| OLD | NEW |
| 1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include <algorithm> | 5 #include <algorithm> |
| 6 #include <string> | 6 #include <string> |
| 7 #include <vector> | 7 #include <vector> |
| 8 | 8 |
| 9 #include "base/basictypes.h" | 9 #include "base/basictypes.h" |
| 10 #include "base/file_util.h" | 10 #include "base/file_util.h" |
| (...skipping 3268 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 3279 const std::vector<uint8_t> test_additional_data = | 3279 const std::vector<uint8_t> test_additional_data = |
| 3280 GetBytesFromHexString(test, "additional_data"); | 3280 GetBytesFromHexString(test, "additional_data"); |
| 3281 const std::vector<uint8_t> test_plain_text = | 3281 const std::vector<uint8_t> test_plain_text = |
| 3282 GetBytesFromHexString(test, "plain_text"); | 3282 GetBytesFromHexString(test, "plain_text"); |
| 3283 const std::vector<uint8_t> test_authentication_tag = | 3283 const std::vector<uint8_t> test_authentication_tag = |
| 3284 GetBytesFromHexString(test, "authentication_tag"); | 3284 GetBytesFromHexString(test, "authentication_tag"); |
| 3285 const unsigned int test_tag_size_bits = test_authentication_tag.size() * 8; | 3285 const unsigned int test_tag_size_bits = test_authentication_tag.size() * 8; |
| 3286 const std::vector<uint8_t> test_cipher_text = | 3286 const std::vector<uint8_t> test_cipher_text = |
| 3287 GetBytesFromHexString(test, "cipher_text"); | 3287 GetBytesFromHexString(test, "cipher_text"); |
| 3288 | 3288 |
| 3289 #if defined(USE_OPENSSL) | |
| 3290 // TODO(eroman): Add support for 256-bit keys. | |
| 3291 if (test_key.size() == 32) { | |
| 3292 LOG(WARNING) | |
| 3293 << "OpenSSL doesn't support 256-bit keys for AES-GCM; skipping"; | |
| 3294 continue; | |
| 3295 } | |
| 3296 #endif | |
| 3297 | |
| 3298 blink::WebCryptoKey key = ImportSecretKeyFromRaw( | 3289 blink::WebCryptoKey key = ImportSecretKeyFromRaw( |
| 3299 test_key, | 3290 test_key, |
| 3300 CreateAlgorithm(blink::WebCryptoAlgorithmIdAesGcm), | 3291 CreateAlgorithm(blink::WebCryptoAlgorithmIdAesGcm), |
| 3301 blink::WebCryptoKeyUsageEncrypt | blink::WebCryptoKeyUsageDecrypt); | 3292 blink::WebCryptoKeyUsageEncrypt | blink::WebCryptoKeyUsageDecrypt); |
| 3302 | 3293 |
| 3303 // Verify exported raw key is identical to the imported data | 3294 // Verify exported raw key is identical to the imported data |
| 3304 std::vector<uint8_t> raw_key; | 3295 std::vector<uint8_t> raw_key; |
| 3305 EXPECT_EQ(Status::Success(), | 3296 EXPECT_EQ(Status::Success(), |
| 3306 ExportKey(blink::WebCryptoKeyFormatRaw, key, &raw_key)); | 3297 ExportKey(blink::WebCryptoKeyFormatRaw, key, &raw_key)); |
| 3307 | 3298 |
| (...skipping 1111 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 4419 EXPECT_EQ(public_key_spki, unwrapped_public_key_spki); | 4410 EXPECT_EQ(public_key_spki, unwrapped_public_key_spki); |
| 4420 EXPECT_EQ(private_key_pkcs8, unwrapped_private_key_pkcs8); | 4411 EXPECT_EQ(private_key_pkcs8, unwrapped_private_key_pkcs8); |
| 4421 | 4412 |
| 4422 EXPECT_NE(public_key_spki, wrapped_public_key); | 4413 EXPECT_NE(public_key_spki, wrapped_public_key); |
| 4423 EXPECT_NE(private_key_pkcs8, wrapped_private_key); | 4414 EXPECT_NE(private_key_pkcs8, wrapped_private_key); |
| 4424 } | 4415 } |
| 4425 | 4416 |
| 4426 } // namespace webcrypto | 4417 } // namespace webcrypto |
| 4427 | 4418 |
| 4428 } // namespace content | 4419 } // namespace content |
| OLD | NEW |