shaka-packager/packager/media/base/decryptor_source_unittest.cc

173 lines
5.9 KiB
C++
Raw Normal View History

// Copyright 2016 Google Inc. All rights reserved.
//
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file or at
// https://developers.google.com/open-source/licenses/bsd
#include "packager/media/base/decryptor_source.h"
#include <gmock/gmock.h>
#include <gtest/gtest.h>
#include "packager/base/macros.h"
using ::testing::Return;
using ::testing::SetArgPointee;
using ::testing::StrictMock;
using ::testing::Mock;
using ::testing::_;
namespace edash_packager {
namespace media {
namespace {
const uint8_t kKeyId[] = {
0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08,
};
const uint8_t kMockKey[] = {
0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a,
0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08,
};
const uint8_t kIv[] = {
0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09,
};
const uint8_t kBuffer[] = {
0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x04, 0x05, 0x06,
0x07, 0x08, 0x09, 0x0a, 0x0b, 0x05, 0x06, 0x07, 0x08, 0x09,
};
// Expected decrypted buffer with the above kMockKey and kIv.
const uint8_t kExpectedDecryptedBuffer[] = {
0xfd, 0xf9, 0x8b, 0xb2, 0x1d, 0xd3, 0x07, 0x72, 0x51, 0xf4, 0xdf,
0xf9, 0x16, 0x6a, 0x14, 0xcb, 0xde, 0xaa, 0x6a, 0x04, 0x85,
};
const uint8_t kIv2[] = {
0x14, 0x25, 0x36, 0x47, 0x58, 0x69, 0x7a, 0x8b,
};
const uint8_t kBuffer2[] = {0x05, 0x02};
// Expected decrypted buffer with the above kMockKey and kIv2.
const uint8_t kExpectedDecryptedBuffer2[] = {0x20, 0x62};
class MockKeySource : public KeySource {
public:
MOCK_METHOD2(GetKey,
Status(const std::vector<uint8_t>& key_id, EncryptionKey* key));
};
} // namespace
class DecryptorSourceTest : public ::testing::Test {
public:
DecryptorSourceTest()
: decryptor_source_(&mock_key_source_),
key_id_(std::vector<uint8_t>(kKeyId, kKeyId + arraysize(kKeyId))),
buffer_(std::vector<uint8_t>(kBuffer, kBuffer + arraysize(kBuffer))) {}
protected:
StrictMock<MockKeySource> mock_key_source_;
DecryptorSource decryptor_source_;
std::vector<uint8_t> key_id_;
std::vector<uint8_t> buffer_;
};
TEST_F(DecryptorSourceTest, FullSampleDecryption) {
EncryptionKey encryption_key;
encryption_key.key.assign(kMockKey, kMockKey + arraysize(kMockKey));
EXPECT_CALL(mock_key_source_, GetKey(key_id_, _))
.WillOnce(DoAll(SetArgPointee<1>(encryption_key), Return(Status::OK)));
DecryptConfig decrypt_config(key_id_,
std::vector<uint8_t>(kIv, kIv + arraysize(kIv)),
std::vector<SubsampleEntry>());
ASSERT_TRUE(decryptor_source_.DecryptSampleBuffer(&decrypt_config, &buffer_[0],
buffer_.size()));
EXPECT_EQ(std::vector<uint8_t>(
kExpectedDecryptedBuffer,
kExpectedDecryptedBuffer + arraysize(kExpectedDecryptedBuffer)),
buffer_);
// DecryptSampleBuffer can be called repetitively. No GetKey call again with
// the same key id.
buffer_.assign(kBuffer2, kBuffer2 + arraysize(kBuffer2));
DecryptConfig decrypt_config2(
key_id_, std::vector<uint8_t>(kIv2, kIv2 + arraysize(kIv2)),
std::vector<SubsampleEntry>());
ASSERT_TRUE(decryptor_source_.DecryptSampleBuffer(
&decrypt_config2, &buffer_[0], buffer_.size()));
EXPECT_EQ(std::vector<uint8_t>(kExpectedDecryptedBuffer2,
kExpectedDecryptedBuffer2 +
arraysize(kExpectedDecryptedBuffer2)),
buffer_);
}
TEST_F(DecryptorSourceTest, SubsampleDecryption) {
EncryptionKey encryption_key;
encryption_key.key.assign(kMockKey, kMockKey + arraysize(kMockKey));
EXPECT_CALL(mock_key_source_, GetKey(key_id_, _))
.WillOnce(DoAll(SetArgPointee<1>(encryption_key), Return(Status::OK)));
const SubsampleEntry kSubsamples[] = {
{2, 3},
{3, 13},
};
// Expected decrypted buffer with the above subsamples.
const uint8_t kExpectedDecryptedBuffer[] = {
// Subsample[0].clear
0x03, 0x04,
// Subsample[0].cipher
0xfb, 0xfb, 0x89,
// Subsample[1].clear
0x08, 0x09, 0x0a,
// Subsample[1].cipher
0xb0, 0x1f, 0xdd, 0x09, 0x70, 0x5c, 0xfb, 0xd2,
0xfb, 0x18, 0x64, 0x16, 0xc9,
};
DecryptConfig decrypt_config(
key_id_, std::vector<uint8_t>(kIv, kIv + arraysize(kIv)),
std::vector<SubsampleEntry>(kSubsamples,
kSubsamples + arraysize(kSubsamples)));
ASSERT_TRUE(decryptor_source_.DecryptSampleBuffer(
&decrypt_config, &buffer_[0], buffer_.size()));
EXPECT_EQ(std::vector<uint8_t>(
kExpectedDecryptedBuffer,
kExpectedDecryptedBuffer + arraysize(kExpectedDecryptedBuffer)),
buffer_);
}
TEST_F(DecryptorSourceTest, SubsampleDecryptionSizeValidation) {
EncryptionKey encryption_key;
encryption_key.key.assign(kMockKey, kMockKey + arraysize(kMockKey));
EXPECT_CALL(mock_key_source_, GetKey(key_id_, _))
.WillOnce(DoAll(SetArgPointee<1>(encryption_key), Return(Status::OK)));
// Total size exceeds buffer size.
const SubsampleEntry kSubsamples[] = {
{2, 3},
{3, 14},
};
DecryptConfig decrypt_config(
key_id_, std::vector<uint8_t>(kIv, kIv + arraysize(kIv)),
std::vector<SubsampleEntry>(kSubsamples,
kSubsamples + arraysize(kSubsamples)));
ASSERT_FALSE(decryptor_source_.DecryptSampleBuffer(
&decrypt_config, &buffer_[0], buffer_.size()));
}
TEST_F(DecryptorSourceTest, DecryptFailedIfGetKeyFailed) {
EXPECT_CALL(mock_key_source_, GetKey(key_id_, _))
.WillOnce(Return(Status::UNKNOWN));
DecryptConfig decrypt_config(key_id_,
std::vector<uint8_t>(kIv, kIv + arraysize(kIv)),
std::vector<SubsampleEntry>());
ASSERT_FALSE(decryptor_source_.DecryptSampleBuffer(
&decrypt_config, &buffer_[0], buffer_.size()));
}
} // namespace media
} // namespace edash_packager