OLD | NEW |
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "crypto/symmetric_key.h" | 5 #include "crypto/symmetric_key.h" |
6 | 6 |
7 #include <string> | 7 #include <string> |
8 | 8 |
9 #include "base/memory/scoped_ptr.h" | 9 #include "base/memory/scoped_ptr.h" |
10 #include "base/strings/string_number_conversions.h" | 10 #include "base/strings/string_number_conversions.h" |
(...skipping 82 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
93 crypto::SymmetricKey::DeriveKeyFromPassword( | 93 crypto::SymmetricKey::DeriveKeyFromPassword( |
94 test_data.algorithm, | 94 test_data.algorithm, |
95 test_data.password, test_data.salt, | 95 test_data.password, test_data.salt, |
96 test_data.rounds, test_data.key_size_in_bits)); | 96 test_data.rounds, test_data.key_size_in_bits)); |
97 ASSERT_TRUE(NULL != key.get()); | 97 ASSERT_TRUE(NULL != key.get()); |
98 | 98 |
99 std::string raw_key; | 99 std::string raw_key; |
100 key->GetRawKey(&raw_key); | 100 key->GetRawKey(&raw_key); |
101 EXPECT_EQ(test_data.key_size_in_bits / 8, raw_key.size()); | 101 EXPECT_EQ(test_data.key_size_in_bits / 8, raw_key.size()); |
102 EXPECT_EQ(test_data.expected, | 102 EXPECT_EQ(test_data.expected, |
103 StringToLowerASCII(base::HexEncode(raw_key.data(), | 103 base::StringToLowerASCII(base::HexEncode(raw_key.data(), |
104 raw_key.size()))); | 104 raw_key.size()))); |
105 } | 105 } |
106 | 106 |
107 static const PBKDF2TestVector kTestVectors[] = { | 107 static const PBKDF2TestVector kTestVectors[] = { |
108 // These tests come from | 108 // These tests come from |
109 // http://www.ietf.org/id/draft-josefsson-pbkdf2-test-vectors-00.txt | 109 // http://www.ietf.org/id/draft-josefsson-pbkdf2-test-vectors-00.txt |
110 { | 110 { |
111 crypto::SymmetricKey::HMAC_SHA1, | 111 crypto::SymmetricKey::HMAC_SHA1, |
112 "password", | 112 "password", |
113 "salt", | 113 "salt", |
(...skipping 102 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
216 "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX", | 216 "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX", |
217 "pass phrase exceeds block size", | 217 "pass phrase exceeds block size", |
218 20, | 218 20, |
219 256, | 219 256, |
220 "e0739745dc28b8721ba402e05214d2ac1eab54cf72bee1fba388297a09eb493c", | 220 "e0739745dc28b8721ba402e05214d2ac1eab54cf72bee1fba388297a09eb493c", |
221 }, | 221 }, |
222 }; | 222 }; |
223 | 223 |
224 INSTANTIATE_TEST_CASE_P(, SymmetricKeyDeriveKeyFromPasswordTest, | 224 INSTANTIATE_TEST_CASE_P(, SymmetricKeyDeriveKeyFromPasswordTest, |
225 testing::ValuesIn(kTestVectors)); | 225 testing::ValuesIn(kTestVectors)); |
OLD | NEW |