| OLD | NEW |
| 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "crypto/symmetric_key.h" | 5 #include "crypto/symmetric_key.h" |
| 6 | 6 |
| 7 #include <memory> | 7 #include <memory> |
| 8 #include <string> | 8 #include <string> |
| 9 | 9 |
| 10 #include "base/strings/string_number_conversions.h" | 10 #include "base/strings/string_number_conversions.h" |
| 11 #include "base/strings/string_util.h" | 11 #include "base/strings/string_util.h" |
| 12 #include "testing/gtest/include/gtest/gtest.h" | 12 #include "testing/gtest/include/gtest/gtest.h" |
| 13 | 13 |
| 14 TEST(SymmetricKeyTest, GenerateRandomKey) { | 14 TEST(SymmetricKeyTest, GenerateRandomKey) { |
| 15 std::unique_ptr<crypto::SymmetricKey> key( | 15 std::unique_ptr<crypto::SymmetricKey> key( |
| 16 crypto::SymmetricKey::GenerateRandomKey(crypto::SymmetricKey::AES, 256)); | 16 crypto::SymmetricKey::GenerateRandomKey(crypto::SymmetricKey::AES, 256)); |
| 17 ASSERT_TRUE(NULL != key.get()); | 17 ASSERT_TRUE(key); |
| 18 std::string raw_key; | 18 std::string raw_key; |
| 19 EXPECT_TRUE(key->GetRawKey(&raw_key)); | 19 EXPECT_TRUE(key->GetRawKey(&raw_key)); |
| 20 EXPECT_EQ(32U, raw_key.size()); | 20 EXPECT_EQ(32U, raw_key.size()); |
| 21 | 21 |
| 22 // Do it again and check that the keys are different. | 22 // Do it again and check that the keys are different. |
| 23 // (Note: this has a one-in-10^77 chance of failure!) | 23 // (Note: this has a one-in-10^77 chance of failure!) |
| 24 std::unique_ptr<crypto::SymmetricKey> key2( | 24 std::unique_ptr<crypto::SymmetricKey> key2( |
| 25 crypto::SymmetricKey::GenerateRandomKey(crypto::SymmetricKey::AES, 256)); | 25 crypto::SymmetricKey::GenerateRandomKey(crypto::SymmetricKey::AES, 256)); |
| 26 ASSERT_TRUE(NULL != key2.get()); | 26 ASSERT_TRUE(key2); |
| 27 std::string raw_key2; | 27 std::string raw_key2; |
| 28 EXPECT_TRUE(key2->GetRawKey(&raw_key2)); | 28 EXPECT_TRUE(key2->GetRawKey(&raw_key2)); |
| 29 EXPECT_EQ(32U, raw_key2.size()); | 29 EXPECT_EQ(32U, raw_key2.size()); |
| 30 EXPECT_NE(raw_key, raw_key2); | 30 EXPECT_NE(raw_key, raw_key2); |
| 31 } | 31 } |
| 32 | 32 |
| 33 TEST(SymmetricKeyTest, ImportGeneratedKey) { | 33 TEST(SymmetricKeyTest, ImportGeneratedKey) { |
| 34 std::unique_ptr<crypto::SymmetricKey> key1( | 34 std::unique_ptr<crypto::SymmetricKey> key1( |
| 35 crypto::SymmetricKey::GenerateRandomKey(crypto::SymmetricKey::AES, 256)); | 35 crypto::SymmetricKey::GenerateRandomKey(crypto::SymmetricKey::AES, 256)); |
| 36 ASSERT_TRUE(NULL != key1.get()); | 36 ASSERT_TRUE(key1); |
| 37 std::string raw_key1; | 37 std::string raw_key1; |
| 38 EXPECT_TRUE(key1->GetRawKey(&raw_key1)); | 38 EXPECT_TRUE(key1->GetRawKey(&raw_key1)); |
| 39 | 39 |
| 40 std::unique_ptr<crypto::SymmetricKey> key2( | 40 std::unique_ptr<crypto::SymmetricKey> key2( |
| 41 crypto::SymmetricKey::Import(crypto::SymmetricKey::AES, raw_key1)); | 41 crypto::SymmetricKey::Import(crypto::SymmetricKey::AES, raw_key1)); |
| 42 ASSERT_TRUE(NULL != key2.get()); | 42 ASSERT_TRUE(key2); |
| 43 | 43 |
| 44 std::string raw_key2; | 44 std::string raw_key2; |
| 45 EXPECT_TRUE(key2->GetRawKey(&raw_key2)); | 45 EXPECT_TRUE(key2->GetRawKey(&raw_key2)); |
| 46 | 46 |
| 47 EXPECT_EQ(raw_key1, raw_key2); | 47 EXPECT_EQ(raw_key1, raw_key2); |
| 48 } | 48 } |
| 49 | 49 |
| 50 TEST(SymmetricKeyTest, ImportDerivedKey) { | 50 TEST(SymmetricKeyTest, ImportDerivedKey) { |
| 51 std::unique_ptr<crypto::SymmetricKey> key1( | 51 std::unique_ptr<crypto::SymmetricKey> key1( |
| 52 crypto::SymmetricKey::DeriveKeyFromPassword( | 52 crypto::SymmetricKey::DeriveKeyFromPassword( |
| 53 crypto::SymmetricKey::HMAC_SHA1, "password", "somesalt", 1024, 160)); | 53 crypto::SymmetricKey::HMAC_SHA1, "password", "somesalt", 1024, 160)); |
| 54 ASSERT_TRUE(NULL != key1.get()); | 54 ASSERT_TRUE(key1); |
| 55 std::string raw_key1; | 55 std::string raw_key1; |
| 56 EXPECT_TRUE(key1->GetRawKey(&raw_key1)); | 56 EXPECT_TRUE(key1->GetRawKey(&raw_key1)); |
| 57 | 57 |
| 58 std::unique_ptr<crypto::SymmetricKey> key2( | 58 std::unique_ptr<crypto::SymmetricKey> key2( |
| 59 crypto::SymmetricKey::Import(crypto::SymmetricKey::HMAC_SHA1, raw_key1)); | 59 crypto::SymmetricKey::Import(crypto::SymmetricKey::HMAC_SHA1, raw_key1)); |
| 60 ASSERT_TRUE(NULL != key2.get()); | 60 ASSERT_TRUE(key2); |
| 61 | 61 |
| 62 std::string raw_key2; | 62 std::string raw_key2; |
| 63 EXPECT_TRUE(key2->GetRawKey(&raw_key2)); | 63 EXPECT_TRUE(key2->GetRawKey(&raw_key2)); |
| 64 | 64 |
| 65 EXPECT_EQ(raw_key1, raw_key2); | 65 EXPECT_EQ(raw_key1, raw_key2); |
| 66 } | 66 } |
| 67 | 67 |
| 68 struct PBKDF2TestVector { | 68 struct PBKDF2TestVector { |
| 69 crypto::SymmetricKey::Algorithm algorithm; | 69 crypto::SymmetricKey::Algorithm algorithm; |
| 70 const char* password; | 70 const char* password; |
| 71 const char* salt; | 71 const char* salt; |
| 72 unsigned int rounds; | 72 unsigned int rounds; |
| 73 unsigned int key_size_in_bits; | 73 unsigned int key_size_in_bits; |
| 74 const char* expected; // ASCII encoded hex bytes | 74 const char* expected; // ASCII encoded hex bytes |
| 75 }; | 75 }; |
| 76 | 76 |
| 77 class SymmetricKeyDeriveKeyFromPasswordTest | 77 class SymmetricKeyDeriveKeyFromPasswordTest |
| 78 : public testing::TestWithParam<PBKDF2TestVector> { | 78 : public testing::TestWithParam<PBKDF2TestVector> { |
| 79 }; | 79 }; |
| 80 | 80 |
| 81 TEST_P(SymmetricKeyDeriveKeyFromPasswordTest, DeriveKeyFromPassword) { | 81 TEST_P(SymmetricKeyDeriveKeyFromPasswordTest, DeriveKeyFromPassword) { |
| 82 PBKDF2TestVector test_data(GetParam()); | 82 PBKDF2TestVector test_data(GetParam()); |
| 83 std::unique_ptr<crypto::SymmetricKey> key( | 83 std::unique_ptr<crypto::SymmetricKey> key( |
| 84 crypto::SymmetricKey::DeriveKeyFromPassword( | 84 crypto::SymmetricKey::DeriveKeyFromPassword( |
| 85 test_data.algorithm, test_data.password, test_data.salt, | 85 test_data.algorithm, test_data.password, test_data.salt, |
| 86 test_data.rounds, test_data.key_size_in_bits)); | 86 test_data.rounds, test_data.key_size_in_bits)); |
| 87 ASSERT_TRUE(NULL != key.get()); | 87 ASSERT_TRUE(key); |
| 88 | 88 |
| 89 std::string raw_key; | 89 std::string raw_key; |
| 90 key->GetRawKey(&raw_key); | 90 key->GetRawKey(&raw_key); |
| 91 EXPECT_EQ(test_data.key_size_in_bits / 8, raw_key.size()); | 91 EXPECT_EQ(test_data.key_size_in_bits / 8, raw_key.size()); |
| 92 EXPECT_EQ(test_data.expected, | 92 EXPECT_EQ(test_data.expected, |
| 93 base::ToLowerASCII(base::HexEncode(raw_key.data(), | 93 base::ToLowerASCII(base::HexEncode(raw_key.data(), |
| 94 raw_key.size()))); | 94 raw_key.size()))); |
| 95 } | 95 } |
| 96 | 96 |
| 97 static const PBKDF2TestVector kTestVectors[] = { | 97 static const PBKDF2TestVector kTestVectors[] = { |
| (...skipping 108 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 206 "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX", | 206 "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX", |
| 207 "pass phrase exceeds block size", | 207 "pass phrase exceeds block size", |
| 208 20, | 208 20, |
| 209 256, | 209 256, |
| 210 "e0739745dc28b8721ba402e05214d2ac1eab54cf72bee1fba388297a09eb493c", | 210 "e0739745dc28b8721ba402e05214d2ac1eab54cf72bee1fba388297a09eb493c", |
| 211 }, | 211 }, |
| 212 }; | 212 }; |
| 213 | 213 |
| 214 INSTANTIATE_TEST_CASE_P(, SymmetricKeyDeriveKeyFromPasswordTest, | 214 INSTANTIATE_TEST_CASE_P(, SymmetricKeyDeriveKeyFromPasswordTest, |
| 215 testing::ValuesIn(kTestVectors)); | 215 testing::ValuesIn(kTestVectors)); |
| OLD | NEW |