Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(359)

Side by Side Diff: media/crypto/aes_decryptor_unittest.cc

Issue 10822026: Implement "Key Presence" step in "Encrypted Block Encounted" algorithm in EME. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Rebase Created 8 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « media/crypto/aes_decryptor.cc ('k') | media/filters/chunk_demuxer.cc » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include <string> 5 #include <string>
6 #include <vector> 6 #include <vector>
7 7
8 #include "base/basictypes.h" 8 #include "base/basictypes.h"
9 #include "base/bind.h" 9 #include "base/bind.h"
10 #include "base/sys_byteorder.h" 10 #include "base/sys_byteorder.h"
(...skipping 328 matching lines...) Expand 10 before | Expand all | Expand 10 after
339 339
340 AddKeyAndExpectToSucceed(frame.key_id, frame.key_id_size, 340 AddKeyAndExpectToSucceed(frame.key_id, frame.key_id_size,
341 &wrong_key[0], frame.key_size); 341 &wrong_key[0], frame.key_size);
342 scoped_refptr<DecoderBuffer> encrypted_data = 342 scoped_refptr<DecoderBuffer> encrypted_data =
343 CreateWebMEncryptedBuffer(frame.encrypted_data, 343 CreateWebMEncryptedBuffer(frame.encrypted_data,
344 frame.encrypted_data_size, 344 frame.encrypted_data_size,
345 frame.key_id, frame.key_id_size); 345 frame.key_id, frame.key_id_size);
346 ASSERT_NO_FATAL_FAILURE(DecryptAndExpectToFail(encrypted_data)); 346 ASSERT_NO_FATAL_FAILURE(DecryptAndExpectToFail(encrypted_data));
347 } 347 }
348 348
349 TEST_F(AesDecryptorTest, NoKey) {
350 const WebmEncryptedData& frame = kWebmEncryptedFrames[0];
351 GenerateKeyRequest(frame.key_id, frame.key_id_size);
352
353 scoped_refptr<DecoderBuffer> encrypted_data =
354 CreateWebMEncryptedBuffer(frame.encrypted_data, frame.encrypted_data_size,
355 frame.key_id, frame.key_id_size);
356 EXPECT_CALL(*this, BufferDecrypted(AesDecryptor::kNoKey, IsNull()));
357 decryptor_.Decrypt(encrypted_data, decrypt_cb_);
358 }
359
349 TEST_F(AesDecryptorTest, KeyReplacement) { 360 TEST_F(AesDecryptorTest, KeyReplacement) {
350 const WebmEncryptedData& frame = kWebmEncryptedFrames[0]; 361 const WebmEncryptedData& frame = kWebmEncryptedFrames[0];
351 GenerateKeyRequest(frame.key_id, frame.key_id_size); 362 GenerateKeyRequest(frame.key_id, frame.key_id_size);
352 363
353 // Change the first byte of the key. 364 // Change the first byte of the key.
354 std::vector<uint8> wrong_key(frame.key, frame.key + frame.key_size); 365 std::vector<uint8> wrong_key(frame.key, frame.key + frame.key_size);
355 wrong_key[0]++; 366 wrong_key[0]++;
356 367
357 AddKeyAndExpectToSucceed(frame.key_id, frame.key_id_size, 368 AddKeyAndExpectToSucceed(frame.key_id, frame.key_id_size,
358 &wrong_key[0], frame.key_size); 369 &wrong_key[0], frame.key_size);
(...skipping 203 matching lines...) Expand 10 before | Expand all | Expand 10 after
562 scoped_refptr<DecoderBuffer> encrypted_data = CreateSubsampleEncryptedBuffer( 573 scoped_refptr<DecoderBuffer> encrypted_data = CreateSubsampleEncryptedBuffer(
563 kSubsampleData, arraysize(kSubsampleData), 574 kSubsampleData, arraysize(kSubsampleData),
564 kSubsampleKeyId, arraysize(kSubsampleKeyId), 575 kSubsampleKeyId, arraysize(kSubsampleKeyId),
565 kSubsampleIv, arraysize(kSubsampleIv), 576 kSubsampleIv, arraysize(kSubsampleIv),
566 0, 577 0,
567 entries); 578 entries);
568 ASSERT_NO_FATAL_FAILURE(DecryptAndExpectToFail(encrypted_data)); 579 ASSERT_NO_FATAL_FAILURE(DecryptAndExpectToFail(encrypted_data));
569 } 580 }
570 581
571 } // namespace media 582 } // namespace media
OLDNEW
« no previous file with comments | « media/crypto/aes_decryptor.cc ('k') | media/filters/chunk_demuxer.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698