blob: a606e780e00b38a27f311c274813d3d29aaecd05 [file] [log] [blame]
Darin Petkov7326cd82012-03-30 11:02:01 +02001// Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
Darin Petkov823c47e2011-06-27 16:15:35 -07002// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
Alex Deymocddd2d02014-11-10 19:55:35 -08005#include "shill/crypto_des_cbc.h"
6
Alex Vakulenko8a532292014-06-16 17:18:44 -07007#include <string>
8
Ben Chan11c213f2014-09-05 08:21:06 -07009#include <base/files/file_util.h>
Paul Stewart5ad16062013-02-21 18:10:48 -080010#include <base/files/scoped_temp_dir.h>
Darin Petkov823c47e2011-06-27 16:15:35 -070011#include <gtest/gtest.h>
12
Albert Chaulk0e1cdea2013-02-27 15:32:55 -080013using base::FilePath;
Darin Petkov823c47e2011-06-27 16:15:35 -070014using std::string;
15using std::vector;
16using testing::Test;
17
18namespace shill {
19
20namespace {
21const char kTestKey[] = "12345678";
22const char kTestIV[] = "abcdefgh";
23const char kEmptyPlain[] = "";
24const char kEmptyCipher[] = "02:4+O1a2KJVRM=";
25const char kEmptyCipherNoSentinel[] = "02:lNRDa8O1tpM=";
26const char kPlainText[] = "Hello world! ~123";
27const char kCipherText[] = "02:MbxzeBqK3HVeS3xfjyhbe47Xx+szYgOp";
28const char kPlainVersion1[] = "This is a test!";
29const char kCipherVersion1[] = "bKlHDISdHMFfmfgBTT5I0w==";
Alex Vakulenko8a532292014-06-16 17:18:44 -070030} // namespace
Darin Petkov823c47e2011-06-27 16:15:35 -070031
32class CryptoDESCBCTest : public Test {
33 public:
mukesh agrawald8875892015-08-14 15:28:05 -070034 CryptoDESCBCTest() {}
Darin Petkov823c47e2011-06-27 16:15:35 -070035
36 protected:
Darin Petkov823c47e2011-06-27 16:15:35 -070037 CryptoDESCBC crypto_;
38};
39
40TEST_F(CryptoDESCBCTest, GetID) {
41 EXPECT_EQ(CryptoDESCBC::kID, crypto_.GetID());
42}
43
44TEST_F(CryptoDESCBCTest, LoadKeyMatter) {
Paul Stewart5ad16062013-02-21 18:10:48 -080045 base::ScopedTempDir temp_dir;
Darin Petkov823c47e2011-06-27 16:15:35 -070046 ASSERT_TRUE(temp_dir.CreateUniqueTempDir());
47 const char kKeyMatterFile[] = "key-matter-file";
48 FilePath key_matter = temp_dir.path().Append(kKeyMatterFile);
49
50 EXPECT_FALSE(crypto_.LoadKeyMatter(key_matter));
51 EXPECT_TRUE(crypto_.key().empty());
52 EXPECT_TRUE(crypto_.iv().empty());
53
54 string matter = string(kTestIV) + kTestKey;
55
Ben Chan6fbf64f2014-05-21 18:07:01 -070056 base::WriteFile(key_matter, matter.data(), matter.size() - 1);
Darin Petkov823c47e2011-06-27 16:15:35 -070057 EXPECT_FALSE(crypto_.LoadKeyMatter(key_matter));
58 EXPECT_TRUE(crypto_.key().empty());
59 EXPECT_TRUE(crypto_.iv().empty());
60
Ben Chan6fbf64f2014-05-21 18:07:01 -070061 base::WriteFile(key_matter, matter.data(), matter.size());
Darin Petkov823c47e2011-06-27 16:15:35 -070062 EXPECT_TRUE(crypto_.LoadKeyMatter(key_matter));
63 EXPECT_EQ(kTestKey, string(crypto_.key().begin(), crypto_.key().end()));
64 EXPECT_EQ(kTestIV, string(crypto_.iv().begin(), crypto_.iv().end()));
65
66 const char kKey2[] = "ABCDEFGH";
67 const char kIV2[] = "87654321";
68 matter = string("X") + kIV2 + kKey2;
69
Ben Chan6fbf64f2014-05-21 18:07:01 -070070 base::WriteFile(key_matter, matter.data(), matter.size());
Darin Petkov823c47e2011-06-27 16:15:35 -070071 EXPECT_TRUE(crypto_.LoadKeyMatter(key_matter));
72 EXPECT_EQ(kKey2, string(crypto_.key().begin(), crypto_.key().end()));
73 EXPECT_EQ(kIV2, string(crypto_.iv().begin(), crypto_.iv().end()));
74
Ben Chan6fbf64f2014-05-21 18:07:01 -070075 base::WriteFile(key_matter, " ", 1);
Darin Petkov823c47e2011-06-27 16:15:35 -070076 EXPECT_FALSE(crypto_.LoadKeyMatter(key_matter));
77 EXPECT_TRUE(crypto_.key().empty());
78 EXPECT_TRUE(crypto_.iv().empty());
79}
80
81TEST_F(CryptoDESCBCTest, Encrypt) {
82 crypto_.key_.assign(kTestKey, kTestKey + strlen(kTestKey));
83 crypto_.iv_.assign(kTestIV, kTestIV + strlen(kTestIV));
84
85 string ciphertext;
Darin Petkov7326cd82012-03-30 11:02:01 +020086 EXPECT_FALSE(crypto_.Encrypt(kPlainText, &ciphertext));
Darin Petkov823c47e2011-06-27 16:15:35 -070087}
88
89TEST_F(CryptoDESCBCTest, Decrypt) {
90 crypto_.key_.assign(kTestKey, kTestKey + strlen(kTestKey));
91 crypto_.iv_.assign(kTestIV, kTestIV + strlen(kTestIV));
92
93 string plaintext;
94 EXPECT_TRUE(crypto_.Decrypt(kEmptyCipher, &plaintext));
95 EXPECT_EQ(kEmptyPlain, plaintext);
96 EXPECT_TRUE(crypto_.Decrypt(kCipherText, &plaintext));
97 EXPECT_EQ(kPlainText, plaintext);
98 EXPECT_TRUE(crypto_.Decrypt(kCipherVersion1, &plaintext));
99 EXPECT_EQ(kPlainVersion1, plaintext);
100
101 EXPECT_FALSE(crypto_.Decrypt("random", &plaintext));
102 EXPECT_FALSE(crypto_.Decrypt("02:random", &plaintext));
103 EXPECT_FALSE(crypto_.Decrypt("~", &plaintext));
104 EXPECT_FALSE(crypto_.Decrypt("02:~", &plaintext));
105 EXPECT_FALSE(crypto_.Decrypt(kEmptyPlain, &plaintext));
106 EXPECT_FALSE(crypto_.Decrypt(kEmptyCipherNoSentinel, &plaintext));
107
108 // echo -n 12345678 | base64
109 EXPECT_FALSE(crypto_.Decrypt("MTIzNDU2Nzg=", &plaintext));
110}
111
112} // namespace shill