shaka-packager/media/base/rsa_key_unittest.cc

147 lines
4.5 KiB
C++

// Copyright (c) 2013 Google Inc. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
//
// Unit test for rsa_key RSA encryption and signing.
#include "media/base/rsa_key.h"
#include "base/memory/scoped_ptr.h"
#include "media/base/fake_prng.h"
#include "media/base/rsa_test_data.h"
#include "testing/gtest/include/gtest/gtest.h"
namespace media {
class RsaKeyTest : public ::testing::TestWithParam<RsaTestSet> {
public:
RsaKeyTest() : test_set_(GetParam()) {}
virtual void SetUp() {
// Make OpenSSL RSA deterministic.
ASSERT_TRUE(fake_prng::StartFakePrng());
private_key_.reset(RsaPrivateKey::Create(test_set_.private_key));
ASSERT_TRUE(private_key_ != NULL);
public_key_.reset(RsaPublicKey::Create(test_set_.public_key));
ASSERT_TRUE(public_key_ != NULL);
}
virtual void TearDown() { fake_prng::StopFakePrng(); }
protected:
const RsaTestSet& test_set_;
scoped_ptr<RsaPrivateKey> private_key_;
scoped_ptr<RsaPublicKey> public_key_;
};
TEST_P(RsaKeyTest, BadPublicKey) {
scoped_ptr<RsaPublicKey> public_key(RsaPublicKey::Create("bad_public_key"));
EXPECT_TRUE(public_key == NULL);
}
TEST_P(RsaKeyTest, BadPrivateKey) {
scoped_ptr<RsaPrivateKey> private_key(
RsaPrivateKey::Create("bad_private_key"));
EXPECT_TRUE(private_key == NULL);
}
TEST_P(RsaKeyTest, LoadPublicKey) {
scoped_ptr<RsaPublicKey> public_key(
RsaPublicKey::Create(test_set_.public_key));
EXPECT_TRUE(public_key != NULL);
}
TEST_P(RsaKeyTest, LoadPrivateKey) {
scoped_ptr<RsaPrivateKey> private_key(
RsaPrivateKey::Create(test_set_.private_key));
EXPECT_TRUE(private_key != NULL);
}
TEST_P(RsaKeyTest, LoadPublicKeyInPrivateKey) {
scoped_ptr<RsaPrivateKey> private_key(
RsaPrivateKey::Create(test_set_.public_key));
EXPECT_TRUE(private_key == NULL);
}
TEST_P(RsaKeyTest, LoadPrivateKeyInPublicKey) {
scoped_ptr<RsaPublicKey> public_key(
RsaPublicKey::Create(test_set_.private_key));
EXPECT_TRUE(public_key == NULL);
}
TEST_P(RsaKeyTest, EncryptAndDecrypt) {
std::string encrypted_message;
EXPECT_TRUE(public_key_->Encrypt(test_set_.test_message, &encrypted_message));
EXPECT_EQ(test_set_.encrypted_message, encrypted_message);
std::string decrypted_message;
EXPECT_TRUE(private_key_->Decrypt(encrypted_message, &decrypted_message));
EXPECT_EQ(test_set_.test_message, decrypted_message);
}
TEST_P(RsaKeyTest, BadEncMessage1) {
// Add a byte to the encrypted message.
std::string bad_enc_message = test_set_.encrypted_message + '\0';
std::string decrypted_message;
EXPECT_FALSE(private_key_->Decrypt(bad_enc_message, &decrypted_message));
}
TEST_P(RsaKeyTest, BadEncMessage2) {
// Remove a byte from the encrypted message.
std::string bad_enc_message = test_set_.encrypted_message;
bad_enc_message.erase(bad_enc_message.end() - 1);
std::string decrypted_message;
EXPECT_FALSE(private_key_->Decrypt(bad_enc_message, &decrypted_message));
}
TEST_P(RsaKeyTest, BadEncMessage3) {
// Change a byte in the encrypted message.
std::string bad_enc_message = test_set_.encrypted_message;
bad_enc_message[bad_enc_message.size() / 2] ^= 0x55;
std::string decrypted_message;
EXPECT_FALSE(private_key_->Decrypt(bad_enc_message, &decrypted_message));
}
TEST_P(RsaKeyTest, SignAndVerify) {
std::string signature;
EXPECT_TRUE(
private_key_->GenerateSignature(test_set_.test_message, &signature));
EXPECT_EQ(test_set_.signature, signature);
EXPECT_TRUE(public_key_->VerifySignature(test_set_.test_message, signature));
}
TEST_P(RsaKeyTest, BadSignature1) {
// Add a byte to the signature.
std::string bad_signature = test_set_.signature + '\0';
EXPECT_FALSE(
public_key_->VerifySignature(test_set_.test_message, bad_signature));
}
TEST_P(RsaKeyTest, BadSignature2) {
// Remove a byte from the signature.
std::string bad_signature = test_set_.signature;
bad_signature.erase(bad_signature.end() - 1);
EXPECT_FALSE(
public_key_->VerifySignature(test_set_.test_message, bad_signature));
}
TEST_P(RsaKeyTest, BadSignature3) {
// Change a byte in the signature.
std::string bad_signature = test_set_.signature;
bad_signature[bad_signature.size() / 2] ^= 0x55;
EXPECT_FALSE(
public_key_->VerifySignature(test_set_.test_message, bad_signature));
}
INSTANTIATE_TEST_CASE_P(RsaTestKeys,
RsaKeyTest,
::testing::Values(RsaTestData().test_set_3072_bits(),
RsaTestData().test_set_2048_bits()));
} // namespace media