OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include <string> | 5 #include <string> |
6 #include <vector> | 6 #include <vector> |
7 | 7 |
8 #include "base/basictypes.h" | 8 #include "base/basictypes.h" |
9 #include "base/bind.h" | 9 #include "base/bind.h" |
10 #include "base/sys_byteorder.h" | 10 #include "base/sys_byteorder.h" |
(...skipping 328 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
339 | 339 |
340 AddKeyAndExpectToSucceed(frame.key_id, frame.key_id_size, | 340 AddKeyAndExpectToSucceed(frame.key_id, frame.key_id_size, |
341 &wrong_key[0], frame.key_size); | 341 &wrong_key[0], frame.key_size); |
342 scoped_refptr<DecoderBuffer> encrypted_data = | 342 scoped_refptr<DecoderBuffer> encrypted_data = |
343 CreateWebMEncryptedBuffer(frame.encrypted_data, | 343 CreateWebMEncryptedBuffer(frame.encrypted_data, |
344 frame.encrypted_data_size, | 344 frame.encrypted_data_size, |
345 frame.key_id, frame.key_id_size); | 345 frame.key_id, frame.key_id_size); |
346 ASSERT_NO_FATAL_FAILURE(DecryptAndExpectToFail(encrypted_data)); | 346 ASSERT_NO_FATAL_FAILURE(DecryptAndExpectToFail(encrypted_data)); |
347 } | 347 } |
348 | 348 |
| 349 TEST_F(AesDecryptorTest, NoKey) { |
| 350 const WebmEncryptedData& frame = kWebmEncryptedFrames[0]; |
| 351 GenerateKeyRequest(frame.key_id, frame.key_id_size); |
| 352 |
| 353 scoped_refptr<DecoderBuffer> encrypted_data = |
| 354 CreateWebMEncryptedBuffer(frame.encrypted_data, frame.encrypted_data_size, |
| 355 frame.key_id, frame.key_id_size); |
| 356 EXPECT_CALL(*this, BufferDecrypted(AesDecryptor::kNoKey, IsNull())); |
| 357 decryptor_.Decrypt(encrypted_data, decrypt_cb_); |
| 358 } |
| 359 |
349 TEST_F(AesDecryptorTest, KeyReplacement) { | 360 TEST_F(AesDecryptorTest, KeyReplacement) { |
350 const WebmEncryptedData& frame = kWebmEncryptedFrames[0]; | 361 const WebmEncryptedData& frame = kWebmEncryptedFrames[0]; |
351 GenerateKeyRequest(frame.key_id, frame.key_id_size); | 362 GenerateKeyRequest(frame.key_id, frame.key_id_size); |
352 | 363 |
353 // Change the first byte of the key. | 364 // Change the first byte of the key. |
354 std::vector<uint8> wrong_key(frame.key, frame.key + frame.key_size); | 365 std::vector<uint8> wrong_key(frame.key, frame.key + frame.key_size); |
355 wrong_key[0]++; | 366 wrong_key[0]++; |
356 | 367 |
357 AddKeyAndExpectToSucceed(frame.key_id, frame.key_id_size, | 368 AddKeyAndExpectToSucceed(frame.key_id, frame.key_id_size, |
358 &wrong_key[0], frame.key_size); | 369 &wrong_key[0], frame.key_size); |
(...skipping 203 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
562 scoped_refptr<DecoderBuffer> encrypted_data = CreateSubsampleEncryptedBuffer( | 573 scoped_refptr<DecoderBuffer> encrypted_data = CreateSubsampleEncryptedBuffer( |
563 kSubsampleData, arraysize(kSubsampleData), | 574 kSubsampleData, arraysize(kSubsampleData), |
564 kSubsampleKeyId, arraysize(kSubsampleKeyId), | 575 kSubsampleKeyId, arraysize(kSubsampleKeyId), |
565 kSubsampleIv, arraysize(kSubsampleIv), | 576 kSubsampleIv, arraysize(kSubsampleIv), |
566 0, | 577 0, |
567 entries); | 578 entries); |
568 ASSERT_NO_FATAL_FAILURE(DecryptAndExpectToFail(encrypted_data)); | 579 ASSERT_NO_FATAL_FAILURE(DecryptAndExpectToFail(encrypted_data)); |
569 } | 580 } |
570 | 581 |
571 } // namespace media | 582 } // namespace media |
OLD | NEW |