Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(2143)

Unified Diff: net/quic/crypto/crypto_utils_test.cc

Issue 423333002: Implement QUIC key extraction. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Pass a size_t constant as a size_t argument. Created 6 years, 5 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: net/quic/crypto/crypto_utils_test.cc
diff --git a/net/quic/crypto/crypto_utils_test.cc b/net/quic/crypto/crypto_utils_test.cc
index 17eb19250eeb76eac53e0f394911aec61722d4e2..37ac583314a927fdb62412fe9a2ea6ddd9b88a2c 100644
--- a/net/quic/crypto/crypto_utils_test.cc
+++ b/net/quic/crypto/crypto_utils_test.cc
@@ -4,6 +4,7 @@
#include "net/quic/crypto/crypto_utils.h"
+#include "net/quic/test_tools/quic_test_utils.h"
#include "testing/gtest/include/gtest/gtest.h"
namespace net {
@@ -44,6 +45,87 @@ TEST(CryptoUtilsTest, NormalizeHostname) {
}
}
+TEST(CryptoUtilsTest, TestExportKeyingMaterial) {
+ const struct TestVector {
+ // Input (strings of hexadecimal digits):
+ const char* subkey_secret;
+ const char* label;
+ const char* context;
+ size_t result_len;
+
+ // Expected output (string of hexadecimal digits):
+ const char* expected; // Null if it should fail.
+ } test_vector[] = {
+ // Try a typical input
+ { "4823c1189ecc40fce888fbb4cf9ae6254f19ba12e6d9af54788f195a6f509ca3",
+ "e934f78d7a71dd85420fceeb8cea0317",
+ "b8d766b5d3c8aba0009c7ed3de553eba53b4de1030ea91383dcdf724cd8b7217",
+ 32,
+ "a9979da0d5f1c1387d7cbe68f5c4163ddb445a03c4ad6ee72cb49d56726d679e"
+ },
+ // Don't let the label contain nulls
+ { "14fe51e082ffee7d1b4d8d4ab41f8c55",
+ "3132333435363700",
+ "58585858585858585858585858585858",
+ 16,
+ NULL
+ },
+ // Make sure nulls in the context are fine
+ { "d862c2e36b0a42f7827c67ebc8d44df7",
+ "7a5b95e4e8378123",
+ "4142434445464700",
+ 16,
+ "12d418c6d0738a2e4d85b2d0170f76e1"
+ },
+ // ... and give a different result than without
+ { "d862c2e36b0a42f7827c67ebc8d44df7",
+ "7a5b95e4e8378123",
+ "41424344454647",
+ 16,
+ "abfa1c479a6e3ffb98a11dee7d196408"
+ },
+ // Try weird lengths
+ { "d0ec8a34f6cc9a8c96",
+ "49711798cc6251",
+ "933d4a2f30d22f089cfba842791116adc121e0",
+ 23,
+ "c9a46ed0757bd1812f1f21b4d41e62125fec8364a21db7"
+ },
+ };
+
+ for (size_t i = 0; i < arraysize(test_vector); i++) {
+ // Decode the test vector.
+ string subkey_secret;
+ string label;
+ string context;
+ ASSERT_TRUE(DecodeHexString(test_vector[i].subkey_secret, &subkey_secret));
+ ASSERT_TRUE(DecodeHexString(test_vector[i].label, &label));
+ ASSERT_TRUE(DecodeHexString(test_vector[i].context, &context));
+ size_t result_len = test_vector[i].result_len;
+ bool expect_ok = test_vector[i].expected != NULL;
+ string expected;
+ if (expect_ok) {
+ ASSERT_TRUE(DecodeHexString(test_vector[i].expected, &expected));
+ }
+
+ string result;
+ bool ok = CryptoUtils::ExportKeyingMaterial(subkey_secret,
+ label,
+ context,
+ result_len,
+ &result);
+ EXPECT_EQ(expect_ok, ok);
+ if (expect_ok) {
+ EXPECT_EQ(result_len, result.length());
+ test::CompareCharArraysWithHexError("HKDF output",
+ result.data(),
+ result.length(),
+ expected.data(),
+ expected.length());
+ }
+ }
+}
+
} // namespace
} // namespace test
} // namespace net

Powered by Google App Engine
This is Rietveld 408576698