| Index: content/renderer/webcrypto/webcrypto_impl_unittest.cc
|
| diff --git a/content/renderer/webcrypto/webcrypto_impl_unittest.cc b/content/renderer/webcrypto/webcrypto_impl_unittest.cc
|
| index cacdd7f53e3b6f05563599f64150884f8f801966..e0d215ec87e7336e1f514cacbb525cab7e68dc34 100644
|
| --- a/content/renderer/webcrypto/webcrypto_impl_unittest.cc
|
| +++ b/content/renderer/webcrypto/webcrypto_impl_unittest.cc
|
| @@ -28,31 +28,31 @@ std::vector<uint8> HexStringToBytes(const std::string& hex) {
|
| }
|
|
|
| void ExpectArrayBufferMatchesHex(const std::string& expected_hex,
|
| - const WebKit::WebArrayBuffer& array_buffer) {
|
| + const blink::WebArrayBuffer& array_buffer) {
|
| EXPECT_STRCASEEQ(
|
| expected_hex.c_str(),
|
| base::HexEncode(
|
| array_buffer.data(), array_buffer.byteLength()).c_str());
|
| }
|
|
|
| -WebKit::WebCryptoAlgorithm CreateAlgorithm(WebKit::WebCryptoAlgorithmId id) {
|
| - return WebKit::WebCryptoAlgorithm::adoptParamsAndCreate(id, NULL);
|
| +blink::WebCryptoAlgorithm CreateAlgorithm(blink::WebCryptoAlgorithmId id) {
|
| + return blink::WebCryptoAlgorithm::adoptParamsAndCreate(id, NULL);
|
| }
|
|
|
| -WebKit::WebCryptoAlgorithm CreateHmacAlgorithm(
|
| - WebKit::WebCryptoAlgorithmId hashId) {
|
| - return WebKit::WebCryptoAlgorithm::adoptParamsAndCreate(
|
| - WebKit::WebCryptoAlgorithmIdHmac,
|
| - new WebKit::WebCryptoHmacParams(CreateAlgorithm(hashId)));
|
| +blink::WebCryptoAlgorithm CreateHmacAlgorithm(
|
| + blink::WebCryptoAlgorithmId hashId) {
|
| + return blink::WebCryptoAlgorithm::adoptParamsAndCreate(
|
| + blink::WebCryptoAlgorithmIdHmac,
|
| + new blink::WebCryptoHmacParams(CreateAlgorithm(hashId)));
|
| }
|
|
|
| -WebKit::WebCryptoAlgorithm CreateHmacKeyAlgorithm(
|
| - WebKit::WebCryptoAlgorithmId hashId,
|
| +blink::WebCryptoAlgorithm CreateHmacKeyAlgorithm(
|
| + blink::WebCryptoAlgorithmId hashId,
|
| unsigned hash_length) {
|
| // hash_length < 0 means unspecified
|
| - return WebKit::WebCryptoAlgorithm::adoptParamsAndCreate(
|
| - WebKit::WebCryptoAlgorithmIdHmac,
|
| - new WebKit::WebCryptoHmacKeyParams(CreateAlgorithm(hashId),
|
| + return blink::WebCryptoAlgorithm::adoptParamsAndCreate(
|
| + blink::WebCryptoAlgorithmIdHmac,
|
| + new blink::WebCryptoHmacKeyParams(CreateAlgorithm(hashId),
|
| (hash_length != 0),
|
| hash_length));
|
| }
|
| @@ -66,30 +66,30 @@ const uint8* Start(const std::vector<uint8>& data) {
|
| return &data[0];
|
| }
|
|
|
| -WebKit::WebCryptoAlgorithm CreateAesCbcAlgorithm(
|
| +blink::WebCryptoAlgorithm CreateAesCbcAlgorithm(
|
| const std::vector<uint8>& iv) {
|
| - return WebKit::WebCryptoAlgorithm::adoptParamsAndCreate(
|
| - WebKit::WebCryptoAlgorithmIdAesCbc,
|
| - new WebKit::WebCryptoAesCbcParams(Start(iv), iv.size()));
|
| + return blink::WebCryptoAlgorithm::adoptParamsAndCreate(
|
| + blink::WebCryptoAlgorithmIdAesCbc,
|
| + new blink::WebCryptoAesCbcParams(Start(iv), iv.size()));
|
| }
|
|
|
| -WebKit::WebCryptoAlgorithm CreateAesCbcAlgorithm(
|
| +blink::WebCryptoAlgorithm CreateAesCbcAlgorithm(
|
| unsigned short key_length_bits) { // NOLINT
|
| - return WebKit::WebCryptoAlgorithm::adoptParamsAndCreate(
|
| - WebKit::WebCryptoAlgorithmIdAesCbc,
|
| - new WebKit::WebCryptoAesKeyGenParams(key_length_bits));
|
| + return blink::WebCryptoAlgorithm::adoptParamsAndCreate(
|
| + blink::WebCryptoAlgorithmIdAesCbc,
|
| + new blink::WebCryptoAesKeyGenParams(key_length_bits));
|
| }
|
|
|
| -WebKit::WebCryptoAlgorithm CreateRsaAlgorithm(
|
| - WebKit::WebCryptoAlgorithmId algorithm_id,
|
| +blink::WebCryptoAlgorithm CreateRsaAlgorithm(
|
| + blink::WebCryptoAlgorithmId algorithm_id,
|
| unsigned modulus_length,
|
| const std::vector<uint8>& public_exponent) {
|
| - DCHECK(algorithm_id == WebKit::WebCryptoAlgorithmIdRsaEsPkcs1v1_5 ||
|
| - algorithm_id == WebKit::WebCryptoAlgorithmIdRsaSsaPkcs1v1_5 ||
|
| - algorithm_id == WebKit::WebCryptoAlgorithmIdRsaOaep);
|
| - return WebKit::WebCryptoAlgorithm::adoptParamsAndCreate(
|
| + DCHECK(algorithm_id == blink::WebCryptoAlgorithmIdRsaEsPkcs1v1_5 ||
|
| + algorithm_id == blink::WebCryptoAlgorithmIdRsaSsaPkcs1v1_5 ||
|
| + algorithm_id == blink::WebCryptoAlgorithmIdRsaOaep);
|
| + return blink::WebCryptoAlgorithm::adoptParamsAndCreate(
|
| algorithm_id,
|
| - new WebKit::WebCryptoRsaKeyGenParams(
|
| + new blink::WebCryptoRsaKeyGenParams(
|
| modulus_length, Start(public_exponent), public_exponent.size()));
|
| }
|
|
|
| @@ -99,15 +99,15 @@ namespace content {
|
|
|
| class WebCryptoImplTest : public testing::Test {
|
| protected:
|
| - WebKit::WebCryptoKey ImportSecretKeyFromRawHexString(
|
| + blink::WebCryptoKey ImportSecretKeyFromRawHexString(
|
| const std::string& key_hex,
|
| - const WebKit::WebCryptoAlgorithm& algorithm,
|
| - WebKit::WebCryptoKeyUsageMask usage) {
|
| + const blink::WebCryptoAlgorithm& algorithm,
|
| + blink::WebCryptoKeyUsageMask usage) {
|
| std::vector<uint8> key_raw = HexStringToBytes(key_hex);
|
|
|
| - WebKit::WebCryptoKey key = WebKit::WebCryptoKey::createNull();
|
| + blink::WebCryptoKey key = blink::WebCryptoKey::createNull();
|
| bool extractable = true;
|
| - EXPECT_TRUE(crypto_.ImportKeyInternal(WebKit::WebCryptoKeyFormatRaw,
|
| + EXPECT_TRUE(crypto_.ImportKeyInternal(blink::WebCryptoKeyFormatRaw,
|
| Start(key_raw),
|
| key_raw.size(),
|
| algorithm,
|
| @@ -115,7 +115,7 @@ class WebCryptoImplTest : public testing::Test {
|
| usage,
|
| &key));
|
|
|
| - EXPECT_EQ(WebKit::WebCryptoKeyTypeSecret, key.type());
|
| + EXPECT_EQ(blink::WebCryptoKeyTypeSecret, key.type());
|
| EXPECT_FALSE(key.isNull());
|
| EXPECT_TRUE(key.handle());
|
| return key;
|
| @@ -125,36 +125,36 @@ class WebCryptoImplTest : public testing::Test {
|
| // WebCryptoImpl.
|
|
|
| bool DigestInternal(
|
| - const WebKit::WebCryptoAlgorithm& algorithm,
|
| + const blink::WebCryptoAlgorithm& algorithm,
|
| const std::vector<uint8>& data,
|
| - WebKit::WebArrayBuffer* buffer) {
|
| + blink::WebArrayBuffer* buffer) {
|
| return crypto_.DigestInternal(algorithm, Start(data), data.size(), buffer);
|
| }
|
|
|
| bool GenerateKeyInternal(
|
| - const WebKit::WebCryptoAlgorithm& algorithm,
|
| - WebKit::WebCryptoKey* key) {
|
| + const blink::WebCryptoAlgorithm& algorithm,
|
| + blink::WebCryptoKey* key) {
|
| bool extractable = true;
|
| - WebKit::WebCryptoKeyUsageMask usage_mask = 0;
|
| + blink::WebCryptoKeyUsageMask usage_mask = 0;
|
| return crypto_.GenerateKeyInternal(algorithm, extractable, usage_mask, key);
|
| }
|
|
|
| bool GenerateKeyPairInternal(
|
| - const WebKit::WebCryptoAlgorithm& algorithm,
|
| + const blink::WebCryptoAlgorithm& algorithm,
|
| bool extractable,
|
| - WebKit::WebCryptoKeyUsageMask usage_mask,
|
| - WebKit::WebCryptoKey* public_key,
|
| - WebKit::WebCryptoKey* private_key) {
|
| + blink::WebCryptoKeyUsageMask usage_mask,
|
| + blink::WebCryptoKey* public_key,
|
| + blink::WebCryptoKey* private_key) {
|
| return crypto_.GenerateKeyPairInternal(
|
| algorithm, extractable, usage_mask, public_key, private_key);
|
| }
|
|
|
| bool ImportKeyInternal(
|
| - WebKit::WebCryptoKeyFormat format,
|
| + blink::WebCryptoKeyFormat format,
|
| const std::vector<uint8>& key_data,
|
| - const WebKit::WebCryptoAlgorithm& algorithm,
|
| - WebKit::WebCryptoKeyUsageMask usage_mask,
|
| - WebKit::WebCryptoKey* key) {
|
| + const blink::WebCryptoAlgorithm& algorithm,
|
| + blink::WebCryptoKeyUsageMask usage_mask,
|
| + blink::WebCryptoKey* key) {
|
| bool extractable = true;
|
| return crypto_.ImportKeyInternal(format,
|
| Start(key_data),
|
| @@ -166,17 +166,17 @@ class WebCryptoImplTest : public testing::Test {
|
| }
|
|
|
| bool SignInternal(
|
| - const WebKit::WebCryptoAlgorithm& algorithm,
|
| - const WebKit::WebCryptoKey& key,
|
| + const blink::WebCryptoAlgorithm& algorithm,
|
| + const blink::WebCryptoKey& key,
|
| const std::vector<uint8>& data,
|
| - WebKit::WebArrayBuffer* buffer) {
|
| + blink::WebArrayBuffer* buffer) {
|
| return crypto_.SignInternal(
|
| algorithm, key, Start(data), data.size(), buffer);
|
| }
|
|
|
| bool VerifySignatureInternal(
|
| - const WebKit::WebCryptoAlgorithm& algorithm,
|
| - const WebKit::WebCryptoKey& key,
|
| + const blink::WebCryptoAlgorithm& algorithm,
|
| + const blink::WebCryptoKey& key,
|
| const unsigned char* signature,
|
| unsigned signature_size,
|
| const std::vector<uint8>& data,
|
| @@ -191,37 +191,37 @@ class WebCryptoImplTest : public testing::Test {
|
| }
|
|
|
| bool EncryptInternal(
|
| - const WebKit::WebCryptoAlgorithm& algorithm,
|
| - const WebKit::WebCryptoKey& key,
|
| + const blink::WebCryptoAlgorithm& algorithm,
|
| + const blink::WebCryptoKey& key,
|
| const unsigned char* data,
|
| unsigned data_size,
|
| - WebKit::WebArrayBuffer* buffer) {
|
| + blink::WebArrayBuffer* buffer) {
|
| return crypto_.EncryptInternal(algorithm, key, data, data_size, buffer);
|
| }
|
|
|
| bool EncryptInternal(
|
| - const WebKit::WebCryptoAlgorithm& algorithm,
|
| - const WebKit::WebCryptoKey& key,
|
| + const blink::WebCryptoAlgorithm& algorithm,
|
| + const blink::WebCryptoKey& key,
|
| const std::vector<uint8>& data,
|
| - WebKit::WebArrayBuffer* buffer) {
|
| + blink::WebArrayBuffer* buffer) {
|
| return crypto_.EncryptInternal(
|
| algorithm, key, Start(data), data.size(), buffer);
|
| }
|
|
|
| bool DecryptInternal(
|
| - const WebKit::WebCryptoAlgorithm& algorithm,
|
| - const WebKit::WebCryptoKey& key,
|
| + const blink::WebCryptoAlgorithm& algorithm,
|
| + const blink::WebCryptoKey& key,
|
| const unsigned char* data,
|
| unsigned data_size,
|
| - WebKit::WebArrayBuffer* buffer) {
|
| + blink::WebArrayBuffer* buffer) {
|
| return crypto_.DecryptInternal(algorithm, key, data, data_size, buffer);
|
| }
|
|
|
| bool DecryptInternal(
|
| - const WebKit::WebCryptoAlgorithm& algorithm,
|
| - const WebKit::WebCryptoKey& key,
|
| + const blink::WebCryptoAlgorithm& algorithm,
|
| + const blink::WebCryptoKey& key,
|
| const std::vector<uint8>& data,
|
| - WebKit::WebArrayBuffer* buffer) {
|
| + blink::WebArrayBuffer* buffer) {
|
| return crypto_.DecryptInternal(
|
| algorithm, key, Start(data), data.size(), buffer);
|
| }
|
| @@ -238,60 +238,60 @@ TEST_F(WebCryptoImplTest, DigestSampleSets) {
|
| //
|
| // Results were generated using the command sha{1,224,256,384,512}sum.
|
| struct TestCase {
|
| - WebKit::WebCryptoAlgorithmId algorithm;
|
| + blink::WebCryptoAlgorithmId algorithm;
|
| const std::string hex_input;
|
| const char* hex_result;
|
| };
|
|
|
| const TestCase kTests[] = {
|
| - { WebKit::WebCryptoAlgorithmIdSha1, "",
|
| + { blink::WebCryptoAlgorithmIdSha1, "",
|
| "da39a3ee5e6b4b0d3255bfef95601890afd80709"
|
| },
|
| - { WebKit::WebCryptoAlgorithmIdSha224, "",
|
| + { blink::WebCryptoAlgorithmIdSha224, "",
|
| "d14a028c2a3a2bc9476102bb288234c415a2b01f828ea62ac5b3e42f"
|
| },
|
| - { WebKit::WebCryptoAlgorithmIdSha256, "",
|
| + { blink::WebCryptoAlgorithmIdSha256, "",
|
| "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855"
|
| },
|
| - { WebKit::WebCryptoAlgorithmIdSha384, "",
|
| + { blink::WebCryptoAlgorithmIdSha384, "",
|
| "38b060a751ac96384cd9327eb1b1e36a21fdb71114be07434c0cc7bf63f6e1da274e"
|
| "debfe76f65fbd51ad2f14898b95b"
|
| },
|
| - { WebKit::WebCryptoAlgorithmIdSha512, "",
|
| + { blink::WebCryptoAlgorithmIdSha512, "",
|
| "cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0"
|
| "d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e",
|
| },
|
| - { WebKit::WebCryptoAlgorithmIdSha1, "00",
|
| + { blink::WebCryptoAlgorithmIdSha1, "00",
|
| "5ba93c9db0cff93f52b521d7420e43f6eda2784f",
|
| },
|
| - { WebKit::WebCryptoAlgorithmIdSha224, "00",
|
| + { blink::WebCryptoAlgorithmIdSha224, "00",
|
| "fff9292b4201617bdc4d3053fce02734166a683d7d858a7f5f59b073",
|
| },
|
| - { WebKit::WebCryptoAlgorithmIdSha256, "00",
|
| + { blink::WebCryptoAlgorithmIdSha256, "00",
|
| "6e340b9cffb37a989ca544e6bb780a2c78901d3fb33738768511a30617afa01d",
|
| },
|
| - { WebKit::WebCryptoAlgorithmIdSha384, "00",
|
| + { blink::WebCryptoAlgorithmIdSha384, "00",
|
| "bec021b4f368e3069134e012c2b4307083d3a9bdd206e24e5f0d86e13d6636655933"
|
| "ec2b413465966817a9c208a11717",
|
| },
|
| - { WebKit::WebCryptoAlgorithmIdSha512, "00",
|
| + { blink::WebCryptoAlgorithmIdSha512, "00",
|
| "b8244d028981d693af7b456af8efa4cad63d282e19ff14942c246e50d9351d22704a"
|
| "802a71c3580b6370de4ceb293c324a8423342557d4e5c38438f0e36910ee",
|
| },
|
| - { WebKit::WebCryptoAlgorithmIdSha1, "000102030405",
|
| + { blink::WebCryptoAlgorithmIdSha1, "000102030405",
|
| "868460d98d09d8bbb93d7b6cdd15cc7fbec676b9",
|
| },
|
| - { WebKit::WebCryptoAlgorithmIdSha224, "000102030405",
|
| + { blink::WebCryptoAlgorithmIdSha224, "000102030405",
|
| "7d92e7f1cad1818ed1d13ab41f04ebabfe1fef6bb4cbeebac34c29bc",
|
| },
|
| - { WebKit::WebCryptoAlgorithmIdSha256, "000102030405",
|
| + { blink::WebCryptoAlgorithmIdSha256, "000102030405",
|
| "17e88db187afd62c16e5debf3e6527cd006bc012bc90b51a810cd80c2d511f43",
|
| },
|
| - { WebKit::WebCryptoAlgorithmIdSha384, "000102030405",
|
| + { blink::WebCryptoAlgorithmIdSha384, "000102030405",
|
| "79f4738706fce9650ac60266675c3cd07298b09923850d525604d040e6e448adc7dc"
|
| "22780d7e1b95bfeaa86a678e4552",
|
| },
|
| - { WebKit::WebCryptoAlgorithmIdSha512, "000102030405",
|
| + { blink::WebCryptoAlgorithmIdSha512, "000102030405",
|
| "2f3831bccc94cf061bcfa5f8c23c1429d26e3bc6b76edad93d9025cb91c903af6cf9"
|
| "c935dc37193c04c2c66e7d9de17c358284418218afea2160147aaa912f4c",
|
| },
|
| @@ -302,10 +302,10 @@ TEST_F(WebCryptoImplTest, DigestSampleSets) {
|
| SCOPED_TRACE(test_index);
|
| const TestCase& test = kTests[test_index];
|
|
|
| - WebKit::WebCryptoAlgorithm algorithm = CreateAlgorithm(test.algorithm);
|
| + blink::WebCryptoAlgorithm algorithm = CreateAlgorithm(test.algorithm);
|
| std::vector<uint8> input = HexStringToBytes(test.hex_input);
|
|
|
| - WebKit::WebArrayBuffer output;
|
| + blink::WebArrayBuffer output;
|
| ASSERT_TRUE(DigestInternal(algorithm, input, &output));
|
| ExpectArrayBufferMatchesHex(test.hex_result, output);
|
| }
|
| @@ -313,7 +313,7 @@ TEST_F(WebCryptoImplTest, DigestSampleSets) {
|
|
|
| TEST_F(WebCryptoImplTest, HMACSampleSets) {
|
| struct TestCase {
|
| - WebKit::WebCryptoAlgorithmId algorithm;
|
| + blink::WebCryptoAlgorithmId algorithm;
|
| const char* key;
|
| const char* message;
|
| const char* mac;
|
| @@ -324,14 +324,14 @@ TEST_F(WebCryptoImplTest, HMACSampleSets) {
|
| // particular results are also posted on the Wikipedia page examples:
|
| // http://en.wikipedia.org/wiki/Hash-based_message_authentication_code
|
| {
|
| - WebKit::WebCryptoAlgorithmIdSha1,
|
| + blink::WebCryptoAlgorithmIdSha1,
|
| "",
|
| "",
|
| // openssl dgst -sha1 -hmac "" < /dev/null
|
| "fbdb1d1b18aa6c08324b7d64b71fb76370690e1d",
|
| },
|
| {
|
| - WebKit::WebCryptoAlgorithmIdSha256,
|
| + blink::WebCryptoAlgorithmIdSha256,
|
| "",
|
| "",
|
| // openssl dgst -sha256 -hmac "" < /dev/null
|
| @@ -342,7 +342,7 @@ TEST_F(WebCryptoImplTest, HMACSampleSets) {
|
| // http://csrc.nist.gov/groups/STM/cavp/documents/mac/hmactestvectors.zip
|
| // L=20 set 45
|
| {
|
| - WebKit::WebCryptoAlgorithmIdSha1,
|
| + blink::WebCryptoAlgorithmIdSha1,
|
| // key
|
| "59785928d72516e31272",
|
| // message
|
| @@ -355,7 +355,7 @@ TEST_F(WebCryptoImplTest, HMACSampleSets) {
|
| },
|
| // L=20 set 299
|
| {
|
| - WebKit::WebCryptoAlgorithmIdSha1,
|
| + blink::WebCryptoAlgorithmIdSha1,
|
| // key
|
| "ceb9aedf8d6efcf0ae52bea0fa99a9e26ae81bacea0cff4d5eecf201e3bca3c3577480"
|
| "621b818fd717ba99d6ff958ea3d59b2527b019c343bb199e648090225867d994607962"
|
| @@ -370,7 +370,7 @@ TEST_F(WebCryptoImplTest, HMACSampleSets) {
|
| },
|
| // L=32, set 30
|
| {
|
| - WebKit::WebCryptoAlgorithmIdSha256,
|
| + blink::WebCryptoAlgorithmIdSha256,
|
| // key
|
| "9779d9120642797f1747025d5b22b7ac607cab08e1758f2f3a46c8be1e25c53b8c6a8f"
|
| "58ffefa176",
|
| @@ -384,7 +384,7 @@ TEST_F(WebCryptoImplTest, HMACSampleSets) {
|
| },
|
| // L=32, set 224
|
| {
|
| - WebKit::WebCryptoAlgorithmIdSha256,
|
| + blink::WebCryptoAlgorithmIdSha256,
|
| // key
|
| "4b7ab133efe99e02fc89a28409ee187d579e774f4cba6fc223e13504e3511bef8d4f63"
|
| "8b9aca55d4a43b8fbd64cf9d74dcc8c9e8d52034898c70264ea911a3fd70813fa73b08"
|
| @@ -404,14 +404,14 @@ TEST_F(WebCryptoImplTest, HMACSampleSets) {
|
| SCOPED_TRACE(test_index);
|
| const TestCase& test = kTests[test_index];
|
|
|
| - WebKit::WebCryptoAlgorithm algorithm = CreateHmacAlgorithm(test.algorithm);
|
| + blink::WebCryptoAlgorithm algorithm = CreateHmacAlgorithm(test.algorithm);
|
|
|
| - WebKit::WebCryptoKey key = ImportSecretKeyFromRawHexString(
|
| - test.key, algorithm, WebKit::WebCryptoKeyUsageSign);
|
| + blink::WebCryptoKey key = ImportSecretKeyFromRawHexString(
|
| + test.key, algorithm, blink::WebCryptoKeyUsageSign);
|
|
|
| std::vector<uint8> message_raw = HexStringToBytes(test.message);
|
|
|
| - WebKit::WebArrayBuffer output;
|
| + blink::WebArrayBuffer output;
|
|
|
| ASSERT_TRUE(SignInternal(algorithm, key, message_raw, &output));
|
|
|
| @@ -451,12 +451,12 @@ TEST_F(WebCryptoImplTest, HMACSampleSets) {
|
| }
|
|
|
| TEST_F(WebCryptoImplTest, AesCbcFailures) {
|
| - WebKit::WebCryptoKey key = ImportSecretKeyFromRawHexString(
|
| + blink::WebCryptoKey key = ImportSecretKeyFromRawHexString(
|
| "2b7e151628aed2a6abf7158809cf4f3c",
|
| - CreateAlgorithm(WebKit::WebCryptoAlgorithmIdAesCbc),
|
| - WebKit::WebCryptoKeyUsageEncrypt | WebKit::WebCryptoKeyUsageDecrypt);
|
| + CreateAlgorithm(blink::WebCryptoAlgorithmIdAesCbc),
|
| + blink::WebCryptoKeyUsageEncrypt | blink::WebCryptoKeyUsageDecrypt);
|
|
|
| - WebKit::WebArrayBuffer output;
|
| + blink::WebArrayBuffer output;
|
|
|
| // Use an invalid |iv| (fewer than 16 bytes)
|
| {
|
| @@ -500,11 +500,11 @@ TEST_F(WebCryptoImplTest, AesCbcFailures) {
|
| std::vector<uint8> key_raw(1);
|
| std::vector<uint8> iv(16);
|
|
|
| - WebKit::WebCryptoKey key = WebKit::WebCryptoKey::createNull();
|
| - EXPECT_FALSE(ImportKeyInternal(WebKit::WebCryptoKeyFormatRaw,
|
| + blink::WebCryptoKey key = blink::WebCryptoKey::createNull();
|
| + EXPECT_FALSE(ImportKeyInternal(blink::WebCryptoKeyFormatRaw,
|
| key_raw,
|
| CreateAesCbcAlgorithm(iv),
|
| - WebKit::WebCryptoKeyUsageDecrypt,
|
| + blink::WebCryptoKeyUsageDecrypt,
|
| &key));
|
| }
|
| }
|
| @@ -591,15 +591,15 @@ TEST_F(WebCryptoImplTest, AesCbcSampleSets) {
|
| SCOPED_TRACE(index);
|
| const TestCase& test = kTests[index];
|
|
|
| - WebKit::WebCryptoKey key = ImportSecretKeyFromRawHexString(
|
| + blink::WebCryptoKey key = ImportSecretKeyFromRawHexString(
|
| test.key,
|
| - CreateAlgorithm(WebKit::WebCryptoAlgorithmIdAesCbc),
|
| - WebKit::WebCryptoKeyUsageEncrypt | WebKit::WebCryptoKeyUsageDecrypt);
|
| + CreateAlgorithm(blink::WebCryptoAlgorithmIdAesCbc),
|
| + blink::WebCryptoKeyUsageEncrypt | blink::WebCryptoKeyUsageDecrypt);
|
|
|
| std::vector<uint8> plain_text = HexStringToBytes(test.plain_text);
|
| std::vector<uint8> iv = HexStringToBytes(test.iv);
|
|
|
| - WebKit::WebArrayBuffer output;
|
| + blink::WebArrayBuffer output;
|
|
|
| // Test encryption.
|
| EXPECT_TRUE(EncryptInternal(CreateAesCbcAlgorithm(iv),
|
| @@ -643,46 +643,46 @@ TEST_F(WebCryptoImplTest, AesCbcSampleSets) {
|
| // TODO(padolph): Add test to verify generated symmetric keys appear random.
|
|
|
| TEST_F(WebCryptoImplTest, GenerateKeyAes) {
|
| - WebKit::WebCryptoKey key = WebKit::WebCryptoKey::createNull();
|
| + blink::WebCryptoKey key = blink::WebCryptoKey::createNull();
|
| ASSERT_TRUE(GenerateKeyInternal(CreateAesCbcAlgorithm(128), &key));
|
| EXPECT_TRUE(key.handle());
|
| - EXPECT_EQ(WebKit::WebCryptoKeyTypeSecret, key.type());
|
| + EXPECT_EQ(blink::WebCryptoKeyTypeSecret, key.type());
|
| }
|
|
|
| TEST_F(WebCryptoImplTest, GenerateKeyAesBadLength) {
|
| - WebKit::WebCryptoKey key = WebKit::WebCryptoKey::createNull();
|
| + blink::WebCryptoKey key = blink::WebCryptoKey::createNull();
|
| EXPECT_FALSE(GenerateKeyInternal(CreateAesCbcAlgorithm(0), &key));
|
| EXPECT_FALSE(GenerateKeyInternal(CreateAesCbcAlgorithm(129), &key));
|
| }
|
|
|
| TEST_F(WebCryptoImplTest, GenerateKeyHmac) {
|
| - WebKit::WebCryptoKey key = WebKit::WebCryptoKey::createNull();
|
| - WebKit::WebCryptoAlgorithm algorithm =
|
| - CreateHmacKeyAlgorithm(WebKit::WebCryptoAlgorithmIdSha1, 128);
|
| + blink::WebCryptoKey key = blink::WebCryptoKey::createNull();
|
| + blink::WebCryptoAlgorithm algorithm =
|
| + CreateHmacKeyAlgorithm(blink::WebCryptoAlgorithmIdSha1, 128);
|
| ASSERT_TRUE(GenerateKeyInternal(algorithm, &key));
|
| EXPECT_FALSE(key.isNull());
|
| EXPECT_TRUE(key.handle());
|
| - EXPECT_EQ(WebKit::WebCryptoKeyTypeSecret, key.type());
|
| + EXPECT_EQ(blink::WebCryptoKeyTypeSecret, key.type());
|
| }
|
|
|
| TEST_F(WebCryptoImplTest, GenerateKeyHmacNoLength) {
|
| - WebKit::WebCryptoKey key = WebKit::WebCryptoKey::createNull();
|
| - WebKit::WebCryptoAlgorithm algorithm =
|
| - CreateHmacKeyAlgorithm(WebKit::WebCryptoAlgorithmIdSha1, 0);
|
| + blink::WebCryptoKey key = blink::WebCryptoKey::createNull();
|
| + blink::WebCryptoAlgorithm algorithm =
|
| + CreateHmacKeyAlgorithm(blink::WebCryptoAlgorithmIdSha1, 0);
|
| ASSERT_TRUE(GenerateKeyInternal(algorithm, &key));
|
| EXPECT_TRUE(key.handle());
|
| - EXPECT_EQ(WebKit::WebCryptoKeyTypeSecret, key.type());
|
| + EXPECT_EQ(blink::WebCryptoKeyTypeSecret, key.type());
|
| }
|
|
|
| TEST_F(WebCryptoImplTest, ImportSecretKeyNoAlgorithm) {
|
| - WebKit::WebCryptoKey key = WebKit::WebCryptoKey::createNull();
|
| + blink::WebCryptoKey key = blink::WebCryptoKey::createNull();
|
|
|
| // This fails because the algorithm is null.
|
| EXPECT_FALSE(ImportKeyInternal(
|
| - WebKit::WebCryptoKeyFormatRaw,
|
| + blink::WebCryptoKeyFormatRaw,
|
| HexStringToBytes("00000000000000000000"),
|
| - WebKit::WebCryptoAlgorithm::createNull(),
|
| - WebKit::WebCryptoKeyUsageSign,
|
| + blink::WebCryptoAlgorithm::createNull(),
|
| + blink::WebCryptoKeyUsageSign,
|
| &key));
|
| }
|
|
|
| @@ -694,20 +694,20 @@ TEST_F(WebCryptoImplTest, GenerateKeyPairRsa) {
|
| // Successful WebCryptoAlgorithmIdRsaEsPkcs1v1_5 key generation.
|
| const unsigned modulus_length = 256;
|
| const std::vector<uint8> public_exponent = HexStringToBytes("010001");
|
| - WebKit::WebCryptoAlgorithm algorithm =
|
| - CreateRsaAlgorithm(WebKit::WebCryptoAlgorithmIdRsaEsPkcs1v1_5,
|
| + blink::WebCryptoAlgorithm algorithm =
|
| + CreateRsaAlgorithm(blink::WebCryptoAlgorithmIdRsaEsPkcs1v1_5,
|
| modulus_length,
|
| public_exponent);
|
| bool extractable = false;
|
| - const WebKit::WebCryptoKeyUsageMask usage_mask = 0;
|
| - WebKit::WebCryptoKey public_key = WebKit::WebCryptoKey::createNull();
|
| - WebKit::WebCryptoKey private_key = WebKit::WebCryptoKey::createNull();
|
| + const blink::WebCryptoKeyUsageMask usage_mask = 0;
|
| + blink::WebCryptoKey public_key = blink::WebCryptoKey::createNull();
|
| + blink::WebCryptoKey private_key = blink::WebCryptoKey::createNull();
|
| EXPECT_TRUE(GenerateKeyPairInternal(
|
| algorithm, extractable, usage_mask, &public_key, &private_key));
|
| EXPECT_FALSE(public_key.isNull());
|
| EXPECT_FALSE(private_key.isNull());
|
| - EXPECT_EQ(WebKit::WebCryptoKeyTypePublic, public_key.type());
|
| - EXPECT_EQ(WebKit::WebCryptoKeyTypePrivate, private_key.type());
|
| + EXPECT_EQ(blink::WebCryptoKeyTypePublic, public_key.type());
|
| + EXPECT_EQ(blink::WebCryptoKeyTypePrivate, private_key.type());
|
| EXPECT_EQ(extractable, public_key.extractable());
|
| EXPECT_EQ(extractable, private_key.extractable());
|
| EXPECT_EQ(usage_mask, public_key.usages());
|
| @@ -715,14 +715,14 @@ TEST_F(WebCryptoImplTest, GenerateKeyPairRsa) {
|
|
|
| // Fail with bad modulus.
|
| algorithm = CreateRsaAlgorithm(
|
| - WebKit::WebCryptoAlgorithmIdRsaEsPkcs1v1_5, 0, public_exponent);
|
| + blink::WebCryptoAlgorithmIdRsaEsPkcs1v1_5, 0, public_exponent);
|
| EXPECT_FALSE(GenerateKeyPairInternal(
|
| algorithm, extractable, usage_mask, &public_key, &private_key));
|
|
|
| // Fail with bad exponent: larger than unsigned long.
|
| unsigned exponent_length = sizeof(unsigned long) + 1; // NOLINT
|
| const std::vector<uint8> long_exponent(exponent_length, 0x01);
|
| - algorithm = CreateRsaAlgorithm(WebKit::WebCryptoAlgorithmIdRsaEsPkcs1v1_5,
|
| + algorithm = CreateRsaAlgorithm(blink::WebCryptoAlgorithmIdRsaEsPkcs1v1_5,
|
| modulus_length,
|
| long_exponent);
|
| EXPECT_FALSE(GenerateKeyPairInternal(
|
| @@ -730,7 +730,7 @@ TEST_F(WebCryptoImplTest, GenerateKeyPairRsa) {
|
|
|
| // Fail with bad exponent: empty.
|
| const std::vector<uint8> empty_exponent;
|
| - algorithm = CreateRsaAlgorithm(WebKit::WebCryptoAlgorithmIdRsaEsPkcs1v1_5,
|
| + algorithm = CreateRsaAlgorithm(blink::WebCryptoAlgorithmIdRsaEsPkcs1v1_5,
|
| modulus_length,
|
| empty_exponent);
|
| EXPECT_FALSE(GenerateKeyPairInternal(
|
| @@ -738,7 +738,7 @@ TEST_F(WebCryptoImplTest, GenerateKeyPairRsa) {
|
|
|
| // Fail with bad exponent: all zeros.
|
| std::vector<uint8> exponent_with_leading_zeros(15, 0x00);
|
| - algorithm = CreateRsaAlgorithm(WebKit::WebCryptoAlgorithmIdRsaEsPkcs1v1_5,
|
| + algorithm = CreateRsaAlgorithm(blink::WebCryptoAlgorithmIdRsaEsPkcs1v1_5,
|
| modulus_length,
|
| exponent_with_leading_zeros);
|
| EXPECT_FALSE(GenerateKeyPairInternal(
|
| @@ -748,15 +748,15 @@ TEST_F(WebCryptoImplTest, GenerateKeyPairRsa) {
|
| exponent_with_leading_zeros.insert(exponent_with_leading_zeros.end(),
|
| public_exponent.begin(),
|
| public_exponent.end());
|
| - algorithm = CreateRsaAlgorithm(WebKit::WebCryptoAlgorithmIdRsaEsPkcs1v1_5,
|
| + algorithm = CreateRsaAlgorithm(blink::WebCryptoAlgorithmIdRsaEsPkcs1v1_5,
|
| modulus_length,
|
| exponent_with_leading_zeros);
|
| EXPECT_TRUE(GenerateKeyPairInternal(
|
| algorithm, extractable, usage_mask, &public_key, &private_key));
|
| EXPECT_FALSE(public_key.isNull());
|
| EXPECT_FALSE(private_key.isNull());
|
| - EXPECT_EQ(WebKit::WebCryptoKeyTypePublic, public_key.type());
|
| - EXPECT_EQ(WebKit::WebCryptoKeyTypePrivate, private_key.type());
|
| + EXPECT_EQ(blink::WebCryptoKeyTypePublic, public_key.type());
|
| + EXPECT_EQ(blink::WebCryptoKeyTypePrivate, private_key.type());
|
| EXPECT_EQ(extractable, public_key.extractable());
|
| EXPECT_EQ(extractable, private_key.extractable());
|
| EXPECT_EQ(usage_mask, public_key.usages());
|
| @@ -764,28 +764,28 @@ TEST_F(WebCryptoImplTest, GenerateKeyPairRsa) {
|
|
|
| // Successful WebCryptoAlgorithmIdRsaOaep key generation.
|
| algorithm = CreateRsaAlgorithm(
|
| - WebKit::WebCryptoAlgorithmIdRsaOaep, modulus_length, public_exponent);
|
| + blink::WebCryptoAlgorithmIdRsaOaep, modulus_length, public_exponent);
|
| EXPECT_TRUE(GenerateKeyPairInternal(
|
| algorithm, extractable, usage_mask, &public_key, &private_key));
|
| EXPECT_FALSE(public_key.isNull());
|
| EXPECT_FALSE(private_key.isNull());
|
| - EXPECT_EQ(WebKit::WebCryptoKeyTypePublic, public_key.type());
|
| - EXPECT_EQ(WebKit::WebCryptoKeyTypePrivate, private_key.type());
|
| + EXPECT_EQ(blink::WebCryptoKeyTypePublic, public_key.type());
|
| + EXPECT_EQ(blink::WebCryptoKeyTypePrivate, private_key.type());
|
| EXPECT_EQ(extractable, public_key.extractable());
|
| EXPECT_EQ(extractable, private_key.extractable());
|
| EXPECT_EQ(usage_mask, public_key.usages());
|
| EXPECT_EQ(usage_mask, private_key.usages());
|
|
|
| // Successful WebCryptoAlgorithmIdRsaSsaPkcs1v1_5 key generation.
|
| - algorithm = CreateRsaAlgorithm(WebKit::WebCryptoAlgorithmIdRsaSsaPkcs1v1_5,
|
| + algorithm = CreateRsaAlgorithm(blink::WebCryptoAlgorithmIdRsaSsaPkcs1v1_5,
|
| modulus_length,
|
| public_exponent);
|
| EXPECT_TRUE(GenerateKeyPairInternal(
|
| algorithm, extractable, usage_mask, &public_key, &private_key));
|
| EXPECT_FALSE(public_key.isNull());
|
| EXPECT_FALSE(private_key.isNull());
|
| - EXPECT_EQ(WebKit::WebCryptoKeyTypePublic, public_key.type());
|
| - EXPECT_EQ(WebKit::WebCryptoKeyTypePrivate, private_key.type());
|
| + EXPECT_EQ(blink::WebCryptoKeyTypePublic, public_key.type());
|
| + EXPECT_EQ(blink::WebCryptoKeyTypePrivate, private_key.type());
|
| EXPECT_EQ(extractable, public_key.extractable());
|
| EXPECT_EQ(extractable, private_key.extractable());
|
| EXPECT_EQ(usage_mask, public_key.usages());
|
|
|