OLD | NEW |
1 // Copyright 2015 The Chromium Authors. All rights reserved. | 1 // Copyright 2015 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "components/cryptauth/foreground_eid_generator.h" | 5 #include "components/cryptauth/foreground_eid_generator.h" |
6 | 6 |
7 #include <memory> | 7 #include <memory> |
8 | 8 |
9 #include "base/logging.h" | 9 #include "base/logging.h" |
10 #include "base/memory/ptr_util.h" | 10 #include "base/memory/ptr_util.h" |
(...skipping 341 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
352 data->adjacent_data->start_timestamp_ms); | 352 data->adjacent_data->start_timestamp_ms); |
353 EXPECT_EQ(kDefaultCurrentPeriodStart, data->adjacent_data->end_timestamp_ms); | 353 EXPECT_EQ(kDefaultCurrentPeriodStart, data->adjacent_data->end_timestamp_ms); |
354 // Since this uses the real RawEidGenerator, just make sure the data | 354 // Since this uses the real RawEidGenerator, just make sure the data |
355 // exists and has the proper length. | 355 // exists and has the proper length. |
356 EXPECT_EQ((size_t)kNumBytesInEidValue, data->adjacent_data->data.length()); | 356 EXPECT_EQ((size_t)kNumBytesInEidValue, data->adjacent_data->data.length()); |
357 } | 357 } |
358 | 358 |
359 TEST_F(CryptAuthForegroundEidGeneratorTest, GenerateAdvertisementData) { | 359 TEST_F(CryptAuthForegroundEidGeneratorTest, GenerateAdvertisementData) { |
360 SetTestTime(kDefaultCurrentTime); | 360 SetTestTime(kDefaultCurrentTime); |
361 | 361 |
362 std::unique_ptr<ForegroundEidGenerator::DataWithTimestamp> data = | 362 std::unique_ptr<DataWithTimestamp> data = |
363 eid_generator_->GenerateAdvertisement(kDefaultAdvertisingDevicePublicKey, | 363 eid_generator_->GenerateAdvertisement(kDefaultAdvertisingDevicePublicKey, |
364 scanning_device_beacon_seeds_); | 364 scanning_device_beacon_seeds_); |
365 ASSERT_TRUE(data); | 365 ASSERT_TRUE(data); |
366 | 366 |
367 EXPECT_EQ(kDefaultCurrentPeriodStart, data->start_timestamp_ms); | 367 EXPECT_EQ(kDefaultCurrentPeriodStart, data->start_timestamp_ms); |
368 EXPECT_EQ(kDefaultCurrentPeriodStart + kNumMsInEidPeriod, | 368 EXPECT_EQ(kDefaultCurrentPeriodStart + kNumMsInEidPeriod, |
369 data->end_timestamp_ms); | 369 data->end_timestamp_ms); |
370 EXPECT_EQ(GenerateFakeAdvertisement(kSecondSeed, kDefaultCurrentPeriodStart, | 370 EXPECT_EQ(GenerateFakeAdvertisement(kSecondSeed, kDefaultCurrentPeriodStart, |
371 kDefaultAdvertisingDevicePublicKey), | 371 kDefaultAdvertisingDevicePublicKey), |
372 data->data); | 372 data->data); |
373 } | 373 } |
374 | 374 |
375 TEST_F(CryptAuthForegroundEidGeneratorTest, | 375 TEST_F(CryptAuthForegroundEidGeneratorTest, |
376 GenerateAdvertisementData_NoSeedForPeriod) { | 376 GenerateAdvertisementData_NoSeedForPeriod) { |
377 SetTestTime(kDefaultCurrentTime + 4 * kNumMsInEidSeedPeriod); | 377 SetTestTime(kDefaultCurrentTime + 4 * kNumMsInEidSeedPeriod); |
378 | 378 |
379 std::unique_ptr<ForegroundEidGenerator::DataWithTimestamp> data = | 379 std::unique_ptr<DataWithTimestamp> data = |
380 eid_generator_->GenerateAdvertisement(kDefaultAdvertisingDevicePublicKey, | 380 eid_generator_->GenerateAdvertisement(kDefaultAdvertisingDevicePublicKey, |
381 scanning_device_beacon_seeds_); | 381 scanning_device_beacon_seeds_); |
382 EXPECT_FALSE(data); | 382 EXPECT_FALSE(data); |
383 } | 383 } |
384 | 384 |
385 TEST_F(CryptAuthForegroundEidGeneratorTest, | 385 TEST_F(CryptAuthForegroundEidGeneratorTest, |
386 GenerateAdvertisementData_EmptySeeds) { | 386 GenerateAdvertisementData_EmptySeeds) { |
387 SetTestTime(kDefaultCurrentTime + 4 * kNumMsInEidSeedPeriod); | 387 SetTestTime(kDefaultCurrentTime + 4 * kNumMsInEidSeedPeriod); |
388 | 388 |
389 std::vector<BeaconSeed> empty; | 389 std::vector<BeaconSeed> empty; |
390 std::unique_ptr<ForegroundEidGenerator::DataWithTimestamp> data = | 390 std::unique_ptr<DataWithTimestamp> data = |
391 eid_generator_->GenerateAdvertisement(kDefaultAdvertisingDevicePublicKey, | 391 eid_generator_->GenerateAdvertisement(kDefaultAdvertisingDevicePublicKey, |
392 empty); | 392 empty); |
393 EXPECT_FALSE(data); | 393 EXPECT_FALSE(data); |
394 } | 394 } |
395 | 395 |
396 TEST_F(CryptAuthForegroundEidGeneratorTest, | 396 TEST_F(CryptAuthForegroundEidGeneratorTest, |
397 GeneratePossibleAdvertisements_CurrentAndPastAdjacentPeriods) { | 397 GeneratePossibleAdvertisements_CurrentAndPastAdjacentPeriods) { |
398 SetTestTime(kDefaultCurrentPeriodStart); | 398 SetTestTime(kDefaultCurrentPeriodStart); |
399 | 399 |
400 std::vector<std::string> possible_advertisements = | 400 std::vector<std::string> possible_advertisements = |
(...skipping 229 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
630 | 630 |
631 RemoteDevice wrong_device = CreateRemoteDevice("wrongPublicKey"); | 631 RemoteDevice wrong_device = CreateRemoteDevice("wrongPublicKey"); |
632 std::vector<RemoteDevice> device_list = {wrong_device, wrong_device}; | 632 std::vector<RemoteDevice> device_list = {wrong_device, wrong_device}; |
633 const RemoteDevice* identified_device = | 633 const RemoteDevice* identified_device = |
634 eid_generator_->IdentifyRemoteDeviceByAdvertisement( | 634 eid_generator_->IdentifyRemoteDeviceByAdvertisement( |
635 service_data, device_list, scanning_device_beacon_seeds_); | 635 service_data, device_list, scanning_device_beacon_seeds_); |
636 EXPECT_FALSE(identified_device); | 636 EXPECT_FALSE(identified_device); |
637 } | 637 } |
638 | 638 |
639 TEST_F(CryptAuthForegroundEidGeneratorTest, DataWithTimestamp_ContainsTime) { | 639 TEST_F(CryptAuthForegroundEidGeneratorTest, DataWithTimestamp_ContainsTime) { |
640 ForegroundEidGenerator::DataWithTimestamp data_with_timestamp( | 640 DataWithTimestamp data_with_timestamp("data", /* start */ 1000L, |
641 "data", /* start */ 1000L, /* end */ 2000L); | 641 /* end */ 2000L); |
642 EXPECT_FALSE(data_with_timestamp.ContainsTime(999L)); | 642 EXPECT_FALSE(data_with_timestamp.ContainsTime(999L)); |
643 EXPECT_TRUE(data_with_timestamp.ContainsTime(1000L)); | 643 EXPECT_TRUE(data_with_timestamp.ContainsTime(1000L)); |
644 EXPECT_TRUE(data_with_timestamp.ContainsTime(1500L)); | 644 EXPECT_TRUE(data_with_timestamp.ContainsTime(1500L)); |
645 EXPECT_TRUE(data_with_timestamp.ContainsTime(1999L)); | 645 EXPECT_TRUE(data_with_timestamp.ContainsTime(1999L)); |
646 EXPECT_FALSE(data_with_timestamp.ContainsTime(2000L)); | 646 EXPECT_FALSE(data_with_timestamp.ContainsTime(2000L)); |
647 } | 647 } |
648 | 648 |
649 } // namespace cryptauth | 649 } // namespace cryptauth |
OLD | NEW |