Cover more branches in fx_crypt_sha.cpp.
Should get us to 100% coverage, hopefully.
Change-Id: I2f12e1a3136603e417f1296beaad98afdd0607ee
Reviewed-on: https://pdfium-review.googlesource.com/c/pdfium/+/62010
Commit-Queue: Tom Sepez <tsepez@chromium.org>
Reviewed-by: Lei Zhang <thestig@chromium.org>
diff --git a/core/fdrm/fx_crypt_unittest.cpp b/core/fdrm/fx_crypt_unittest.cpp
index 9b16771..4d5336d 100644
--- a/core/fdrm/fx_crypt_unittest.cpp
+++ b/core/fdrm/fx_crypt_unittest.cpp
@@ -542,6 +542,20 @@
}
}
+TEST(FXCRYPT, Sha384Empty) {
+ static const char kInput[] = "";
+ static const uint8_t kExpected[48] = {
+ 0x38, 0xb0, 0x60, 0xa7, 0x51, 0xac, 0x96, 0x38, 0x4c, 0xd9, 0x32, 0x7e,
+ 0xb1, 0xb1, 0xe3, 0x6a, 0x21, 0xfd, 0xb7, 0x11, 0x14, 0xbe, 0x07, 0x43,
+ 0x4c, 0x0c, 0xc7, 0xbf, 0x63, 0xf6, 0xe1, 0xda, 0x27, 0x4e, 0xde, 0xbf,
+ 0xe7, 0x6f, 0x65, 0xfb, 0xd5, 0x1a, 0xd2, 0xf1, 0x48, 0x98, 0xb9, 0x5b};
+ uint8_t actual[48];
+ CRYPT_SHA384Generate(reinterpret_cast<const uint8_t*>(kInput), strlen(kInput),
+ actual);
+ for (size_t i = 0; i < FX_ArraySize(kExpected); ++i)
+ EXPECT_EQ(kExpected[i], actual[i]) << " at byte " << i;
+}
+
// Verified against echo -n "..." | openssl sha384
TEST(FXCRYPT, Sha384Test) {
static const char kInput[] =
@@ -558,6 +572,40 @@
EXPECT_EQ(kExpected[i], actual[i]) << " at byte " << i;
}
+// Verified against echo -n "..." | openssl sha384
+TEST(FXCRYPT, Sha384Pad112) {
+ static const char kInput[] =
+ "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
+ "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa";
+ static const uint8_t kExpected[48] = {
+ 0x18, 0x7d, 0x4e, 0x07, 0xcb, 0x30, 0x61, 0x03, 0xc6, 0x99, 0x67, 0xbf,
+ 0x54, 0x4d, 0x0d, 0xfb, 0xe9, 0x04, 0x25, 0x77, 0x59, 0x9c, 0x73, 0xc3,
+ 0x30, 0xab, 0xc0, 0xcb, 0x64, 0xc6, 0x12, 0x36, 0xd5, 0xed, 0x56, 0x5e,
+ 0xe1, 0x91, 0x19, 0xd8, 0xc3, 0x17, 0x79, 0xa3, 0x8f, 0x79, 0x1f, 0xcd};
+ uint8_t actual[48];
+ EXPECT_EQ(112u, strlen(kInput));
+ CRYPT_SHA384Generate(reinterpret_cast<const uint8_t*>(kInput), strlen(kInput),
+ actual);
+ for (size_t i = 0; i < FX_ArraySize(kExpected); ++i)
+ EXPECT_EQ(kExpected[i], actual[i]) << " at byte " << i;
+}
+
+TEST(FXCRYPT, Sha512Empty) {
+ static const char kInput[] = "";
+ static const uint8_t kExpected[64] = {
+ 0xcf, 0x83, 0xe1, 0x35, 0x7e, 0xef, 0xb8, 0xbd, 0xf1, 0x54, 0x28,
+ 0x50, 0xd6, 0x6d, 0x80, 0x07, 0xd6, 0x20, 0xe4, 0x05, 0x0b, 0x57,
+ 0x15, 0xdc, 0x83, 0xf4, 0xa9, 0x21, 0xd3, 0x6c, 0xe9, 0xce, 0x47,
+ 0xd0, 0xd1, 0x3c, 0x5d, 0x85, 0xf2, 0xb0, 0xff, 0x83, 0x18, 0xd2,
+ 0x87, 0x7e, 0xec, 0x2f, 0x63, 0xb9, 0x31, 0xbd, 0x47, 0x41, 0x7a,
+ 0x81, 0xa5, 0x38, 0x32, 0x7a, 0xf9, 0x27, 0xda, 0x3e};
+ uint8_t actual[64];
+ CRYPT_SHA512Generate(reinterpret_cast<const uint8_t*>(kInput), strlen(kInput),
+ actual);
+ for (size_t i = 0; i < FX_ArraySize(kExpected); ++i)
+ EXPECT_EQ(kExpected[i], actual[i]) << " at byte " << i;
+}
+
// Verified against echo -n "..." | openssl sha512
TEST(FXCRYPT, Sha512Test) {
static const char kInput[] =
@@ -575,3 +623,23 @@
for (size_t i = 0; i < FX_ArraySize(kExpected); ++i)
EXPECT_EQ(kExpected[i], actual[i]) << " at byte " << i;
}
+
+// Verified against echo -n "..." | openssl sha512
+TEST(FXCRYPT, Sha512Pad112) {
+ static const char kInput[] =
+ "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
+ "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa";
+ static const uint8_t kExpected[64] = {
+ 0xc0, 0x1d, 0x08, 0x0e, 0xfd, 0x49, 0x27, 0x76, 0xa1, 0xc4, 0x3b,
+ 0xd2, 0x3d, 0xd9, 0x9d, 0x0a, 0x2e, 0x62, 0x6d, 0x48, 0x1e, 0x16,
+ 0x78, 0x2e, 0x75, 0xd5, 0x4c, 0x25, 0x03, 0xb5, 0xdc, 0x32, 0xbd,
+ 0x05, 0xf0, 0xf1, 0xba, 0x33, 0xe5, 0x68, 0xb8, 0x8f, 0xd2, 0xd9,
+ 0x70, 0x92, 0x9b, 0x71, 0x9e, 0xcb, 0xb1, 0x52, 0xf5, 0x8f, 0x13,
+ 0x0a, 0x40, 0x7c, 0x88, 0x30, 0x60, 0x4b, 0x70, 0xca};
+ uint8_t actual[64];
+ EXPECT_EQ(112u, strlen(kInput));
+ CRYPT_SHA512Generate(reinterpret_cast<const uint8_t*>(kInput), strlen(kInput),
+ actual);
+ for (size_t i = 0; i < FX_ArraySize(kExpected); ++i)
+ EXPECT_EQ(kExpected[i], actual[i]) << " at byte " << i;
+}