-// Copyright 2015 The Chromium Authors. All rights reserved.
+// Copyright 2015 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
namespace {
const crypto::Aead::AeadAlgorithm kAllAlgorithms[]{
- crypto::Aead::AES_128_CTR_HMAC_SHA256, crypto::Aead::AES_256_GCM,
+ crypto::Aead::AES_128_CTR_HMAC_SHA256,
+ crypto::Aead::AES_256_GCM,
crypto::Aead::AES_256_GCM_SIV,
+ crypto::Aead::CHACHA20_POLY1305,
};
class AeadTest : public testing::TestWithParam<crypto::Aead::AeadAlgorithm> {};
-INSTANTIATE_TEST_CASE_P(, AeadTest, testing::ValuesIn(kAllAlgorithms));
+INSTANTIATE_TEST_SUITE_P(All, AeadTest, testing::ValuesIn(kAllAlgorithms));
TEST_P(AeadTest, SealOpen) {
crypto::Aead::AeadAlgorithm alg = GetParam();
EXPECT_EQ(plaintext, decrypted);
}
+TEST_P(AeadTest, SealOpenSpan) {
+ crypto::Aead::AeadAlgorithm alg = GetParam();
+ crypto::Aead aead(alg);
+ std::vector<uint8_t> key(aead.KeyLength(), 0u);
+ aead.Init(key);
+ std::vector<uint8_t> nonce(aead.NonceLength(), 0u);
+ static constexpr uint8_t kPlaintext[] = "plaintext";
+ static constexpr uint8_t kAdditionalData[] = "additional data input";
+ std::vector<uint8_t> ciphertext =
+ aead.Seal(kPlaintext, nonce, kAdditionalData);
+ EXPECT_LT(sizeof(kPlaintext), ciphertext.size());
+
+ absl::optional<std::vector<uint8_t>> decrypted =
+ aead.Open(ciphertext, nonce, kAdditionalData);
+ ASSERT_TRUE(decrypted);
+ ASSERT_EQ(decrypted->size(), sizeof(kPlaintext));
+ ASSERT_EQ(0, memcmp(decrypted->data(), kPlaintext, sizeof(kPlaintext)));
+
+ std::vector<uint8_t> wrong_key(aead.KeyLength(), 1u);
+ crypto::Aead aead_wrong_key(alg);
+ aead_wrong_key.Init(wrong_key);
+ decrypted = aead_wrong_key.Open(ciphertext, nonce, kAdditionalData);
+ EXPECT_FALSE(decrypted);
+}
+
TEST_P(AeadTest, SealOpenWrongKey) {
crypto::Aead::AeadAlgorithm alg = GetParam();
crypto::Aead aead(alg);