blob: b63d081031ff5f336fe82615a1d9d52ee49cd65f [file] [log] [blame]
QUICHE teama6ef0a62019-03-07 20:34:33 -05001// Copyright (c) 2013 The Chromium Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5#include "net/third_party/quiche/src/quic/core/crypto/crypto_secret_boxer.h"
6
vasilvv872e7a32019-03-12 16:42:44 -07007#include <string>
8
vasilvv778cad32020-10-08 12:43:32 -07009#include "absl/strings/string_view.h"
QUICHE teama6ef0a62019-03-07 20:34:33 -050010#include "net/third_party/quiche/src/quic/core/crypto/quic_random.h"
QUICHE teama6ef0a62019-03-07 20:34:33 -050011#include "net/third_party/quiche/src/quic/platform/api/quic_test.h"
12
13namespace quic {
14namespace test {
15
16class CryptoSecretBoxerTest : public QuicTest {};
17
18TEST_F(CryptoSecretBoxerTest, BoxAndUnbox) {
vasilvv778cad32020-10-08 12:43:32 -070019 absl::string_view message("hello world");
QUICHE teama6ef0a62019-03-07 20:34:33 -050020
21 CryptoSecretBoxer boxer;
vasilvvc48c8712019-03-11 13:38:16 -070022 boxer.SetKeys({std::string(CryptoSecretBoxer::GetKeySize(), 0x11)});
QUICHE teama6ef0a62019-03-07 20:34:33 -050023
vasilvvc48c8712019-03-11 13:38:16 -070024 const std::string box = boxer.Box(QuicRandom::GetInstance(), message);
QUICHE teama6ef0a62019-03-07 20:34:33 -050025
vasilvvc48c8712019-03-11 13:38:16 -070026 std::string storage;
vasilvv778cad32020-10-08 12:43:32 -070027 absl::string_view result;
QUICHE teama6ef0a62019-03-07 20:34:33 -050028 EXPECT_TRUE(boxer.Unbox(box, &storage, &result));
29 EXPECT_EQ(result, message);
30
vasilvvc48c8712019-03-11 13:38:16 -070031 EXPECT_FALSE(boxer.Unbox(std::string(1, 'X') + box, &storage, &result));
32 EXPECT_FALSE(
33 boxer.Unbox(box.substr(1, std::string::npos), &storage, &result));
34 EXPECT_FALSE(boxer.Unbox(std::string(), &storage, &result));
QUICHE teama6ef0a62019-03-07 20:34:33 -050035 EXPECT_FALSE(boxer.Unbox(
vasilvvc48c8712019-03-11 13:38:16 -070036 std::string(1, box[0] ^ 0x80) + box.substr(1, std::string::npos),
37 &storage, &result));
QUICHE teama6ef0a62019-03-07 20:34:33 -050038}
39
40// Helper function to test whether one boxer can decode the output of another.
41static bool CanDecode(const CryptoSecretBoxer& decoder,
42 const CryptoSecretBoxer& encoder) {
vasilvv778cad32020-10-08 12:43:32 -070043 absl::string_view message("hello world");
vasilvvc48c8712019-03-11 13:38:16 -070044 const std::string boxed = encoder.Box(QuicRandom::GetInstance(), message);
45 std::string storage;
vasilvv778cad32020-10-08 12:43:32 -070046 absl::string_view result;
QUICHE teama6ef0a62019-03-07 20:34:33 -050047 bool ok = decoder.Unbox(boxed, &storage, &result);
48 if (ok) {
49 EXPECT_EQ(result, message);
50 }
51 return ok;
52}
53
54TEST_F(CryptoSecretBoxerTest, MultipleKeys) {
vasilvvc48c8712019-03-11 13:38:16 -070055 std::string key_11(CryptoSecretBoxer::GetKeySize(), 0x11);
56 std::string key_12(CryptoSecretBoxer::GetKeySize(), 0x12);
QUICHE teama6ef0a62019-03-07 20:34:33 -050057
58 CryptoSecretBoxer boxer_11, boxer_12, boxer;
59 boxer_11.SetKeys({key_11});
60 boxer_12.SetKeys({key_12});
61 boxer.SetKeys({key_12, key_11});
62
63 // Neither single-key boxer can decode the other's tokens.
64 EXPECT_FALSE(CanDecode(boxer_11, boxer_12));
65 EXPECT_FALSE(CanDecode(boxer_12, boxer_11));
66
67 // |boxer| encodes with the first key, which is key_12.
68 EXPECT_TRUE(CanDecode(boxer_12, boxer));
69 EXPECT_FALSE(CanDecode(boxer_11, boxer));
70
71 // The boxer with both keys can decode tokens from either single-key boxer.
72 EXPECT_TRUE(CanDecode(boxer, boxer_11));
73 EXPECT_TRUE(CanDecode(boxer, boxer_12));
74
75 // After we flush key_11 from |boxer|, it can no longer decode tokens from
76 // |boxer_11|.
77 boxer.SetKeys({key_12});
78 EXPECT_FALSE(CanDecode(boxer, boxer_11));
79}
80
81} // namespace test
82} // namespace quic