summaryrefslogtreecommitdiffstats
path: root/crypto/hmac_unittest.cc
diff options
context:
space:
mode:
authorabarth@chromium.org <abarth@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2011-04-30 18:55:18 +0000
committerabarth@chromium.org <abarth@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2011-04-30 18:55:18 +0000
commita5aec2ed627f15f6696113109085f02b0c2c8bae (patch)
tree1e380d792cee1c3c7409e343200d0864606334d2 /crypto/hmac_unittest.cc
parent555e067bcbccbe3b6131ce9e0569e41defabf290 (diff)
downloadchromium_src-a5aec2ed627f15f6696113109085f02b0c2c8bae.zip
chromium_src-a5aec2ed627f15f6696113109085f02b0c2c8bae.tar.gz
chromium_src-a5aec2ed627f15f6696113109085f02b0c2c8bae.tar.bz2
Add a method to HMAC to indicate how large a digest it produces.
Review URL: http://codereview.chromium.org/6904148 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@83681 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'crypto/hmac_unittest.cc')
-rw-r--r--crypto/hmac_unittest.cc6
1 files changed, 4 insertions, 2 deletions
diff --git a/crypto/hmac_unittest.cc b/crypto/hmac_unittest.cc
index c537c36..0f8f0ec 100644
--- a/crypto/hmac_unittest.cc
+++ b/crypto/hmac_unittest.cc
@@ -7,8 +7,8 @@
#include "crypto/hmac.h"
#include "testing/gtest/include/gtest/gtest.h"
-static const int kSHA1DigestSize = 20;
-static const int kSHA256DigestSize = 32;
+static const size_t kSHA1DigestSize = 20;
+static const size_t kSHA256DigestSize = 32;
TEST(HMACTest, HmacSafeBrowsingResponseTest) {
const int kKeySize = 16;
@@ -151,6 +151,7 @@ TEST(HMACTest, RFC4231TestCase6) {
ASSERT_TRUE(hmac.Init(key, sizeof(key)));
unsigned char calculated_hmac[kSHA256DigestSize];
+ EXPECT_EQ(kSHA256DigestSize, hmac.DigestLength());
EXPECT_TRUE(hmac.Sign(data, calculated_hmac, kSHA256DigestSize));
EXPECT_EQ(0, memcmp(kKnownHMACSHA256, calculated_hmac, kSHA256DigestSize));
}
@@ -191,6 +192,7 @@ TEST(HMACTest, NSSFIPSPowerUpSelfTest) {
ASSERT_TRUE(hmac.Init(kKnownSecretKey, kKnownSecretKeySize));
unsigned char calculated_hmac[kSHA1DigestSize];
+ EXPECT_EQ(kSHA1DigestSize, hmac.DigestLength());
EXPECT_TRUE(hmac.Sign(message_data, calculated_hmac, kSHA1DigestSize));
EXPECT_EQ(0, memcmp(kKnownHMACSHA1, calculated_hmac, kSHA1DigestSize));