| OLD | NEW |
| 1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "content/renderer/webcrypto/webcrypto_impl.h" | 5 #include "content/renderer/webcrypto/webcrypto_impl.h" |
| 6 | 6 |
| 7 #include <algorithm> | 7 #include <algorithm> |
| 8 #include <string> | 8 #include <string> |
| 9 #include <vector> | 9 #include <vector> |
| 10 | 10 |
| (...skipping 1118 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1129 bool extractable = false; | 1129 bool extractable = false; |
| 1130 const blink::WebCryptoKeyUsageMask usage_mask = 0; | 1130 const blink::WebCryptoKeyUsageMask usage_mask = 0; |
| 1131 blink::WebCryptoKey public_key = blink::WebCryptoKey::createNull(); | 1131 blink::WebCryptoKey public_key = blink::WebCryptoKey::createNull(); |
| 1132 blink::WebCryptoKey private_key = blink::WebCryptoKey::createNull(); | 1132 blink::WebCryptoKey private_key = blink::WebCryptoKey::createNull(); |
| 1133 EXPECT_TRUE(GenerateKeyPairInternal( | 1133 EXPECT_TRUE(GenerateKeyPairInternal( |
| 1134 algorithm, extractable, usage_mask, &public_key, &private_key)); | 1134 algorithm, extractable, usage_mask, &public_key, &private_key)); |
| 1135 EXPECT_FALSE(public_key.isNull()); | 1135 EXPECT_FALSE(public_key.isNull()); |
| 1136 EXPECT_FALSE(private_key.isNull()); | 1136 EXPECT_FALSE(private_key.isNull()); |
| 1137 EXPECT_EQ(blink::WebCryptoKeyTypePublic, public_key.type()); | 1137 EXPECT_EQ(blink::WebCryptoKeyTypePublic, public_key.type()); |
| 1138 EXPECT_EQ(blink::WebCryptoKeyTypePrivate, private_key.type()); | 1138 EXPECT_EQ(blink::WebCryptoKeyTypePrivate, private_key.type()); |
| 1139 EXPECT_EQ(extractable, public_key.extractable()); | 1139 EXPECT_EQ(true, public_key.extractable()); |
| 1140 EXPECT_EQ(extractable, private_key.extractable()); | 1140 EXPECT_EQ(extractable, private_key.extractable()); |
| 1141 EXPECT_EQ(usage_mask, public_key.usages()); | 1141 EXPECT_EQ(usage_mask, public_key.usages()); |
| 1142 EXPECT_EQ(usage_mask, private_key.usages()); | 1142 EXPECT_EQ(usage_mask, private_key.usages()); |
| 1143 | 1143 |
| 1144 // Fail with bad modulus. | 1144 // Fail with bad modulus. |
| 1145 algorithm = webcrypto::CreateRsaKeyGenAlgorithm( | 1145 algorithm = webcrypto::CreateRsaKeyGenAlgorithm( |
| 1146 blink::WebCryptoAlgorithmIdRsaEsPkcs1v1_5, 0, public_exponent); | 1146 blink::WebCryptoAlgorithmIdRsaEsPkcs1v1_5, 0, public_exponent); |
| 1147 EXPECT_FALSE(GenerateKeyPairInternal( | 1147 EXPECT_FALSE(GenerateKeyPairInternal( |
| 1148 algorithm, extractable, usage_mask, &public_key, &private_key)); | 1148 algorithm, extractable, usage_mask, &public_key, &private_key)); |
| 1149 | 1149 |
| (...skipping 30 matching lines...) Expand all Loading... |
| 1180 algorithm = webcrypto::CreateRsaKeyGenAlgorithm( | 1180 algorithm = webcrypto::CreateRsaKeyGenAlgorithm( |
| 1181 blink::WebCryptoAlgorithmIdRsaEsPkcs1v1_5, | 1181 blink::WebCryptoAlgorithmIdRsaEsPkcs1v1_5, |
| 1182 modulus_length, | 1182 modulus_length, |
| 1183 exponent_with_leading_zeros); | 1183 exponent_with_leading_zeros); |
| 1184 EXPECT_TRUE(GenerateKeyPairInternal( | 1184 EXPECT_TRUE(GenerateKeyPairInternal( |
| 1185 algorithm, extractable, usage_mask, &public_key, &private_key)); | 1185 algorithm, extractable, usage_mask, &public_key, &private_key)); |
| 1186 EXPECT_FALSE(public_key.isNull()); | 1186 EXPECT_FALSE(public_key.isNull()); |
| 1187 EXPECT_FALSE(private_key.isNull()); | 1187 EXPECT_FALSE(private_key.isNull()); |
| 1188 EXPECT_EQ(blink::WebCryptoKeyTypePublic, public_key.type()); | 1188 EXPECT_EQ(blink::WebCryptoKeyTypePublic, public_key.type()); |
| 1189 EXPECT_EQ(blink::WebCryptoKeyTypePrivate, private_key.type()); | 1189 EXPECT_EQ(blink::WebCryptoKeyTypePrivate, private_key.type()); |
| 1190 EXPECT_EQ(extractable, public_key.extractable()); | 1190 EXPECT_EQ(true, public_key.extractable()); |
| 1191 EXPECT_EQ(extractable, private_key.extractable()); | 1191 EXPECT_EQ(extractable, private_key.extractable()); |
| 1192 EXPECT_EQ(usage_mask, public_key.usages()); | 1192 EXPECT_EQ(usage_mask, public_key.usages()); |
| 1193 EXPECT_EQ(usage_mask, private_key.usages()); | 1193 EXPECT_EQ(usage_mask, private_key.usages()); |
| 1194 | 1194 |
| 1195 // Successful WebCryptoAlgorithmIdRsaOaep key generation. | 1195 // Successful WebCryptoAlgorithmIdRsaOaep key generation. |
| 1196 algorithm = webcrypto::CreateRsaKeyGenAlgorithm( | 1196 algorithm = webcrypto::CreateRsaKeyGenAlgorithm( |
| 1197 blink::WebCryptoAlgorithmIdRsaOaep, modulus_length, public_exponent); | 1197 blink::WebCryptoAlgorithmIdRsaOaep, modulus_length, public_exponent); |
| 1198 EXPECT_TRUE(GenerateKeyPairInternal( | 1198 EXPECT_TRUE(GenerateKeyPairInternal( |
| 1199 algorithm, extractable, usage_mask, &public_key, &private_key)); | 1199 algorithm, extractable, usage_mask, &public_key, &private_key)); |
| 1200 EXPECT_FALSE(public_key.isNull()); | 1200 EXPECT_FALSE(public_key.isNull()); |
| 1201 EXPECT_FALSE(private_key.isNull()); | 1201 EXPECT_FALSE(private_key.isNull()); |
| 1202 EXPECT_EQ(blink::WebCryptoKeyTypePublic, public_key.type()); | 1202 EXPECT_EQ(blink::WebCryptoKeyTypePublic, public_key.type()); |
| 1203 EXPECT_EQ(blink::WebCryptoKeyTypePrivate, private_key.type()); | 1203 EXPECT_EQ(blink::WebCryptoKeyTypePrivate, private_key.type()); |
| 1204 EXPECT_EQ(extractable, public_key.extractable()); | 1204 EXPECT_EQ(true, public_key.extractable()); |
| 1205 EXPECT_EQ(extractable, private_key.extractable()); | 1205 EXPECT_EQ(extractable, private_key.extractable()); |
| 1206 EXPECT_EQ(usage_mask, public_key.usages()); | 1206 EXPECT_EQ(usage_mask, public_key.usages()); |
| 1207 EXPECT_EQ(usage_mask, private_key.usages()); | 1207 EXPECT_EQ(usage_mask, private_key.usages()); |
| 1208 | 1208 |
| 1209 // Successful WebCryptoAlgorithmIdRsaSsaPkcs1v1_5 key generation. | 1209 // Successful WebCryptoAlgorithmIdRsaSsaPkcs1v1_5 key generation. |
| 1210 algorithm = webcrypto::CreateRsaKeyGenAlgorithm( | 1210 algorithm = webcrypto::CreateRsaKeyGenAlgorithm( |
| 1211 blink::WebCryptoAlgorithmIdRsaSsaPkcs1v1_5, | 1211 blink::WebCryptoAlgorithmIdRsaSsaPkcs1v1_5, |
| 1212 modulus_length, | 1212 modulus_length, |
| 1213 public_exponent); | 1213 public_exponent); |
| 1214 EXPECT_TRUE(GenerateKeyPairInternal( | 1214 EXPECT_TRUE(GenerateKeyPairInternal( |
| 1215 algorithm, extractable, usage_mask, &public_key, &private_key)); | 1215 algorithm, extractable, usage_mask, &public_key, &private_key)); |
| 1216 EXPECT_FALSE(public_key.isNull()); | 1216 EXPECT_FALSE(public_key.isNull()); |
| 1217 EXPECT_FALSE(private_key.isNull()); | 1217 EXPECT_FALSE(private_key.isNull()); |
| 1218 EXPECT_EQ(blink::WebCryptoKeyTypePublic, public_key.type()); | 1218 EXPECT_EQ(blink::WebCryptoKeyTypePublic, public_key.type()); |
| 1219 EXPECT_EQ(blink::WebCryptoKeyTypePrivate, private_key.type()); | 1219 EXPECT_EQ(blink::WebCryptoKeyTypePrivate, private_key.type()); |
| 1220 EXPECT_EQ(extractable, public_key.extractable()); | 1220 EXPECT_EQ(true, public_key.extractable()); |
| 1221 EXPECT_EQ(extractable, private_key.extractable()); | 1221 EXPECT_EQ(extractable, private_key.extractable()); |
| 1222 EXPECT_EQ(usage_mask, public_key.usages()); | 1222 EXPECT_EQ(usage_mask, public_key.usages()); |
| 1223 EXPECT_EQ(usage_mask, private_key.usages()); | 1223 EXPECT_EQ(usage_mask, private_key.usages()); |
| 1224 | 1224 |
| 1225 // Fail SPKI export of private key. This is an ExportKey test, but do it here | 1225 // Fail SPKI export of private key. This is an ExportKey test, but do it here |
| 1226 // since it is expensive to generate an RSA key pair and we already have a | 1226 // since it is expensive to generate an RSA key pair and we already have a |
| 1227 // private key here. | 1227 // private key here. |
| 1228 blink::WebArrayBuffer output; | 1228 blink::WebArrayBuffer output; |
| 1229 EXPECT_FALSE( | 1229 EXPECT_FALSE( |
| 1230 ExportKeyInternal(blink::WebCryptoKeyFormatSpki, private_key, &output)); | 1230 ExportKeyInternal(blink::WebCryptoKeyFormatSpki, private_key, &output)); |
| (...skipping 250 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1481 private_key, | 1481 private_key, |
| 1482 reinterpret_cast<const unsigned char*>(encrypted_data.data()), | 1482 reinterpret_cast<const unsigned char*>(encrypted_data.data()), |
| 1483 encrypted_data.byteLength(), | 1483 encrypted_data.byteLength(), |
| 1484 &decrypted_data)); | 1484 &decrypted_data)); |
| 1485 ExpectArrayBufferMatchesHex(message_hex_str, decrypted_data); | 1485 ExpectArrayBufferMatchesHex(message_hex_str, decrypted_data); |
| 1486 } | 1486 } |
| 1487 | 1487 |
| 1488 #endif // #if !defined(USE_OPENSSL) | 1488 #endif // #if !defined(USE_OPENSSL) |
| 1489 | 1489 |
| 1490 } // namespace content | 1490 } // namespace content |
| OLD | NEW |