summaryrefslogtreecommitdiff
path: root/chromium/components/gcm_driver/crypto/gcm_crypto_test_helpers.cc
diff options
context:
space:
mode:
Diffstat (limited to 'chromium/components/gcm_driver/crypto/gcm_crypto_test_helpers.cc')
-rw-r--r--chromium/components/gcm_driver/crypto/gcm_crypto_test_helpers.cc84
1 files changed, 84 insertions, 0 deletions
diff --git a/chromium/components/gcm_driver/crypto/gcm_crypto_test_helpers.cc b/chromium/components/gcm_driver/crypto/gcm_crypto_test_helpers.cc
new file mode 100644
index 00000000000..00c0d16cb61
--- /dev/null
+++ b/chromium/components/gcm_driver/crypto/gcm_crypto_test_helpers.cc
@@ -0,0 +1,84 @@
+// Copyright 2015 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#include "components/gcm_driver/crypto/gcm_crypto_test_helpers.h"
+
+#include <stddef.h>
+
+#include <sstream>
+#include <string>
+
+#include "base/base64url.h"
+#include "base/strings/string_util.h"
+#include "components/gcm_driver/common/gcm_message.h"
+#include "components/gcm_driver/crypto/gcm_message_cryptographer.h"
+#include "components/gcm_driver/crypto/p256_key_util.h"
+#include "crypto/ec_private_key.h"
+#include "crypto/random.h"
+
+namespace gcm {
+
+bool CreateEncryptedPayloadForTesting(const base::StringPiece& payload,
+ const base::StringPiece& peer_public_key,
+ const base::StringPiece& auth_secret,
+ IncomingMessage* message) {
+ DCHECK(message);
+
+ // Create an ephemeral key for the sender.
+ std::unique_ptr<crypto::ECPrivateKey> key = crypto::ECPrivateKey::Create();
+ if (!key)
+ return false;
+
+ std::string shared_secret;
+ // Calculate the shared secret between the sender and its peer.
+ if (!ComputeSharedP256Secret(*key, peer_public_key, &shared_secret)) {
+ return false;
+ }
+
+ std::string salt;
+
+ // Generate a cryptographically secure random salt for the message.
+ const size_t salt_size = GCMMessageCryptographer::kSaltSize;
+ crypto::RandBytes(base::WriteInto(&salt, salt_size + 1), salt_size);
+
+ GCMMessageCryptographer cryptographer(
+ GCMMessageCryptographer::Version::DRAFT_03);
+
+ size_t record_size;
+ std::string ciphertext;
+
+ std::string public_key;
+ if (!GetRawPublicKey(*key, &public_key))
+ return false;
+ if (!cryptographer.Encrypt(peer_public_key, public_key, shared_secret,
+ auth_secret, salt, payload, &record_size,
+ &ciphertext)) {
+ return false;
+ }
+
+ std::string encoded_salt, encoded_public_key;
+
+ // Create base64url encoded representations of the salt and local public key.
+ base::Base64UrlEncode(salt, base::Base64UrlEncodePolicy::OMIT_PADDING,
+ &encoded_salt);
+ base::Base64UrlEncode(public_key, base::Base64UrlEncodePolicy::OMIT_PADDING,
+ &encoded_public_key);
+
+ // Write the Encryption header value to |*message|.
+ std::stringstream encryption_header;
+ encryption_header << "salt=" << encoded_salt << ";rs=" << record_size;
+
+ message->data["encryption"] = encryption_header.str();
+
+ // Write the Crypto-Key value to |*message|.
+ std::stringstream crypto_key_header;
+ crypto_key_header << "dh=" << encoded_public_key;
+
+ message->data["crypto-key"] = crypto_key_header.str();
+
+ message->raw_data.swap(ciphertext);
+ return true;
+}
+
+} // namespace gcm