Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "base/crypto/rsa_private_key.h" | |
|
wtc
2011/04/07 05:35:53
It is correct to include "crypto/rsa_private_key.h
| |
| 6 | |
| 7 #include <keyhi.h> | 5 #include <keyhi.h> |
| 8 #include <pk11pub.h> | 6 #include <pk11pub.h> |
| 9 | 7 |
| 10 #include "base/memory/scoped_ptr.h" | 8 #include "base/memory/scoped_ptr.h" |
| 11 #include "base/nss_util.h" | 9 #include "base/nss_util.h" |
| 10 #include "crypto/rsa_private_key.h" | |
| 12 #include "testing/gtest/include/gtest/gtest.h" | 11 #include "testing/gtest/include/gtest/gtest.h" |
| 13 | 12 |
| 14 namespace base { | 13 namespace crypto { |
| 15 | 14 |
| 16 class RSAPrivateKeyNSSTest : public testing::Test { | 15 class RSAPrivateKeyNSSTest : public testing::Test { |
| 17 public: | 16 public: |
| 18 RSAPrivateKeyNSSTest() {} | 17 RSAPrivateKeyNSSTest() {} |
| 19 virtual ~RSAPrivateKeyNSSTest() {} | 18 virtual ~RSAPrivateKeyNSSTest() {} |
| 20 | 19 |
| 21 virtual void SetUp() { | 20 virtual void SetUp() { |
| 22 #if defined(OS_CHROMEOS) | 21 #if defined(OS_CHROMEOS) |
| 23 base::OpenPersistentNSSDB(); | 22 OpenPersistentNSSDB(); |
| 24 #endif | 23 #endif |
| 25 } | 24 } |
| 26 | 25 |
| 27 private: | 26 private: |
| 28 DISALLOW_COPY_AND_ASSIGN(RSAPrivateKeyNSSTest); | 27 DISALLOW_COPY_AND_ASSIGN(RSAPrivateKeyNSSTest); |
| 29 }; | 28 }; |
| 30 | 29 |
| 31 TEST_F(RSAPrivateKeyNSSTest, FindFromPublicKey) { | 30 TEST_F(RSAPrivateKeyNSSTest, FindFromPublicKey) { |
| 32 // Create a keypair, which will put the keys in the user's NSSDB. | 31 // Create a keypair, which will put the keys in the user's NSSDB. |
| 33 scoped_ptr<base::RSAPrivateKey> key_pair(base::RSAPrivateKey::Create(256)); | 32 scoped_ptr<crypto::RSAPrivateKey> key_pair(RSAPrivateKey::Create(256)); |
| 34 | 33 |
| 35 std::vector<uint8> public_key; | 34 std::vector<uint8> public_key; |
| 36 ASSERT_TRUE(key_pair->ExportPublicKey(&public_key)); | 35 ASSERT_TRUE(key_pair->ExportPublicKey(&public_key)); |
| 37 | 36 |
| 38 scoped_ptr<base::RSAPrivateKey> key_pair_2( | 37 scoped_ptr<crypto::RSAPrivateKey> key_pair_2( |
| 39 base::RSAPrivateKey::FindFromPublicKeyInfo(public_key)); | 38 crypto::RSAPrivateKey::FindFromPublicKeyInfo(public_key)); |
| 40 | 39 |
| 41 EXPECT_EQ(key_pair->key_->pkcs11ID, key_pair_2->key_->pkcs11ID); | 40 EXPECT_EQ(key_pair->key_->pkcs11ID, key_pair_2->key_->pkcs11ID); |
| 42 } | 41 } |
| 43 | 42 |
| 44 TEST_F(RSAPrivateKeyNSSTest, FailedFindFromPublicKey) { | 43 TEST_F(RSAPrivateKeyNSSTest, FailedFindFromPublicKey) { |
| 45 // Create a keypair, which will put the keys in the user's NSSDB. | 44 // Create a keypair, which will put the keys in the user's NSSDB. |
| 46 scoped_ptr<base::RSAPrivateKey> key_pair(base::RSAPrivateKey::Create(256)); | 45 scoped_ptr<crypto::RSAPrivateKey> key_pair(RSAPrivateKey::Create(256)); |
| 47 | 46 |
| 48 std::vector<uint8> public_key; | 47 std::vector<uint8> public_key; |
| 49 ASSERT_TRUE(key_pair->ExportPublicKey(&public_key)); | 48 ASSERT_TRUE(key_pair->ExportPublicKey(&public_key)); |
| 50 | 49 |
| 51 // Remove the keys from the DB, and make sure we can't find them again. | 50 // Remove the keys from the DB, and make sure we can't find them again. |
| 52 if (key_pair->key_) { | 51 if (key_pair->key_) { |
| 53 PK11_DestroyTokenObject(key_pair->key_->pkcs11Slot, | 52 PK11_DestroyTokenObject(key_pair->key_->pkcs11Slot, |
| 54 key_pair->key_->pkcs11ID); | 53 key_pair->key_->pkcs11ID); |
| 55 } | 54 } |
| 56 if (key_pair->public_key_) { | 55 if (key_pair->public_key_) { |
| 57 PK11_DestroyTokenObject(key_pair->public_key_->pkcs11Slot, | 56 PK11_DestroyTokenObject(key_pair->public_key_->pkcs11Slot, |
| 58 key_pair->public_key_->pkcs11ID); | 57 key_pair->public_key_->pkcs11ID); |
| 59 } | 58 } |
| 60 | 59 |
| 61 EXPECT_EQ(NULL, base::RSAPrivateKey::FindFromPublicKeyInfo(public_key)); | 60 EXPECT_EQ(NULL, crypto::RSAPrivateKey::FindFromPublicKeyInfo(public_key)); |
| 62 } | 61 } |
| 63 | 62 |
| 64 } // namespace base | 63 } // namespace crypto |
| OLD | NEW |