Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(113)

Side by Side Diff: crypto/secure_hash_unittest.cc

Issue 1841863002: Update monet. (Closed) Base URL: https://github.com/domokit/monet.git@master
Patch Set: Created 4 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « crypto/secure_hash_openssl.cc ('k') | crypto/secure_util.h » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
(Empty)
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 #include "crypto/secure_hash.h"
6
7 #include <string>
8
9 #include "base/basictypes.h"
10 #include "base/memory/scoped_ptr.h"
11 #include "base/pickle.h"
12 #include "crypto/sha2.h"
13 #include "testing/gtest/include/gtest/gtest.h"
14
15 TEST(SecureHashTest, TestUpdate) {
16 // Example B.3 from FIPS 180-2: long message.
17 std::string input3(500000, 'a'); // 'a' repeated half a million times
18 int expected3[] = { 0xcd, 0xc7, 0x6e, 0x5c,
19 0x99, 0x14, 0xfb, 0x92,
20 0x81, 0xa1, 0xc7, 0xe2,
21 0x84, 0xd7, 0x3e, 0x67,
22 0xf1, 0x80, 0x9a, 0x48,
23 0xa4, 0x97, 0x20, 0x0e,
24 0x04, 0x6d, 0x39, 0xcc,
25 0xc7, 0x11, 0x2c, 0xd0 };
26
27 uint8 output3[crypto::kSHA256Length];
28
29 scoped_ptr<crypto::SecureHash> ctx(crypto::SecureHash::Create(
30 crypto::SecureHash::SHA256));
31 ctx->Update(input3.data(), input3.size());
32 ctx->Update(input3.data(), input3.size());
33
34 ctx->Finish(output3, sizeof(output3));
35 for (size_t i = 0; i < crypto::kSHA256Length; i++)
36 EXPECT_EQ(expected3[i], static_cast<int>(output3[i]));
37 }
38
39 // Save the crypto state mid-stream, and create another instance with the
40 // saved state. Then feed the same data afterwards to both.
41 // When done, both should have the same hash value.
42 TEST(SecureHashTest, TestSerialization) {
43 std::string input1(10001, 'a'); // 'a' repeated 10001 times
44 std::string input2(10001, 'b'); // 'b' repeated 10001 times
45 std::string input3(10001, 'c'); // 'c' repeated 10001 times
46 std::string input4(10001, 'd'); // 'd' repeated 10001 times
47 std::string input5(10001, 'e'); // 'e' repeated 10001 times
48
49 uint8 output1[crypto::kSHA256Length];
50 uint8 output2[crypto::kSHA256Length];
51
52 scoped_ptr<crypto::SecureHash> ctx1(crypto::SecureHash::Create(
53 crypto::SecureHash::SHA256));
54 scoped_ptr<crypto::SecureHash> ctx2(crypto::SecureHash::Create(
55 crypto::SecureHash::SHA256));
56 base::Pickle pickle;
57 ctx1->Update(input1.data(), input1.size());
58 ctx1->Update(input2.data(), input2.size());
59 ctx1->Update(input3.data(), input3.size());
60
61 EXPECT_TRUE(ctx1->Serialize(&pickle));
62 ctx1->Update(input4.data(), input4.size());
63 ctx1->Update(input5.data(), input5.size());
64
65 ctx1->Finish(output1, sizeof(output1));
66
67 base::PickleIterator data_iterator(pickle);
68 EXPECT_TRUE(ctx2->Deserialize(&data_iterator));
69 ctx2->Update(input4.data(), input4.size());
70 ctx2->Update(input5.data(), input5.size());
71
72 ctx2->Finish(output2, sizeof(output2));
73
74 EXPECT_EQ(0, memcmp(output1, output2, crypto::kSHA256Length));
75 }
OLDNEW
« no previous file with comments | « crypto/secure_hash_openssl.cc ('k') | crypto/secure_util.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698