_tag_size_bits, |
+ test_cipher_text, |
+ test_authentication_tag, |
+ &plain_text)); |
+ EXPECT_BYTES_EQ(test_plain_text, plain_text); |
+ |
+ // Decryption should fail if any of the inputs are tampered with. |
+ EXPECT_EQ(Status::OperationError(), |
+ AesGcmDecrypt(key, |
+ Corrupted(test_iv), |
+ test_additional_data, |
+ test_tag_size_bits, |
+ test_cipher_text, |
+ test_authentication_tag, |
+ &plain_text)); |
+ EXPECT_EQ(Status::OperationError(), |
+ AesGcmDecrypt(key, |
+ test_iv, |
+ Corrupted(test_additional_data), |
+ test_tag_size_bits, |
+ test_cipher_text, |
+ test_authentication_tag, |
+ &plain_text)); |
+ EXPECT_EQ(Status::OperationError(), |
+ AesGcmDecrypt(key, |
+ test_iv, |
+ test_additional_data, |
+ test_tag_size_bits, |
+ Corrupted(test_cipher_text), |
+ test_authentication_tag, |
+ &plain_text)); |
+ EXPECT_EQ(Status::OperationError(), |
+ AesGcmDecrypt(key, |
+ test_iv, |
+ test_additional_data, |
+ test_tag_size_bits, |
+ test_cipher_text, |
+ Corrupted(test_authentication_tag), |
+ &plain_text)); |
+ |
+ // Try different incorrect tag lengths |
+ uint8_t kAlternateTagLengths[] = {0, 8, 96, 120, 128, 160, 255}; |
+ for (size_t tag_i = 0; tag_i < arraysize(kAlternateTagLengths); ++tag_i) { |
+ unsigned int wrong_tag_size_bits = kAlternateTagLengths[tag_i]; |
+ if (test_tag_size_bits == wrong_tag_size_bits) |
+ continue; |
+ EXPECT_NE(Status::Success(), |
+ AesGcmDecrypt(key, |
+ test_iv, |
+ test_additional_data, |
+ wrong_tag_size_bits, |
+ test_cipher_text, |
+ test_authentication_tag, |
+ &plain_text)); |
+ } |
+ } |
+} |
+ |
+} // namespace |
+ |
+} // namespace webcrypto |
+ |
+} // namespace content |