| Index: crypto/symmetric_key_unittest.cc
|
| ===================================================================
|
| --- crypto/symmetric_key_unittest.cc (revision 79901)
|
| +++ crypto/symmetric_key_unittest.cc (working copy)
|
| @@ -2,7 +2,7 @@
|
| // Use of this source code is governed by a BSD-style license that can be
|
| // found in the LICENSE file.
|
|
|
| -#include "base/crypto/symmetric_key.h"
|
| +#include "crypto/symmetric_key.h"
|
|
|
| #include <string>
|
|
|
| @@ -12,8 +12,8 @@
|
| #include "testing/gtest/include/gtest/gtest.h"
|
|
|
| TEST(SymmetricKeyTest, GenerateRandomKey) {
|
| - scoped_ptr<base::SymmetricKey> key(
|
| - base::SymmetricKey::GenerateRandomKey(base::SymmetricKey::AES, 256));
|
| + scoped_ptr<crypto::SymmetricKey> key(
|
| + crypto::SymmetricKey::GenerateRandomKey(crypto::SymmetricKey::AES, 256));
|
| ASSERT_TRUE(NULL != key.get());
|
| std::string raw_key;
|
| EXPECT_TRUE(key->GetRawKey(&raw_key));
|
| @@ -21,8 +21,8 @@
|
|
|
| // Do it again and check that the keys are different.
|
| // (Note: this has a one-in-10^77 chance of failure!)
|
| - scoped_ptr<base::SymmetricKey> key2(
|
| - base::SymmetricKey::GenerateRandomKey(base::SymmetricKey::AES, 256));
|
| + scoped_ptr<crypto::SymmetricKey> key2(
|
| + crypto::SymmetricKey::GenerateRandomKey(crypto::SymmetricKey::AES, 256));
|
| ASSERT_TRUE(NULL != key2.get());
|
| std::string raw_key2;
|
| EXPECT_TRUE(key2->GetRawKey(&raw_key2));
|
| @@ -31,14 +31,14 @@
|
| }
|
|
|
| TEST(SymmetricKeyTest, ImportGeneratedKey) {
|
| - scoped_ptr<base::SymmetricKey> key1(
|
| - base::SymmetricKey::GenerateRandomKey(base::SymmetricKey::AES, 256));
|
| + scoped_ptr<crypto::SymmetricKey> key1(
|
| + crypto::SymmetricKey::GenerateRandomKey(crypto::SymmetricKey::AES, 256));
|
| ASSERT_TRUE(NULL != key1.get());
|
| std::string raw_key1;
|
| EXPECT_TRUE(key1->GetRawKey(&raw_key1));
|
|
|
| - scoped_ptr<base::SymmetricKey> key2(
|
| - base::SymmetricKey::Import(base::SymmetricKey::AES, raw_key1));
|
| + scoped_ptr<crypto::SymmetricKey> key2(
|
| + crypto::SymmetricKey::Import(crypto::SymmetricKey::AES, raw_key1));
|
| ASSERT_TRUE(NULL != key2.get());
|
|
|
| std::string raw_key2;
|
| @@ -48,16 +48,15 @@
|
| }
|
|
|
| TEST(SymmetricKeyTest, ImportDerivedKey) {
|
| - scoped_ptr<base::SymmetricKey> key1(
|
| - base::SymmetricKey::DeriveKeyFromPassword(base::SymmetricKey::HMAC_SHA1,
|
| - "password", "somesalt", 1024,
|
| - 160));
|
| + scoped_ptr<crypto::SymmetricKey> key1(
|
| + crypto::SymmetricKey::DeriveKeyFromPassword(
|
| + crypto::SymmetricKey::HMAC_SHA1, "password", "somesalt", 1024, 160));
|
| ASSERT_TRUE(NULL != key1.get());
|
| std::string raw_key1;
|
| EXPECT_TRUE(key1->GetRawKey(&raw_key1));
|
|
|
| - scoped_ptr<base::SymmetricKey> key2(
|
| - base::SymmetricKey::Import(base::SymmetricKey::HMAC_SHA1, raw_key1));
|
| + scoped_ptr<crypto::SymmetricKey> key2(
|
| + crypto::SymmetricKey::Import(crypto::SymmetricKey::HMAC_SHA1, raw_key1));
|
| ASSERT_TRUE(NULL != key2.get());
|
|
|
| std::string raw_key2;
|
| @@ -67,7 +66,7 @@
|
| }
|
|
|
| struct PBKDF2TestVector {
|
| - base::SymmetricKey::Algorithm algorithm;
|
| + crypto::SymmetricKey::Algorithm algorithm;
|
| const char* password;
|
| const char* salt;
|
| unsigned int rounds;
|
| @@ -90,8 +89,8 @@
|
| }
|
| #endif // OS_MACOSX
|
|
|
| - scoped_ptr<base::SymmetricKey> key(
|
| - base::SymmetricKey::DeriveKeyFromPassword(
|
| + scoped_ptr<crypto::SymmetricKey> key(
|
| + crypto::SymmetricKey::DeriveKeyFromPassword(
|
| test_data.algorithm,
|
| test_data.password, test_data.salt,
|
| test_data.rounds, test_data.key_size_in_bits));
|
| @@ -109,7 +108,7 @@
|
| // These tests come from
|
| // http://www.ietf.org/id/draft-josefsson-pbkdf2-test-vectors-00.txt
|
| {
|
| - base::SymmetricKey::HMAC_SHA1,
|
| + crypto::SymmetricKey::HMAC_SHA1,
|
| "password",
|
| "salt",
|
| 1,
|
| @@ -117,7 +116,7 @@
|
| "0c60c80f961f0e71f3a9b524af6012062fe037a6",
|
| },
|
| {
|
| - base::SymmetricKey::HMAC_SHA1,
|
| + crypto::SymmetricKey::HMAC_SHA1,
|
| "password",
|
| "salt",
|
| 2,
|
| @@ -125,7 +124,7 @@
|
| "ea6c014dc72d6f8ccd1ed92ace1d41f0d8de8957",
|
| },
|
| {
|
| - base::SymmetricKey::HMAC_SHA1,
|
| + crypto::SymmetricKey::HMAC_SHA1,
|
| "password",
|
| "salt",
|
| 4096,
|
| @@ -135,7 +134,7 @@
|
| // This test takes over 30s to run on the trybots.
|
| #if 0
|
| {
|
| - base::SymmetricKey::HMAC_SHA1,
|
| + crypto::SymmetricKey::HMAC_SHA1,
|
| "password",
|
| "salt",
|
| 16777216,
|
| @@ -147,7 +146,7 @@
|
| // These tests come from RFC 3962, via BSD source code at
|
| // http://www.openbsd.org/cgi-bin/cvsweb/src/sbin/bioctl/pbkdf2.c?rev=HEAD&content-type=text/plain
|
| {
|
| - base::SymmetricKey::HMAC_SHA1,
|
| + crypto::SymmetricKey::HMAC_SHA1,
|
| "password",
|
| "ATHENA.MIT.EDUraeburn",
|
| 1,
|
| @@ -155,7 +154,7 @@
|
| "cdedb5281bb2f801565a1122b25635150ad1f7a0",
|
| },
|
| {
|
| - base::SymmetricKey::HMAC_SHA1,
|
| + crypto::SymmetricKey::HMAC_SHA1,
|
| "password",
|
| "ATHENA.MIT.EDUraeburn",
|
| 2,
|
| @@ -163,7 +162,7 @@
|
| "01dbee7f4a9e243e988b62c73cda935da05378b9",
|
| },
|
| {
|
| - base::SymmetricKey::HMAC_SHA1,
|
| + crypto::SymmetricKey::HMAC_SHA1,
|
| "password",
|
| "ATHENA.MIT.EDUraeburn",
|
| 1200,
|
| @@ -171,7 +170,7 @@
|
| "5c08eb61fdf71e4e4ec3cf6ba1f5512ba7e52ddb",
|
| },
|
| {
|
| - base::SymmetricKey::HMAC_SHA1,
|
| + crypto::SymmetricKey::HMAC_SHA1,
|
| "password",
|
| "\0224VxxV4\022", /* 0x1234567878563412 */
|
| 5,
|
| @@ -179,7 +178,7 @@
|
| "d1daa78615f287e6a1c8b120d7062a493f98d203",
|
| },
|
| {
|
| - base::SymmetricKey::HMAC_SHA1,
|
| + crypto::SymmetricKey::HMAC_SHA1,
|
| "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX",
|
| "pass phrase equals block size",
|
| 1200,
|
| @@ -187,7 +186,7 @@
|
| "139c30c0966bc32ba55fdbf212530ac9c5ec59f1",
|
| },
|
| {
|
| - base::SymmetricKey::HMAC_SHA1,
|
| + crypto::SymmetricKey::HMAC_SHA1,
|
| "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX",
|
| "pass phrase exceeds block size",
|
| 1200,
|
| @@ -195,7 +194,7 @@
|
| "9ccad6d468770cd51b10e6a68721be611a8b4d28",
|
| },
|
| {
|
| - base::SymmetricKey::HMAC_SHA1,
|
| + crypto::SymmetricKey::HMAC_SHA1,
|
| "\360\235\204\236", /* g-clef (0xf09d849e) */
|
| "EXAMPLE.COMpianist",
|
| 50,
|
| @@ -205,7 +204,7 @@
|
|
|
| // Regression tests for AES keys, derived from the Linux NSS implementation.
|
| {
|
| - base::SymmetricKey::AES,
|
| + crypto::SymmetricKey::AES,
|
| "A test password",
|
| "saltsalt",
|
| 1,
|
| @@ -213,7 +212,7 @@
|
| "44899a7777f0e6e8b752f875f02044b8ac593de146de896f2e8a816e315a36de",
|
| },
|
| {
|
| - base::SymmetricKey::AES,
|
| + crypto::SymmetricKey::AES,
|
| "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX",
|
| "pass phrase exceeds block size",
|
| 20,
|
|
|