OLD | NEW |
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "base/crypto/symmetric_key.h" | 5 #include "base/crypto/symmetric_key.h" |
6 | 6 |
7 #include <string> | 7 #include <string> |
8 | 8 |
9 #include "base/memory/scoped_ptr.h" | 9 #include "base/memory/scoped_ptr.h" |
10 #include "base/string_number_conversions.h" | 10 #include "base/string_number_conversions.h" |
(...skipping 12 matching lines...) Expand all Loading... |
23 // (Note: this has a one-in-10^77 chance of failure!) | 23 // (Note: this has a one-in-10^77 chance of failure!) |
24 scoped_ptr<base::SymmetricKey> key2( | 24 scoped_ptr<base::SymmetricKey> key2( |
25 base::SymmetricKey::GenerateRandomKey(base::SymmetricKey::AES, 256)); | 25 base::SymmetricKey::GenerateRandomKey(base::SymmetricKey::AES, 256)); |
26 ASSERT_TRUE(NULL != key2.get()); | 26 ASSERT_TRUE(NULL != key2.get()); |
27 std::string raw_key2; | 27 std::string raw_key2; |
28 EXPECT_TRUE(key2->GetRawKey(&raw_key2)); | 28 EXPECT_TRUE(key2->GetRawKey(&raw_key2)); |
29 EXPECT_EQ(32U, raw_key2.size()); | 29 EXPECT_EQ(32U, raw_key2.size()); |
30 EXPECT_NE(raw_key, raw_key2); | 30 EXPECT_NE(raw_key, raw_key2); |
31 } | 31 } |
32 | 32 |
| 33 TEST(SymmetricKeyTest, GenerateRandomBytes) { |
| 34 std::vector<uint8> bytes(50); |
| 35 ASSERT_TRUE(base::SymmetricKey::GenerateRandomBytes(bytes.size(), &bytes[0])); |
| 36 // Probability of occurrence of less than 25 unique bytes in 50 random bytes |
| 37 // is below 10^-25. |
| 38 std::sort(bytes.begin(), bytes.end()); |
| 39 ASSERT_GT(std::unique(bytes.begin(), bytes.end()) - bytes.begin(), 25); |
| 40 } |
| 41 |
33 TEST(SymmetricKeyTest, ImportGeneratedKey) { | 42 TEST(SymmetricKeyTest, ImportGeneratedKey) { |
34 scoped_ptr<base::SymmetricKey> key1( | 43 scoped_ptr<base::SymmetricKey> key1( |
35 base::SymmetricKey::GenerateRandomKey(base::SymmetricKey::AES, 256)); | 44 base::SymmetricKey::GenerateRandomKey(base::SymmetricKey::AES, 256)); |
36 ASSERT_TRUE(NULL != key1.get()); | 45 ASSERT_TRUE(NULL != key1.get()); |
37 std::string raw_key1; | 46 std::string raw_key1; |
38 EXPECT_TRUE(key1->GetRawKey(&raw_key1)); | 47 EXPECT_TRUE(key1->GetRawKey(&raw_key1)); |
39 | 48 |
40 scoped_ptr<base::SymmetricKey> key2( | 49 scoped_ptr<base::SymmetricKey> key2( |
41 base::SymmetricKey::Import(base::SymmetricKey::AES, raw_key1)); | 50 base::SymmetricKey::Import(base::SymmetricKey::AES, raw_key1)); |
42 ASSERT_TRUE(NULL != key2.get()); | 51 ASSERT_TRUE(NULL != key2.get()); |
(...skipping 174 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
217 "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX", | 226 "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX", |
218 "pass phrase exceeds block size", | 227 "pass phrase exceeds block size", |
219 20, | 228 20, |
220 256, | 229 256, |
221 "e0739745dc28b8721ba402e05214d2ac1eab54cf72bee1fba388297a09eb493c", | 230 "e0739745dc28b8721ba402e05214d2ac1eab54cf72bee1fba388297a09eb493c", |
222 }, | 231 }, |
223 }; | 232 }; |
224 | 233 |
225 INSTANTIATE_TEST_CASE_P(, SymmetricKeyDeriveKeyFromPasswordTest, | 234 INSTANTIATE_TEST_CASE_P(, SymmetricKeyDeriveKeyFromPasswordTest, |
226 testing::ValuesIn(kTestVectors)); | 235 testing::ValuesIn(kTestVectors)); |
OLD | NEW |