diff options
author | abarth@chromium.org <abarth@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2011-04-30 18:55:18 +0000 |
---|---|---|
committer | abarth@chromium.org <abarth@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2011-04-30 18:55:18 +0000 |
commit | a5aec2ed627f15f6696113109085f02b0c2c8bae (patch) | |
tree | 1e380d792cee1c3c7409e343200d0864606334d2 /crypto/hmac_unittest.cc | |
parent | 555e067bcbccbe3b6131ce9e0569e41defabf290 (diff) | |
download | chromium_src-a5aec2ed627f15f6696113109085f02b0c2c8bae.zip chromium_src-a5aec2ed627f15f6696113109085f02b0c2c8bae.tar.gz chromium_src-a5aec2ed627f15f6696113109085f02b0c2c8bae.tar.bz2 |
Add a method to HMAC to indicate how large a digest it produces.
Review URL: http://codereview.chromium.org/6904148
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@83681 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'crypto/hmac_unittest.cc')
-rw-r--r-- | crypto/hmac_unittest.cc | 6 |
1 files changed, 4 insertions, 2 deletions
diff --git a/crypto/hmac_unittest.cc b/crypto/hmac_unittest.cc index c537c36..0f8f0ec 100644 --- a/crypto/hmac_unittest.cc +++ b/crypto/hmac_unittest.cc @@ -7,8 +7,8 @@ #include "crypto/hmac.h" #include "testing/gtest/include/gtest/gtest.h" -static const int kSHA1DigestSize = 20; -static const int kSHA256DigestSize = 32; +static const size_t kSHA1DigestSize = 20; +static const size_t kSHA256DigestSize = 32; TEST(HMACTest, HmacSafeBrowsingResponseTest) { const int kKeySize = 16; @@ -151,6 +151,7 @@ TEST(HMACTest, RFC4231TestCase6) { ASSERT_TRUE(hmac.Init(key, sizeof(key))); unsigned char calculated_hmac[kSHA256DigestSize]; + EXPECT_EQ(kSHA256DigestSize, hmac.DigestLength()); EXPECT_TRUE(hmac.Sign(data, calculated_hmac, kSHA256DigestSize)); EXPECT_EQ(0, memcmp(kKnownHMACSHA256, calculated_hmac, kSHA256DigestSize)); } @@ -191,6 +192,7 @@ TEST(HMACTest, NSSFIPSPowerUpSelfTest) { ASSERT_TRUE(hmac.Init(kKnownSecretKey, kKnownSecretKeySize)); unsigned char calculated_hmac[kSHA1DigestSize]; + EXPECT_EQ(kSHA1DigestSize, hmac.DigestLength()); EXPECT_TRUE(hmac.Sign(message_data, calculated_hmac, kSHA1DigestSize)); EXPECT_EQ(0, memcmp(kKnownHMACSHA1, calculated_hmac, kSHA1DigestSize)); |