| Index: crypto/symmetric_key_unittest.cc | 
| =================================================================== | 
| --- crypto/symmetric_key_unittest.cc	(revision 79901) | 
| +++ crypto/symmetric_key_unittest.cc	(working copy) | 
| @@ -2,7 +2,7 @@ | 
| // Use of this source code is governed by a BSD-style license that can be | 
| // found in the LICENSE file. | 
|  | 
| -#include "base/crypto/symmetric_key.h" | 
| +#include "crypto/symmetric_key.h" | 
|  | 
| #include <string> | 
|  | 
| @@ -12,8 +12,8 @@ | 
| #include "testing/gtest/include/gtest/gtest.h" | 
|  | 
| TEST(SymmetricKeyTest, GenerateRandomKey) { | 
| -  scoped_ptr<base::SymmetricKey> key( | 
| -      base::SymmetricKey::GenerateRandomKey(base::SymmetricKey::AES, 256)); | 
| +  scoped_ptr<crypto::SymmetricKey> key( | 
| +      crypto::SymmetricKey::GenerateRandomKey(crypto::SymmetricKey::AES, 256)); | 
| ASSERT_TRUE(NULL != key.get()); | 
| std::string raw_key; | 
| EXPECT_TRUE(key->GetRawKey(&raw_key)); | 
| @@ -21,8 +21,8 @@ | 
|  | 
| // Do it again and check that the keys are different. | 
| // (Note: this has a one-in-10^77 chance of failure!) | 
| -  scoped_ptr<base::SymmetricKey> key2( | 
| -      base::SymmetricKey::GenerateRandomKey(base::SymmetricKey::AES, 256)); | 
| +  scoped_ptr<crypto::SymmetricKey> key2( | 
| +      crypto::SymmetricKey::GenerateRandomKey(crypto::SymmetricKey::AES, 256)); | 
| ASSERT_TRUE(NULL != key2.get()); | 
| std::string raw_key2; | 
| EXPECT_TRUE(key2->GetRawKey(&raw_key2)); | 
| @@ -31,14 +31,14 @@ | 
| } | 
|  | 
| TEST(SymmetricKeyTest, ImportGeneratedKey) { | 
| -  scoped_ptr<base::SymmetricKey> key1( | 
| -      base::SymmetricKey::GenerateRandomKey(base::SymmetricKey::AES, 256)); | 
| +  scoped_ptr<crypto::SymmetricKey> key1( | 
| +      crypto::SymmetricKey::GenerateRandomKey(crypto::SymmetricKey::AES, 256)); | 
| ASSERT_TRUE(NULL != key1.get()); | 
| std::string raw_key1; | 
| EXPECT_TRUE(key1->GetRawKey(&raw_key1)); | 
|  | 
| -  scoped_ptr<base::SymmetricKey> key2( | 
| -      base::SymmetricKey::Import(base::SymmetricKey::AES, raw_key1)); | 
| +  scoped_ptr<crypto::SymmetricKey> key2( | 
| +      crypto::SymmetricKey::Import(crypto::SymmetricKey::AES, raw_key1)); | 
| ASSERT_TRUE(NULL != key2.get()); | 
|  | 
| std::string raw_key2; | 
| @@ -48,16 +48,15 @@ | 
| } | 
|  | 
| TEST(SymmetricKeyTest, ImportDerivedKey) { | 
| -  scoped_ptr<base::SymmetricKey> key1( | 
| -      base::SymmetricKey::DeriveKeyFromPassword(base::SymmetricKey::HMAC_SHA1, | 
| -                                                "password", "somesalt", 1024, | 
| -                                                160)); | 
| +  scoped_ptr<crypto::SymmetricKey> key1( | 
| +      crypto::SymmetricKey::DeriveKeyFromPassword( | 
| +          crypto::SymmetricKey::HMAC_SHA1, "password", "somesalt", 1024, 160)); | 
| ASSERT_TRUE(NULL != key1.get()); | 
| std::string raw_key1; | 
| EXPECT_TRUE(key1->GetRawKey(&raw_key1)); | 
|  | 
| -  scoped_ptr<base::SymmetricKey> key2( | 
| -      base::SymmetricKey::Import(base::SymmetricKey::HMAC_SHA1, raw_key1)); | 
| +  scoped_ptr<crypto::SymmetricKey> key2( | 
| +      crypto::SymmetricKey::Import(crypto::SymmetricKey::HMAC_SHA1, raw_key1)); | 
| ASSERT_TRUE(NULL != key2.get()); | 
|  | 
| std::string raw_key2; | 
| @@ -67,7 +66,7 @@ | 
| } | 
|  | 
| struct PBKDF2TestVector { | 
| -  base::SymmetricKey::Algorithm algorithm; | 
| +  crypto::SymmetricKey::Algorithm algorithm; | 
| const char* password; | 
| const char* salt; | 
| unsigned int rounds; | 
| @@ -90,8 +89,8 @@ | 
| } | 
| #endif  // OS_MACOSX | 
|  | 
| -  scoped_ptr<base::SymmetricKey> key( | 
| -      base::SymmetricKey::DeriveKeyFromPassword( | 
| +  scoped_ptr<crypto::SymmetricKey> key( | 
| +      crypto::SymmetricKey::DeriveKeyFromPassword( | 
| test_data.algorithm, | 
| test_data.password, test_data.salt, | 
| test_data.rounds, test_data.key_size_in_bits)); | 
| @@ -109,7 +108,7 @@ | 
| // These tests come from | 
| // http://www.ietf.org/id/draft-josefsson-pbkdf2-test-vectors-00.txt | 
| { | 
| -    base::SymmetricKey::HMAC_SHA1, | 
| +    crypto::SymmetricKey::HMAC_SHA1, | 
| "password", | 
| "salt", | 
| 1, | 
| @@ -117,7 +116,7 @@ | 
| "0c60c80f961f0e71f3a9b524af6012062fe037a6", | 
| }, | 
| { | 
| -    base::SymmetricKey::HMAC_SHA1, | 
| +    crypto::SymmetricKey::HMAC_SHA1, | 
| "password", | 
| "salt", | 
| 2, | 
| @@ -125,7 +124,7 @@ | 
| "ea6c014dc72d6f8ccd1ed92ace1d41f0d8de8957", | 
| }, | 
| { | 
| -    base::SymmetricKey::HMAC_SHA1, | 
| +    crypto::SymmetricKey::HMAC_SHA1, | 
| "password", | 
| "salt", | 
| 4096, | 
| @@ -135,7 +134,7 @@ | 
| // This test takes over 30s to run on the trybots. | 
| #if 0 | 
| { | 
| -    base::SymmetricKey::HMAC_SHA1, | 
| +    crypto::SymmetricKey::HMAC_SHA1, | 
| "password", | 
| "salt", | 
| 16777216, | 
| @@ -147,7 +146,7 @@ | 
| // These tests come from RFC 3962, via BSD source code at | 
| // http://www.openbsd.org/cgi-bin/cvsweb/src/sbin/bioctl/pbkdf2.c?rev=HEAD&content-type=text/plain | 
| { | 
| -    base::SymmetricKey::HMAC_SHA1, | 
| +    crypto::SymmetricKey::HMAC_SHA1, | 
| "password", | 
| "ATHENA.MIT.EDUraeburn", | 
| 1, | 
| @@ -155,7 +154,7 @@ | 
| "cdedb5281bb2f801565a1122b25635150ad1f7a0", | 
| }, | 
| { | 
| -    base::SymmetricKey::HMAC_SHA1, | 
| +    crypto::SymmetricKey::HMAC_SHA1, | 
| "password", | 
| "ATHENA.MIT.EDUraeburn", | 
| 2, | 
| @@ -163,7 +162,7 @@ | 
| "01dbee7f4a9e243e988b62c73cda935da05378b9", | 
| }, | 
| { | 
| -    base::SymmetricKey::HMAC_SHA1, | 
| +    crypto::SymmetricKey::HMAC_SHA1, | 
| "password", | 
| "ATHENA.MIT.EDUraeburn", | 
| 1200, | 
| @@ -171,7 +170,7 @@ | 
| "5c08eb61fdf71e4e4ec3cf6ba1f5512ba7e52ddb", | 
| }, | 
| { | 
| -    base::SymmetricKey::HMAC_SHA1, | 
| +    crypto::SymmetricKey::HMAC_SHA1, | 
| "password", | 
| "\0224VxxV4\022", /* 0x1234567878563412 */ | 
| 5, | 
| @@ -179,7 +178,7 @@ | 
| "d1daa78615f287e6a1c8b120d7062a493f98d203", | 
| }, | 
| { | 
| -    base::SymmetricKey::HMAC_SHA1, | 
| +    crypto::SymmetricKey::HMAC_SHA1, | 
| "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX", | 
| "pass phrase equals block size", | 
| 1200, | 
| @@ -187,7 +186,7 @@ | 
| "139c30c0966bc32ba55fdbf212530ac9c5ec59f1", | 
| }, | 
| { | 
| -    base::SymmetricKey::HMAC_SHA1, | 
| +    crypto::SymmetricKey::HMAC_SHA1, | 
| "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX", | 
| "pass phrase exceeds block size", | 
| 1200, | 
| @@ -195,7 +194,7 @@ | 
| "9ccad6d468770cd51b10e6a68721be611a8b4d28", | 
| }, | 
| { | 
| -    base::SymmetricKey::HMAC_SHA1, | 
| +    crypto::SymmetricKey::HMAC_SHA1, | 
| "\360\235\204\236", /* g-clef (0xf09d849e) */ | 
| "EXAMPLE.COMpianist", | 
| 50, | 
| @@ -205,7 +204,7 @@ | 
|  | 
| // Regression tests for AES keys, derived from the Linux NSS implementation. | 
| { | 
| -    base::SymmetricKey::AES, | 
| +    crypto::SymmetricKey::AES, | 
| "A test password", | 
| "saltsalt", | 
| 1, | 
| @@ -213,7 +212,7 @@ | 
| "44899a7777f0e6e8b752f875f02044b8ac593de146de896f2e8a816e315a36de", | 
| }, | 
| { | 
| -    base::SymmetricKey::AES, | 
| +    crypto::SymmetricKey::AES, | 
| "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX", | 
| "pass phrase exceeds block size", | 
| 20, | 
|  |