| OLD | NEW |
| 1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "base/stl_util.h" | 5 #include "base/stl_util.h" |
| 6 #include "content/child/webcrypto/algorithm_dispatch.h" | 6 #include "content/child/webcrypto/algorithm_dispatch.h" |
| 7 #include "content/child/webcrypto/crypto_data.h" | 7 #include "content/child/webcrypto/crypto_data.h" |
| 8 #include "content/child/webcrypto/status.h" | 8 #include "content/child/webcrypto/status.h" |
| 9 #include "content/child/webcrypto/test/test_helpers.h" | 9 #include "content/child/webcrypto/test/test_helpers.h" |
| 10 #include "content/child/webcrypto/webcrypto_util.h" | 10 #include "content/child/webcrypto/webcrypto_util.h" |
| (...skipping 93 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 104 LOG(WARNING) << "AES GCM not supported, skipping tests"; | 104 LOG(WARNING) << "AES GCM not supported, skipping tests"; |
| 105 return; | 105 return; |
| 106 } | 106 } |
| 107 | 107 |
| 108 const unsigned short kKeyLen[] = {0, 127, 257}; | 108 const unsigned short kKeyLen[] = {0, 127, 257}; |
| 109 blink::WebCryptoKey key; | 109 blink::WebCryptoKey key; |
| 110 for (size_t i = 0; i < arraysize(kKeyLen); ++i) { | 110 for (size_t i = 0; i < arraysize(kKeyLen); ++i) { |
| 111 SCOPED_TRACE(i); | 111 SCOPED_TRACE(i); |
| 112 EXPECT_EQ(Status::ErrorGenerateAesKeyLength(), | 112 EXPECT_EQ(Status::ErrorGenerateAesKeyLength(), |
| 113 GenerateSecretKey(CreateAesGcmKeyGenAlgorithm(kKeyLen[i]), true, | 113 GenerateSecretKey(CreateAesGcmKeyGenAlgorithm(kKeyLen[i]), true, |
| 114 0, &key)); | 114 blink::WebCryptoKeyUsageDecrypt, &key)); |
| 115 } | 115 } |
| 116 } | 116 } |
| 117 | 117 |
| 118 TEST(WebCryptoAesGcmTest, GenerateKeyEmptyUsage) { |
| 119 if (!SupportsAesGcm()) { |
| 120 LOG(WARNING) << "AES GCM not supported, skipping tests"; |
| 121 return; |
| 122 } |
| 123 |
| 124 blink::WebCryptoKey key; |
| 125 EXPECT_EQ(Status::ErrorCreateKeyEmptyUsages(), |
| 126 GenerateSecretKey(CreateAesGcmKeyGenAlgorithm(256), true, 0, &key)); |
| 127 } |
| 128 |
| 118 TEST(WebCryptoAesGcmTest, ImportExportJwk) { | 129 TEST(WebCryptoAesGcmTest, ImportExportJwk) { |
| 119 // Some Linux test runners may not have a new enough version of NSS. | 130 // Some Linux test runners may not have a new enough version of NSS. |
| 120 if (!SupportsAesGcm()) { | 131 if (!SupportsAesGcm()) { |
| 121 LOG(WARNING) << "AES GCM not supported, skipping tests"; | 132 LOG(WARNING) << "AES GCM not supported, skipping tests"; |
| 122 return; | 133 return; |
| 123 } | 134 } |
| 124 | 135 |
| 125 const blink::WebCryptoAlgorithm algorithm = | 136 const blink::WebCryptoAlgorithm algorithm = |
| 126 CreateAlgorithm(blink::WebCryptoAlgorithmIdAesGcm); | 137 CreateAlgorithm(blink::WebCryptoAlgorithmIdAesGcm); |
| 127 | 138 |
| (...skipping 100 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 228 test_authentication_tag, &plain_text)); | 239 test_authentication_tag, &plain_text)); |
| 229 } | 240 } |
| 230 } | 241 } |
| 231 } | 242 } |
| 232 | 243 |
| 233 } // namespace | 244 } // namespace |
| 234 | 245 |
| 235 } // namespace webcrypto | 246 } // namespace webcrypto |
| 236 | 247 |
| 237 } // namespace content | 248 } // namespace content |
| OLD | NEW |