// Copyright (c) 2016 The WebM project authors. All Rights Reserved. // // Use of this source code is governed by a BSD-style license // that can be found in the LICENSE file in the root of the source // tree. An additional intellectual property rights grant can be found // in the file PATENTS. All contributing project authors may // be found in the AUTHORS file in the root of the source tree. #include "src/content_encryption_parser.h" #include #include "gtest/gtest.h" #include "test_utils/element_parser_test.h" #include "webm/id.h" using webm::AesSettingsCipherMode; using webm::ContentEncAesSettings; using webm::ContentEncAlgo; using webm::ContentEncryption; using webm::ContentEncryptionParser; using webm::ElementParserTest; using webm::Id; namespace { class ContentEncryptionParserTest : public ElementParserTest {}; TEST_F(ContentEncryptionParserTest, DefaultParse) { ParseAndVerify(); const ContentEncryption content_encryption = parser_.value(); EXPECT_FALSE(content_encryption.algorithm.is_present()); EXPECT_EQ(ContentEncAlgo::kOnlySigned, content_encryption.algorithm.value()); EXPECT_FALSE(content_encryption.key_id.is_present()); EXPECT_EQ(std::vector{}, content_encryption.key_id.value()); EXPECT_FALSE(content_encryption.aes_settings.is_present()); EXPECT_EQ(ContentEncAesSettings{}, content_encryption.aes_settings.value()); } TEST_F(ContentEncryptionParserTest, DefaultValues) { SetReaderData({ 0x47, 0xE1, // ID = 0x47E1 (ContentEncAlgo). 0x80, // Size = 0. 0x47, 0xE2, // ID = 0x47E2 (ContentEncKeyID). 0x80, // Size = 0. 0x47, 0xE7, // ID = 0x47E7 (ContentEncAESSettings). 0x80, // Size = 0. }); ParseAndVerify(); const ContentEncryption content_encryption = parser_.value(); EXPECT_TRUE(content_encryption.algorithm.is_present()); EXPECT_EQ(ContentEncAlgo::kOnlySigned, content_encryption.algorithm.value()); EXPECT_TRUE(content_encryption.key_id.is_present()); EXPECT_EQ(std::vector{}, content_encryption.key_id.value()); EXPECT_TRUE(content_encryption.aes_settings.is_present()); EXPECT_EQ(ContentEncAesSettings{}, content_encryption.aes_settings.value()); } TEST_F(ContentEncryptionParserTest, CustomValues) { SetReaderData({ 0x47, 0xE1, // ID = 0x47E1 (ContentEncAlgo). 0x81, // Size = 1. 0x05, // Body (value = AES). 0x47, 0xE2, // ID = 0x47E2 (ContentEncKeyID). 0x81, // Size = 1. 0x00, // Body. 0x47, 0xE7, // ID = 0x47E7 (ContentEncAESSettings). 0x84, // Size = 4. 0x47, 0xE8, // ID = 0x47E8 (AESSettingsCipherMode). 0x81, // Size = 1. 0x00, // Body (value = 0). }); ParseAndVerify(); const ContentEncryption content_encryption = parser_.value(); EXPECT_TRUE(content_encryption.algorithm.is_present()); EXPECT_EQ(ContentEncAlgo::kAes, content_encryption.algorithm.value()); EXPECT_TRUE(content_encryption.key_id.is_present()); EXPECT_EQ(std::vector{0x00}, content_encryption.key_id.value()); ContentEncAesSettings expected; expected.aes_settings_cipher_mode.Set(static_cast(0), true); EXPECT_TRUE(content_encryption.aes_settings.is_present()); EXPECT_EQ(expected, content_encryption.aes_settings.value()); } } // namespace