This source file includes following definitions.
- EncryptWithNonce
- TEST
- TEST
- TEST
#include "net/quic/crypto/chacha20_poly1305_encrypter.h"
#include "net/quic/test_tools/quic_test_utils.h"
using base::StringPiece;
namespace {
struct TestVector {
const char* key;
const char* pt;
const char* iv;
const char* aad;
const char* ct;
};
const TestVector test_vectors[] = {
{ "4290bcb154173531f314af57f3be3b5006da371ece272afa1b5dbdd110"
"0a1007",
"86d09974840bded2a5ca",
"cd7cf67be39c794a",
"87e229d4500845a079c0",
"e3e446f7ede9a19b62a4677dabf4e3d24b876bb28475"
},
{ NULL }
};
}
namespace net {
namespace test {
QuicData* EncryptWithNonce(ChaCha20Poly1305Encrypter* encrypter,
StringPiece nonce,
StringPiece associated_data,
StringPiece plaintext) {
size_t ciphertext_size = encrypter->GetCiphertextSize(plaintext.length());
scoped_ptr<char[]> ciphertext(new char[ciphertext_size]);
if (!encrypter->Encrypt(nonce, associated_data, plaintext,
reinterpret_cast<unsigned char*>(ciphertext.get()))) {
return NULL;
}
return new QuicData(ciphertext.release(), ciphertext_size, true);
}
TEST(ChaCha20Poly1305EncrypterTest, Encrypt) {
if (!ChaCha20Poly1305Encrypter::IsSupported()) {
LOG(INFO) << "ChaCha20+Poly1305 not supported. Test skipped.";
return;
}
for (size_t i = 0; test_vectors[i].key != NULL; i++) {
string key;
string pt;
string iv;
string aad;
string ct;
ASSERT_TRUE(DecodeHexString(test_vectors[i].key, &key));
ASSERT_TRUE(DecodeHexString(test_vectors[i].pt, &pt));
ASSERT_TRUE(DecodeHexString(test_vectors[i].iv, &iv));
ASSERT_TRUE(DecodeHexString(test_vectors[i].aad, &aad));
ASSERT_TRUE(DecodeHexString(test_vectors[i].ct, &ct));
ChaCha20Poly1305Encrypter encrypter;
ASSERT_TRUE(encrypter.SetKey(key));
scoped_ptr<QuicData> encrypted(EncryptWithNonce(
&encrypter, iv,
StringPiece(aad.length() ? aad.data() : NULL, aad.length()), pt));
ASSERT_TRUE(encrypted.get());
test::CompareCharArraysWithHexError("ciphertext", encrypted->data(),
encrypted->length(), ct.data(),
ct.length());
}
}
TEST(ChaCha20Poly1305EncrypterTest, GetMaxPlaintextSize) {
ChaCha20Poly1305Encrypter encrypter;
EXPECT_EQ(1000u, encrypter.GetMaxPlaintextSize(1012));
EXPECT_EQ(100u, encrypter.GetMaxPlaintextSize(112));
EXPECT_EQ(10u, encrypter.GetMaxPlaintextSize(22));
}
TEST(ChaCha20Poly1305EncrypterTest, GetCiphertextSize) {
ChaCha20Poly1305Encrypter encrypter;
EXPECT_EQ(1012u, encrypter.GetCiphertextSize(1000));
EXPECT_EQ(112u, encrypter.GetCiphertextSize(100));
EXPECT_EQ(22u, encrypter.GetCiphertextSize(10));
}
}
}