OLD | NEW |
1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "net/quic/crypto/channel_id.h" | 5 #include "net/quic/crypto/channel_id.h" |
6 | 6 |
7 #include "net/quic/test_tools/crypto_test_utils.h" | 7 #include "net/quic/test_tools/crypto_test_utils.h" |
8 #include "net/quic/test_tools/quic_test_utils.h" | 8 #include "net/quic/test_tools/quic_test_utils.h" |
9 #include "testing/gtest/include/gtest/gtest.h" | 9 #include "testing/gtest/include/gtest/gtest.h" |
10 | 10 |
(...skipping 178 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
189 } // namespace | 189 } // namespace |
190 | 190 |
191 // A known answer test for ChannelIDVerifier. | 191 // A known answer test for ChannelIDVerifier. |
192 TEST(ChannelIDTest, VerifyKnownAnswerTest) { | 192 TEST(ChannelIDTest, VerifyKnownAnswerTest) { |
193 string msg; | 193 string msg; |
194 string qx; | 194 string qx; |
195 string qy; | 195 string qy; |
196 string r; | 196 string r; |
197 string s; | 197 string s; |
198 | 198 |
199 for (size_t i = 0; test_vector[i].msg != NULL; i++) { | 199 for (size_t i = 0; test_vector[i].msg != nullptr; i++) { |
200 SCOPED_TRACE(i); | 200 SCOPED_TRACE(i); |
201 // Decode the test vector. | 201 // Decode the test vector. |
202 ASSERT_TRUE(DecodeHexString(test_vector[i].msg, &msg)); | 202 ASSERT_TRUE(DecodeHexString(test_vector[i].msg, &msg)); |
203 ASSERT_TRUE(DecodeHexString(test_vector[i].qx, &qx)); | 203 ASSERT_TRUE(DecodeHexString(test_vector[i].qx, &qx)); |
204 ASSERT_TRUE(DecodeHexString(test_vector[i].qy, &qy)); | 204 ASSERT_TRUE(DecodeHexString(test_vector[i].qy, &qy)); |
205 ASSERT_TRUE(DecodeHexString(test_vector[i].r, &r)); | 205 ASSERT_TRUE(DecodeHexString(test_vector[i].r, &r)); |
206 ASSERT_TRUE(DecodeHexString(test_vector[i].s, &s)); | 206 ASSERT_TRUE(DecodeHexString(test_vector[i].s, &s)); |
207 | 207 |
208 string key = qx + qy; | 208 string key = qx + qy; |
209 string signature = r + s; | 209 string signature = r + s; |
(...skipping 10 matching lines...) Expand all Loading... |
220 } | 220 } |
221 | 221 |
222 TEST(ChannelIDTest, SignAndVerify) { | 222 TEST(ChannelIDTest, SignAndVerify) { |
223 scoped_ptr<ChannelIDSource> source( | 223 scoped_ptr<ChannelIDSource> source( |
224 CryptoTestUtils::ChannelIDSourceForTesting()); | 224 CryptoTestUtils::ChannelIDSourceForTesting()); |
225 | 225 |
226 const string signed_data = "signed data"; | 226 const string signed_data = "signed data"; |
227 const string hostname = "foo.example.com"; | 227 const string hostname = "foo.example.com"; |
228 scoped_ptr<ChannelIDKey> channel_id_key; | 228 scoped_ptr<ChannelIDKey> channel_id_key; |
229 QuicAsyncStatus status = | 229 QuicAsyncStatus status = |
230 source->GetChannelIDKey(hostname, &channel_id_key, NULL); | 230 source->GetChannelIDKey(hostname, &channel_id_key, nullptr); |
231 ASSERT_EQ(QUIC_SUCCESS, status); | 231 ASSERT_EQ(QUIC_SUCCESS, status); |
232 | 232 |
233 string signature; | 233 string signature; |
234 ASSERT_TRUE(channel_id_key->Sign(signed_data, &signature)); | 234 ASSERT_TRUE(channel_id_key->Sign(signed_data, &signature)); |
235 | 235 |
236 string key = channel_id_key->SerializeKey(); | 236 string key = channel_id_key->SerializeKey(); |
237 EXPECT_TRUE(ChannelIDVerifier::Verify(key, signed_data, signature)); | 237 EXPECT_TRUE(ChannelIDVerifier::Verify(key, signed_data, signature)); |
238 | 238 |
239 EXPECT_FALSE(ChannelIDVerifier::Verify("a" + key, signed_data, signature)); | 239 EXPECT_FALSE(ChannelIDVerifier::Verify("a" + key, signed_data, signature)); |
240 EXPECT_FALSE(ChannelIDVerifier::Verify(key, "a" + signed_data, signature)); | 240 EXPECT_FALSE(ChannelIDVerifier::Verify(key, "a" + signed_data, signature)); |
241 | 241 |
242 scoped_ptr<char[]> bad_key(new char[key.size()]); | 242 scoped_ptr<char[]> bad_key(new char[key.size()]); |
243 memcpy(bad_key.get(), key.data(), key.size()); | 243 memcpy(bad_key.get(), key.data(), key.size()); |
244 bad_key[1] ^= 0x80; | 244 bad_key[1] ^= 0x80; |
245 EXPECT_FALSE(ChannelIDVerifier::Verify( | 245 EXPECT_FALSE(ChannelIDVerifier::Verify( |
246 string(bad_key.get(), key.size()), signed_data, signature)); | 246 string(bad_key.get(), key.size()), signed_data, signature)); |
247 | 247 |
248 scoped_ptr<char[]> bad_signature(new char[signature.size()]); | 248 scoped_ptr<char[]> bad_signature(new char[signature.size()]); |
249 memcpy(bad_signature.get(), signature.data(), signature.size()); | 249 memcpy(bad_signature.get(), signature.data(), signature.size()); |
250 bad_signature[1] ^= 0x80; | 250 bad_signature[1] ^= 0x80; |
251 EXPECT_FALSE(ChannelIDVerifier::Verify( | 251 EXPECT_FALSE(ChannelIDVerifier::Verify( |
252 key, signed_data, string(bad_signature.get(), signature.size()))); | 252 key, signed_data, string(bad_signature.get(), signature.size()))); |
253 | 253 |
254 EXPECT_FALSE(ChannelIDVerifier::Verify( | 254 EXPECT_FALSE(ChannelIDVerifier::Verify( |
255 key, "wrong signed data", signature)); | 255 key, "wrong signed data", signature)); |
256 } | 256 } |
257 | 257 |
258 } // namespace test | 258 } // namespace test |
259 } // namespace net | 259 } // namespace net |
OLD | NEW |