| Index: chrome/browser/chromeos/login/owner_key_utils_unittest.cc
|
| diff --git a/chrome/browser/chromeos/login/owner_manager_unittest.cc b/chrome/browser/chromeos/login/owner_key_utils_unittest.cc
|
| similarity index 79%
|
| rename from chrome/browser/chromeos/login/owner_manager_unittest.cc
|
| rename to chrome/browser/chromeos/login/owner_key_utils_unittest.cc
|
| index 1f429004e6ced1cd06d6ed2a9d6a57ac0341cb2d..7a7e9e72ec7113610df3b0d632bda662f65d106f 100644
|
| --- a/chrome/browser/chromeos/login/owner_manager_unittest.cc
|
| +++ b/chrome/browser/chromeos/login/owner_key_utils_unittest.cc
|
| @@ -2,7 +2,7 @@
|
| // Use of this source code is governed by a BSD-style license that can be
|
| // found in the LICENSE file.
|
|
|
| -#include "chrome/browser/chromeos/login/owner_manager.h"
|
| +#include "chrome/browser/chromeos/login/owner_key_utils.h"
|
|
|
| #include <cert.h>
|
| #include <keyhi.h>
|
| @@ -17,20 +17,22 @@
|
| #include "base/logging.h"
|
| #include "base/nss_util_internal.h"
|
| #include "base/nss_util.h"
|
| +#include "base/scoped_ptr.h"
|
| #include "base/scoped_temp_dir.h"
|
| #include "testing/gtest/include/gtest/gtest.h"
|
| #include "testing/gmock/include/gmock/gmock.h"
|
|
|
| namespace chromeos {
|
|
|
| -class OwnerManagerTest : public ::testing::Test {
|
| +class OwnerKeyUtilsTest : public ::testing::Test {
|
| public:
|
| - OwnerManagerTest()
|
| + OwnerKeyUtilsTest()
|
| : private_key_(NULL),
|
| - public_key_(NULL) {
|
| + public_key_(NULL),
|
| + utils_(OwnerKeyUtils::Create()) {
|
|
|
| }
|
| - virtual ~OwnerManagerTest() {}
|
| + virtual ~OwnerKeyUtilsTest() {}
|
|
|
| virtual void SetUp() {
|
| base::OpenPersistentNSSDB();
|
| @@ -49,24 +51,25 @@ class OwnerManagerTest : public ::testing::Test {
|
|
|
| SECKEYPrivateKey* private_key_;
|
| SECKEYPublicKey* public_key_;
|
| + scoped_ptr<OwnerKeyUtils> utils_;
|
| };
|
|
|
| -TEST_F(OwnerManagerTest, KeyGenerate) {
|
| - EXPECT_TRUE(OwnerManager::GenerateKeyPair(&private_key_, &public_key_));
|
| +TEST_F(OwnerKeyUtilsTest, KeyGenerate) {
|
| + EXPECT_TRUE(utils_->GenerateKeyPair(&private_key_, &public_key_));
|
| EXPECT_TRUE(private_key_ != NULL);
|
| ASSERT_TRUE(public_key_ != NULL);
|
| EXPECT_EQ(public_key_->keyType, rsaKey);
|
| }
|
|
|
| -TEST_F(OwnerManagerTest, ExportImportPublicKey) {
|
| - EXPECT_TRUE(OwnerManager::GenerateKeyPair(&private_key_, &public_key_));
|
| +TEST_F(OwnerKeyUtilsTest, ExportImportPublicKey) {
|
| + EXPECT_TRUE(utils_->GenerateKeyPair(&private_key_, &public_key_));
|
|
|
| ScopedTempDir tmpdir;
|
| FilePath tmpfile;
|
| ASSERT_TRUE(tmpdir.CreateUniqueTempDir());
|
| ASSERT_TRUE(file_util::CreateTemporaryFileInDir(tmpdir.path(), &tmpfile));
|
|
|
| - EXPECT_TRUE(OwnerManager::ExportPublicKey(public_key_, tmpfile));
|
| + EXPECT_TRUE(utils_->ExportPublicKey(public_key_, tmpfile));
|
|
|
| // Now, verify that we can look up the private key, given the public key
|
| // we exported. We'll create
|
| @@ -83,7 +86,7 @@ TEST_F(OwnerManagerTest, ExportImportPublicKey) {
|
| if (NULL == slot)
|
| goto cleanup;
|
|
|
| - from_disk = OwnerManager::ImportPublicKey(tmpfile);
|
| + from_disk = utils_->ImportPublicKey(tmpfile);
|
| ASSERT_TRUE(from_disk != NULL);
|
|
|
| ck_id = PK11_MakeIDFromPubKey(&(from_disk->u.rsa.modulus));
|
|
|