| Index: net/ssl/ssl_cipher_suite_names_unittest.cc
|
| diff --git a/net/ssl/ssl_cipher_suite_names_unittest.cc b/net/ssl/ssl_cipher_suite_names_unittest.cc
|
| deleted file mode 100644
|
| index 9a5b4a8f8634ba0d84b85559a6556790ff8391c6..0000000000000000000000000000000000000000
|
| --- a/net/ssl/ssl_cipher_suite_names_unittest.cc
|
| +++ /dev/null
|
| @@ -1,84 +0,0 @@
|
| -// Copyright (c) 2011 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#include "net/ssl/ssl_cipher_suite_names.h"
|
| -
|
| -#include "base/basictypes.h"
|
| -#include "testing/gtest/include/gtest/gtest.h"
|
| -
|
| -namespace net {
|
| -
|
| -namespace {
|
| -
|
| -TEST(CipherSuiteNamesTest, Basic) {
|
| - const char *key_exchange, *cipher, *mac;
|
| - bool is_aead;
|
| -
|
| - SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead, 0xc001);
|
| - EXPECT_STREQ("ECDH_ECDSA", key_exchange);
|
| - EXPECT_STREQ("NULL", cipher);
|
| - EXPECT_STREQ("SHA1", mac);
|
| - EXPECT_FALSE(is_aead);
|
| -
|
| - SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead, 0x009f);
|
| - EXPECT_STREQ("DHE_RSA", key_exchange);
|
| - EXPECT_STREQ("AES_256_GCM", cipher);
|
| - EXPECT_TRUE(is_aead);
|
| - EXPECT_EQ(NULL, mac);
|
| -
|
| - SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead, 0xcc15);
|
| - EXPECT_STREQ("DHE_RSA", key_exchange);
|
| - EXPECT_STREQ("CHACHA20_POLY1305", cipher);
|
| - EXPECT_TRUE(is_aead);
|
| - EXPECT_EQ(NULL, mac);
|
| -
|
| - SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead, 0xff31);
|
| - EXPECT_STREQ("???", key_exchange);
|
| - EXPECT_STREQ("???", cipher);
|
| - EXPECT_STREQ("???", mac);
|
| - EXPECT_FALSE(is_aead);
|
| -}
|
| -
|
| -TEST(CipherSuiteNamesTest, ParseSSLCipherString) {
|
| - uint16 cipher_suite = 0;
|
| - EXPECT_TRUE(ParseSSLCipherString("0x0004", &cipher_suite));
|
| - EXPECT_EQ(0x00004u, cipher_suite);
|
| -
|
| - EXPECT_TRUE(ParseSSLCipherString("0xBEEF", &cipher_suite));
|
| - EXPECT_EQ(0xBEEFu, cipher_suite);
|
| -}
|
| -
|
| -TEST(CipherSuiteNamesTest, ParseSSLCipherStringFails) {
|
| - const char* const cipher_strings[] = {
|
| - "0004",
|
| - "0x004",
|
| - "0xBEEFY",
|
| - };
|
| -
|
| - for (size_t i = 0; i < arraysize(cipher_strings); ++i) {
|
| - uint16 cipher_suite = 0;
|
| - EXPECT_FALSE(ParseSSLCipherString(cipher_strings[i], &cipher_suite));
|
| - }
|
| -}
|
| -
|
| -TEST(CipherSuiteNamesTest, SecureCipherSuites) {
|
| - // Picked some random cipher suites.
|
| - EXPECT_FALSE(IsSecureTLSCipherSuite(0x0));
|
| - EXPECT_FALSE(IsSecureTLSCipherSuite(0x39));
|
| - EXPECT_FALSE(IsSecureTLSCipherSuite(0xc5));
|
| - EXPECT_FALSE(IsSecureTLSCipherSuite(0xc00f));
|
| - EXPECT_FALSE(IsSecureTLSCipherSuite(0xc083));
|
| -
|
| - // Non-existent cipher suite.
|
| - EXPECT_FALSE(IsSecureTLSCipherSuite(0xffff)) << "Doesn't exist!";
|
| -
|
| - // Secure ones.
|
| - EXPECT_TRUE(IsSecureTLSCipherSuite(0xcc13));
|
| - EXPECT_TRUE(IsSecureTLSCipherSuite(0xcc14));
|
| - EXPECT_TRUE(IsSecureTLSCipherSuite(0xcc15));
|
| -}
|
| -
|
| -} // anonymous namespace
|
| -
|
| -} // namespace net
|
|
|