| Index: components/gcm_driver/crypto/encryption_header_parsers_unittest.cc
|
| diff --git a/components/gcm_driver/crypto/encryption_header_parsers_unittest.cc b/components/gcm_driver/crypto/encryption_header_parsers_unittest.cc
|
| index 5fe00ba696a7929e0f77a99d18a84b6ea5b7993f..c8a1e0bfd1f804f3056716dcf14904bf008f64ff 100644
|
| --- a/components/gcm_driver/crypto/encryption_header_parsers_unittest.cc
|
| +++ b/components/gcm_driver/crypto/encryption_header_parsers_unittest.cc
|
| @@ -129,27 +129,28 @@ TEST(EncryptionHeaderParsersTest, ParseInvalidEncryptionHeaders) {
|
| }
|
| }
|
|
|
| -TEST(EncryptionHeaderParsersTest, ParseValidEncryptionKeyHeaders) {
|
| +TEST(EncryptionHeaderParsersTest, ParseValidCryptoKeyHeaders) {
|
| struct {
|
| const char* const header;
|
| const char* const parsed_keyid;
|
| - const char* const parsed_key;
|
| + const char* const parsed_aesgcm128;
|
| const char* const parsed_dh;
|
| } expected_results[] = {
|
| - { "keyid=foo;key=c2l4dGVlbmNvb2xieXRlcw;dh=dHdlbHZlY29vbGJ5dGVz",
|
| + { "keyid=foo;aesgcm128=c2l4dGVlbmNvb2xieXRlcw;dh=dHdlbHZlY29vbGJ5dGVz",
|
| "foo", "sixteencoolbytes", "twelvecoolbytes" },
|
| - { "keyid=foo; key=c2l4dGVlbmNvb2xieXRlcw; dh=dHdlbHZlY29vbGJ5dGVz",
|
| + { "keyid=foo; aesgcm128=c2l4dGVlbmNvb2xieXRlcw; dh=dHdlbHZlY29vbGJ5dGVz",
|
| "foo", "sixteencoolbytes", "twelvecoolbytes" },
|
| - { "keyid = foo ; key = c2l4dGVlbmNvb2xieXRlcw ; dh = dHdlbHZlY29vbGJ5dGVz ",
|
| + { "keyid = foo ; aesgcm128 = c2l4dGVlbmNvb2xieXRlcw ; dh = dHdlbHZlY29vbGJ5"
|
| + "dGVz ",
|
| "foo", "sixteencoolbytes", "twelvecoolbytes" },
|
| - { "KEYID=foo;KEY=c2l4dGVlbmNvb2xieXRlcw;DH=dHdlbHZlY29vbGJ5dGVz",
|
| + { "KEYID=foo;AESGCM128=c2l4dGVlbmNvb2xieXRlcw;DH=dHdlbHZlY29vbGJ5dGVz",
|
| "foo", "sixteencoolbytes", "twelvecoolbytes" },
|
| { "keyid=foo", "foo", "", "" },
|
| - { "key=c2l4dGVlbmNvb2xieXRlcw", "", "sixteencoolbytes", "" },
|
| - { "key=\"c2l4dGVlbmNvb2xieXRlcw\"", "", "sixteencoolbytes", "" },
|
| - { "key='c2l4dGVlbmNvb2xieXRlcw'", "", "sixteencoolbytes", "" },
|
| + { "aesgcm128=c2l4dGVlbmNvb2xieXRlcw", "", "sixteencoolbytes", "" },
|
| + { "aesgcm128=\"c2l4dGVlbmNvb2xieXRlcw\"", "", "sixteencoolbytes", "" },
|
| + { "aesgcm128='c2l4dGVlbmNvb2xieXRlcw'", "", "sixteencoolbytes", "" },
|
| { "dh=dHdlbHZlY29vbGJ5dGVz", "", "", "twelvecoolbytes" },
|
| - { "keyid=foo;someothervalue=bar;key=dHdlbHZlY29vbGJ5dGVz",
|
| + { "keyid=foo;someothervalue=bar;aesgcm128=dHdlbHZlY29vbGJ5dGVz",
|
| "foo", "twelvecoolbytes", "" },
|
| { "keyid=foo;keyid=bar", "bar", "", "" },
|
| };
|
| @@ -157,38 +158,38 @@ TEST(EncryptionHeaderParsersTest, ParseValidEncryptionKeyHeaders) {
|
| for (size_t i = 0; i < arraysize(expected_results); i++) {
|
| SCOPED_TRACE(i);
|
|
|
| - std::vector<EncryptionKeyHeaderValues> values;
|
| - ASSERT_TRUE(ParseEncryptionKeyHeader(expected_results[i].header, &values));
|
| + std::vector<CryptoKeyHeaderValues> values;
|
| + ASSERT_TRUE(ParseCryptoKeyHeader(expected_results[i].header, &values));
|
| ASSERT_EQ(1u, values.size());
|
|
|
| EXPECT_EQ(expected_results[i].parsed_keyid, values[0].keyid);
|
| - EXPECT_EQ(expected_results[i].parsed_key, values[0].key);
|
| + EXPECT_EQ(expected_results[i].parsed_aesgcm128, values[0].aesgcm128);
|
| EXPECT_EQ(expected_results[i].parsed_dh, values[0].dh);
|
| }
|
| }
|
|
|
| -TEST(EncryptionHeaderParsersTest, ParseValidMultiValueEncryptionKeyHeaders) {
|
| +TEST(EncryptionHeaderParsersTest, ParseValidMultiValueCryptoKeyHeaders) {
|
| const size_t kNumberOfValues = 2u;
|
|
|
| struct {
|
| const char* const header;
|
| struct {
|
| const char* const keyid;
|
| - const char* const key;
|
| + const char* const aesgcm128;
|
| const char* const dh;
|
| } parsed_values[kNumberOfValues];
|
| } expected_results[] = {
|
| - { "keyid=foo;key=c2l4dGVlbmNvb2xieXRlcw;dh=dHdlbHZlY29vbGJ5dGVz,keyid=bar;"
|
| - "key=dHdlbHZlY29vbGJ5dGVz;dh=c2l4dGVlbmNvb2xieXRlcw",
|
| + { "keyid=foo;aesgcm128=c2l4dGVlbmNvb2xieXRlcw;dh=dHdlbHZlY29vbGJ5dGVz,"
|
| + "keyid=bar;aesgcm128=dHdlbHZlY29vbGJ5dGVz;dh=c2l4dGVlbmNvb2xieXRlcw",
|
| { { "foo", "sixteencoolbytes", "twelvecoolbytes" },
|
| { "bar", "twelvecoolbytes", "sixteencoolbytes" } } },
|
| - { "keyid=foo,key=c2l4dGVlbmNvb2xieXRlcw",
|
| + { "keyid=foo,aesgcm128=c2l4dGVlbmNvb2xieXRlcw",
|
| { { "foo", "", "" },
|
| { "", "sixteencoolbytes", "" } } },
|
| { "keyid=foo,keyid=bar;dh=dHdlbHZlY29vbGJ5dGVz",
|
| { { "foo", "", "" },
|
| { "bar", "", "twelvecoolbytes" } } },
|
| - { "keyid=\"foo,keyid=bar\",key=c2l4dGVlbmNvb2xieXRlcw",
|
| + { "keyid=\"foo,keyid=bar\",aesgcm128=c2l4dGVlbmNvb2xieXRlcw",
|
| { { "foo,keyid=bar", "", "" },
|
| { "", "sixteencoolbytes", "" } } },
|
| };
|
| @@ -196,28 +197,29 @@ TEST(EncryptionHeaderParsersTest, ParseValidMultiValueEncryptionKeyHeaders) {
|
| for (size_t i = 0; i < arraysize(expected_results); i++) {
|
| SCOPED_TRACE(i);
|
|
|
| - std::vector<EncryptionKeyHeaderValues> values;
|
| - ASSERT_TRUE(ParseEncryptionKeyHeader(expected_results[i].header, &values));
|
| + std::vector<CryptoKeyHeaderValues> values;
|
| + ASSERT_TRUE(ParseCryptoKeyHeader(expected_results[i].header, &values));
|
| ASSERT_EQ(kNumberOfValues, values.size());
|
|
|
| for (size_t j = 0; j < kNumberOfValues; ++j) {
|
| EXPECT_EQ(expected_results[i].parsed_values[j].keyid, values[j].keyid);
|
| - EXPECT_EQ(expected_results[i].parsed_values[j].key, values[j].key);
|
| + EXPECT_EQ(expected_results[i].parsed_values[j].aesgcm128,
|
| + values[j].aesgcm128);
|
| EXPECT_EQ(expected_results[i].parsed_values[j].dh, values[j].dh);
|
| }
|
| }
|
| }
|
|
|
| -TEST(EncryptionHeaderParsersTest, ParseInvalidEncryptionKeyHeaders) {
|
| +TEST(EncryptionHeaderParsersTest, ParseInvalidCryptoKeyHeaders) {
|
| const char* const expected_failures[] = {
|
| "keyid",
|
| "keyid=",
|
| "keyid=foo,keyid",
|
| "keyid=foo;novaluekey",
|
| - "key",
|
| - "key=",
|
| - "key=123$xyz",
|
| - "key=foobar,key=123$xyz",
|
| + "aesgcm128",
|
| + "aesgcm128=",
|
| + "aesgcm128=123$xyz",
|
| + "aesgcm128=foobar,aesgcm128=123$xyz",
|
| "dh",
|
| "dh=",
|
| "dh=YmV/2ZXJ-sMDA",
|
| @@ -228,8 +230,8 @@ TEST(EncryptionHeaderParsersTest, ParseInvalidEncryptionKeyHeaders) {
|
| for (size_t i = 0; i < arraysize(expected_failures); i++) {
|
| SCOPED_TRACE(i);
|
|
|
| - std::vector<EncryptionKeyHeaderValues> values;
|
| - EXPECT_FALSE(ParseEncryptionKeyHeader(expected_failures[i], &values));
|
| + std::vector<CryptoKeyHeaderValues> values;
|
| + EXPECT_FALSE(ParseCryptoKeyHeader(expected_failures[i], &values));
|
| EXPECT_EQ(0u, values.size());
|
| }
|
| }
|
| @@ -240,11 +242,11 @@ TEST(EncryptionHeaderParsersTest, SixValueHeader) {
|
| std::vector<EncryptionHeaderValues> encryption_values;
|
| ASSERT_TRUE(ParseEncryptionHeader(header, &encryption_values));
|
|
|
| - std::vector<EncryptionKeyHeaderValues> encryption_key_values;
|
| - ASSERT_TRUE(ParseEncryptionKeyHeader(header, &encryption_key_values));
|
| + std::vector<CryptoKeyHeaderValues> crypto_key_values;
|
| + ASSERT_TRUE(ParseCryptoKeyHeader(header, &crypto_key_values));
|
|
|
| ASSERT_EQ(6u, encryption_values.size());
|
| - ASSERT_EQ(6u, encryption_key_values.size());
|
| + ASSERT_EQ(6u, crypto_key_values.size());
|
|
|
| for (size_t i = 0; i < encryption_values.size(); i++) {
|
| SCOPED_TRACE(i);
|
| @@ -252,7 +254,7 @@ TEST(EncryptionHeaderParsersTest, SixValueHeader) {
|
| const std::string value = base::IntToString(i);
|
|
|
| EXPECT_EQ(value, encryption_values[i].keyid);
|
| - EXPECT_EQ(value, encryption_key_values[i].keyid);
|
| + EXPECT_EQ(value, crypto_key_values[i].keyid);
|
| }
|
| }
|
|
|
| @@ -272,20 +274,20 @@ TEST(EncryptionHeaderParsersTest, InvalidHeadersDoNotModifyOutput) {
|
| EXPECT_EQ("somesalt", encryption_values[0].salt);
|
| EXPECT_EQ(42u, encryption_values[0].rs);
|
|
|
| - EncryptionKeyHeaderValues encryption_key_value;
|
| - encryption_key_value.keyid = "myotherkeyid";
|
| - encryption_key_value.key = "akey";
|
| - encryption_key_value.dh = "yourdh";
|
| + CryptoKeyHeaderValues crypto_key_value;
|
| + crypto_key_value.keyid = "myotherkeyid";
|
| + crypto_key_value.aesgcm128 = "akey";
|
| + crypto_key_value.dh = "yourdh";
|
|
|
| - std::vector<EncryptionKeyHeaderValues> encryption_key_values;
|
| - encryption_key_values.push_back(encryption_key_value);
|
| + std::vector<CryptoKeyHeaderValues> crypto_key_values;
|
| + crypto_key_values.push_back(crypto_key_value);
|
|
|
| - ASSERT_FALSE(ParseEncryptionKeyHeader("key=$$$", &encryption_key_values));
|
| - ASSERT_EQ(1u, encryption_key_values.size());
|
| + ASSERT_FALSE(ParseCryptoKeyHeader("aesgcm128=$$$", &crypto_key_values));
|
| + ASSERT_EQ(1u, crypto_key_values.size());
|
|
|
| - EXPECT_EQ("myotherkeyid", encryption_key_values[0].keyid);
|
| - EXPECT_EQ("akey", encryption_key_values[0].key);
|
| - EXPECT_EQ("yourdh", encryption_key_values[0].dh);
|
| + EXPECT_EQ("myotherkeyid", crypto_key_values[0].keyid);
|
| + EXPECT_EQ("akey", crypto_key_values[0].aesgcm128);
|
| + EXPECT_EQ("yourdh", crypto_key_values[0].dh);
|
| }
|
|
|
| } // namespace
|
|
|