Index: crypto/encryptor_unittest.cc |
diff --git a/crypto/encryptor_unittest.cc b/crypto/encryptor_unittest.cc |
index ac78b966da394b4bbeec520ef8cb31312f33619f..3b6d662b11f4aec0d30e0a5b9341411618e4f158 100644 |
--- a/crypto/encryptor_unittest.cc |
+++ b/crypto/encryptor_unittest.cc |
@@ -92,7 +92,7 @@ TEST(EncryptorTest, DecryptWrongKey) { |
// determine the padding length without checking every padding byte, |
// Encryptor::Decrypt() will still return true. This is the case for NSS |
// (crbug.com/124434) and Mac OS X 10.7 (crbug.com/127586). |
wtc
2012/06/14 21:28:48
Delete " and Mac OS X 10.7 (crbug.com/127586)" fro
ddorwin
2012/06/14 22:01:55
Done.
|
-#if !defined(USE_NSS) |
+#if !defined(USE_NSS) && !defined(OS_WIN) && !defined(OS_MACOSX) |
crypto::Encryptor decryptor; |
EXPECT_TRUE(decryptor.Init(wrong_key.get(), crypto::Encryptor::CBC, iv)); |
EXPECT_FALSE(decryptor.Decrypt(ciphertext, &decypted)); |
@@ -113,7 +113,7 @@ TEST(EncryptorTest, DecryptWrongKey) { |
} |
// CTR mode encryption is only implemented using NSS. |
-#if defined(USE_NSS) |
+#if defined(USE_NSS) || defined(OS_WIN) || defined(OS_MACOSX) |
TEST(EncryptorTest, EncryptDecryptCTR) { |
scoped_ptr<crypto::SymmetricKey> key( |
@@ -149,11 +149,13 @@ TEST(EncryptorTest, EncryptDecryptCTR) { |
TEST(EncryptorTest, CTRCounter) { |
const int kCounterSize = 16; |
- const char kTest1[] = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0}; |
- uint8 buf[16]; |
+ const unsigned char kTest1[] = |
+ {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0}; |
+ unsigned char buf[16]; |
// Increment 10 times. |
- crypto::Encryptor::Counter counter1(std::string(kTest1, kCounterSize)); |
+ crypto::Encryptor::Counter counter1( |
+ std::string(reinterpret_cast<const char*>(kTest1), kCounterSize)); |
for (int i = 0; i < 10; ++i) |
counter1.Increment(); |
counter1.Write(buf); |
@@ -161,18 +163,26 @@ TEST(EncryptorTest, CTRCounter) { |
EXPECT_TRUE(buf[15] == 10); |
// Check corner cases. |
- const char kTest2[] = {0, 0, 0, 0, 0, 0, 0, 0, |
- 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff}; |
- const char kExpect2[] = {0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0}; |
- crypto::Encryptor::Counter counter2(std::string(kTest2, kCounterSize)); |
+ const unsigned char kTest2[] = { |
+ 0, 0, 0, 0, 0, 0, 0, 0, |
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff |
+ }; |
+ const unsigned char kExpect2[] = |
+ {0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0}; |
+ crypto::Encryptor::Counter counter2( |
+ std::string(reinterpret_cast<const char*>(kTest2), kCounterSize)); |
counter2.Increment(); |
counter2.Write(buf); |
EXPECT_EQ(0, memcmp(buf, kExpect2, kCounterSize)); |
- const char kTest3[] = {0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, |
- 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff}; |
- const char kExpect3[] = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0}; |
- crypto::Encryptor::Counter counter3(std::string(kTest3, kCounterSize)); |
+ const unsigned char kTest3[] = { |
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, |
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff |
+ }; |
+ const unsigned char kExpect3[] = |
+ {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0}; |
+ crypto::Encryptor::Counter counter3( |
+ std::string(reinterpret_cast<const char*>(kTest3), kCounterSize)); |
counter3.Increment(); |
counter3.Write(buf); |
EXPECT_EQ(0, memcmp(buf, kExpect3, kCounterSize)); |
@@ -312,7 +322,7 @@ TEST(EncryptorTest, EncryptAES192CBCRegression) { |
// Not all platforms allow import/generation of symmetric keys with an |
// unsupported size. |
-#if !defined(OS_WIN) && !defined(USE_NSS) |
+#if !defined(USE_NSS) && !defined(OS_WIN) && !defined(OS_MACOSX) |
TEST(EncryptorTest, UnsupportedKeySize) { |
std::string key = "7 = bad"; |
std::string iv = "Sweet Sixteen IV"; |