| Index: src/platform/cryptohome/username_passkey_unittest.cc
|
| diff --git a/src/platform/cryptohome/username_passhash_unittest.cc b/src/platform/cryptohome/username_passkey_unittest.cc
|
| similarity index 53%
|
| rename from src/platform/cryptohome/username_passhash_unittest.cc
|
| rename to src/platform/cryptohome/username_passkey_unittest.cc
|
| index a3586738576e42dd3208770ddeb91126b45a6806..9d406496e83888a43dd76c8b06afe9642a22a2bd 100644
|
| --- a/src/platform/cryptohome/username_passhash_unittest.cc
|
| +++ b/src/platform/cryptohome/username_passkey_unittest.cc
|
| @@ -2,9 +2,9 @@
|
| // Use of this source code is governed by a BSD-style license that can be
|
| // found in the LICENSE file.
|
|
|
| -// Unit tests for UsernamePasshash.
|
| +// Unit tests for UsernamePasskey.
|
|
|
| -#include "cryptohome/username_passhash.h"
|
| +#include "cryptohome/username_passkey.h"
|
|
|
| #include <gtest/gtest.h>
|
| #include <string.h> // For memset(), memcpy()
|
| @@ -16,36 +16,36 @@ namespace cryptohome {
|
| using namespace chromeos;
|
|
|
| const char kFakeUser[] = "fakeuser";
|
| -const char kFakeHash[] = "176c1e698b521373d77ce655d2e56a1d";
|
| +const char kFakePasskey[] = "176c1e698b521373d77ce655d2e56a1d";
|
|
|
| // salt must have even number of characters.
|
| const char kFakeSystemSalt[] = "01234567890123456789";
|
|
|
| -class UsernamePasshashTest : public ::testing::Test { };
|
| +class UsernamePasskeyTest : public ::testing::Test { };
|
|
|
| -TEST(UsernamePasshashTest, GetFullUsernameTest) {
|
| +TEST(UsernamePasskeyTest, GetFullUsernameTest) {
|
| char username[80];
|
| snprintf(username, sizeof(username), "%s%s", kFakeUser, "@gmail.com");
|
| - UsernamePasshash up(username, strlen(username),
|
| - kFakeHash, strlen(kFakeHash));
|
| + UsernamePasskey up(username, strlen(username),
|
| + kFakePasskey, strlen(kFakePasskey));
|
| char full_username[80];
|
| up.GetFullUsername(full_username, sizeof(full_username));
|
| EXPECT_EQ(0, strcmp(username, full_username));
|
| }
|
|
|
| -TEST(UsernamePasshashTest, GetPartialUsernameTest) {
|
| +TEST(UsernamePasskeyTest, GetPartialUsernameTest) {
|
| char username[80];
|
| snprintf(username, sizeof(username), "%s%s", kFakeUser, "@gmail.com");
|
| - UsernamePasshash up(username, strlen(username),
|
| - kFakeHash, strlen(kFakeHash));
|
| + UsernamePasskey up(username, strlen(username),
|
| + kFakePasskey, strlen(kFakePasskey));
|
| char partial_username[80];
|
| up.GetPartialUsername(partial_username, sizeof(partial_username));
|
| EXPECT_EQ(0, strcmp(kFakeUser, partial_username));
|
| }
|
|
|
| -TEST(UsernamePasshashTest, GetObfuscatedUsernameTest) {
|
| - UsernamePasshash up(kFakeUser, strlen(kFakeUser),
|
| - kFakeHash, strlen(kFakeHash));
|
| +TEST(UsernamePasskeyTest, GetObfuscatedUsernameTest) {
|
| + UsernamePasskey up(kFakeUser, strlen(kFakeUser),
|
| + kFakePasskey, strlen(kFakePasskey));
|
|
|
| Blob fake_salt(AsciiDecode(kFakeSystemSalt));
|
|
|
| @@ -53,13 +53,12 @@ TEST(UsernamePasshashTest, GetObfuscatedUsernameTest) {
|
| up.GetObfuscatedUsername(fake_salt));
|
| }
|
|
|
| -TEST(UsernamePasshashTest, GetPasshashWeakHashTest) {
|
| - UsernamePasshash up(kFakeUser, strlen(kFakeUser),
|
| - kFakeHash, strlen(kFakeHash));
|
| -
|
| - Blob fake_salt(AsciiDecode(kFakeSystemSalt));
|
| -
|
| - EXPECT_EQ(kFakeHash, up.GetPasswordWeakHash(fake_salt));
|
| +TEST(UsernamePasskeyTest, GetPasskeyTest) {
|
| + UsernamePasskey up(kFakeUser, strlen(kFakeUser),
|
| + kFakePasskey, strlen(kFakePasskey));
|
| + Blob passkey = up.GetPasskey();
|
| + EXPECT_EQ(strlen(kFakePasskey), passkey.size());
|
| + EXPECT_EQ(0, memcmp(kFakePasskey, &passkey[0], passkey.size()));
|
| }
|
|
|
| -} // namespace cryptohome
|
| +} // cryptohome
|
|
|