| Index: net/cert/internal/parse_certificate_unittest.cc
|
| diff --git a/net/cert/internal/parse_certificate_unittest.cc b/net/cert/internal/parse_certificate_unittest.cc
|
| index 727644c12234b5e3192338b9bb35988cd3c8418a..eea4d4024be7ab5f49975cb9d91645640511ba89 100644
|
| --- a/net/cert/internal/parse_certificate_unittest.cc
|
| +++ b/net/cert/internal/parse_certificate_unittest.cc
|
| @@ -46,16 +46,14 @@ void EnsureParsingCertificateSucceeds(const std::string& file_name) {
|
|
|
| // Parsing the certificate should succeed.
|
| ParsedCertificate parsed;
|
| - ASSERT_TRUE(ParseCertificate(InputFromString(&data), &parsed));
|
| + ASSERT_TRUE(ParseCertificate(der::Input(&data), &parsed));
|
|
|
| // Ensure that the ParsedCertificate matches expectations.
|
| EXPECT_EQ(0, parsed.signature_value.unused_bits());
|
| - EXPECT_EQ(InputFromString(&expected_signature),
|
| - parsed.signature_value.bytes());
|
| - EXPECT_EQ(InputFromString(&expected_signature_algorithm),
|
| + EXPECT_EQ(der::Input(&expected_signature), parsed.signature_value.bytes());
|
| + EXPECT_EQ(der::Input(&expected_signature_algorithm),
|
| parsed.signature_algorithm_tlv);
|
| - EXPECT_EQ(InputFromString(&expected_tbs_certificate),
|
| - parsed.tbs_certificate_tlv);
|
| + EXPECT_EQ(der::Input(&expected_tbs_certificate), parsed.tbs_certificate_tlv);
|
| }
|
|
|
| // Loads certificate data from the PEM file |file_name| and verifies that the
|
| @@ -71,7 +69,7 @@ void EnsureParsingCertificateFails(const std::string& file_name) {
|
|
|
| // Parsing the Certificate should fail.
|
| ParsedCertificate parsed;
|
| - ASSERT_FALSE(ParseCertificate(InputFromString(&data), &parsed));
|
| + ASSERT_FALSE(ParseCertificate(der::Input(&data), &parsed));
|
| }
|
|
|
| // Tests parsing a Certificate.
|
| @@ -153,33 +151,33 @@ void EnsureParsingTbsSucceeds(const std::string& file_name,
|
|
|
| // Parsing the TBSCertificate should succeed.
|
| ParsedTbsCertificate parsed;
|
| - ASSERT_TRUE(ParseTbsCertificate(InputFromString(&data), &parsed));
|
| + ASSERT_TRUE(ParseTbsCertificate(der::Input(&data), &parsed));
|
|
|
| // Ensure that the ParsedTbsCertificate matches expectations.
|
| EXPECT_EQ(expected_version, parsed.version);
|
|
|
| - EXPECT_EQ(InputFromString(&expected_serial_number), parsed.serial_number);
|
| - EXPECT_EQ(InputFromString(&expected_signature_algorithm),
|
| + EXPECT_EQ(der::Input(&expected_serial_number), parsed.serial_number);
|
| + EXPECT_EQ(der::Input(&expected_signature_algorithm),
|
| parsed.signature_algorithm_tlv);
|
|
|
| - EXPECT_EQ(InputFromString(&expected_issuer), parsed.issuer_tlv);
|
| + EXPECT_EQ(der::Input(&expected_issuer), parsed.issuer_tlv);
|
|
|
| // In the test expectations PEM file, validity is described as a
|
| // textual string of the parsed value (rather than as DER).
|
| EXPECT_EQ(expected_validity_not_before, ToString(parsed.validity_not_before));
|
| EXPECT_EQ(expected_validity_not_after, ToString(parsed.validity_not_after));
|
|
|
| - EXPECT_EQ(InputFromString(&expected_subject), parsed.subject_tlv);
|
| - EXPECT_EQ(InputFromString(&expected_spki), parsed.spki_tlv);
|
| + EXPECT_EQ(der::Input(&expected_subject), parsed.subject_tlv);
|
| + EXPECT_EQ(der::Input(&expected_spki), parsed.spki_tlv);
|
|
|
| - EXPECT_EQ(InputFromString(&expected_issuer_unique_id),
|
| + EXPECT_EQ(der::Input(&expected_issuer_unique_id),
|
| parsed.issuer_unique_id.bytes());
|
| EXPECT_EQ(!expected_issuer_unique_id.empty(), parsed.has_issuer_unique_id);
|
| - EXPECT_EQ(InputFromString(&expected_subject_unique_id),
|
| + EXPECT_EQ(der::Input(&expected_subject_unique_id),
|
| parsed.subject_unique_id.bytes());
|
| EXPECT_EQ(!expected_subject_unique_id.empty(), parsed.has_subject_unique_id);
|
|
|
| - EXPECT_EQ(InputFromString(&expected_extensions), parsed.extensions_tlv);
|
| + EXPECT_EQ(der::Input(&expected_extensions), parsed.extensions_tlv);
|
| EXPECT_EQ(!expected_extensions.empty(), parsed.has_extensions);
|
| }
|
|
|
| @@ -196,7 +194,7 @@ void EnsureParsingTbsFails(const std::string& file_name) {
|
|
|
| // Parsing the TBSCertificate should fail.
|
| ParsedTbsCertificate parsed;
|
| - ASSERT_FALSE(ParseTbsCertificate(InputFromString(&data), &parsed));
|
| + ASSERT_FALSE(ParseTbsCertificate(der::Input(&data), &parsed));
|
| }
|
|
|
| // Tests parsing a TBSCertificate for v3 that contains no optional fields.
|
| @@ -336,7 +334,7 @@ bool ParseExtensionFromFile(const std::string& file_name,
|
| };
|
|
|
| EXPECT_TRUE(ReadTestDataFromPemFile(GetFilePath(file_name), mappings));
|
| - return ParseExtension(InputFromString(data), out);
|
| + return ParseExtension(der::Input(data), out);
|
| }
|
|
|
| // Parses an Extension whose critical field is true (255).
|
| @@ -404,7 +402,7 @@ void EnsureParsingExtensionsSucceeds(
|
| };
|
|
|
| ASSERT_TRUE(ReadTestDataFromPemFile(GetFilePath(file_name), mappings));
|
| - ASSERT_TRUE(ParseExtensions(InputFromString(data), extensions));
|
| + ASSERT_TRUE(ParseExtensions(der::Input(data), extensions));
|
| }
|
|
|
| // Runs a test that verifies extensions parsing fails. The input file is a PEM
|
| @@ -418,7 +416,7 @@ void EnsureParsingExtensionsFails(const std::string& file_name) {
|
|
|
| std::map<der::Input, ParsedExtension> extensions;
|
| ASSERT_TRUE(ReadTestDataFromPemFile(GetFilePath(file_name), mappings));
|
| - ASSERT_FALSE(ParseExtensions(InputFromString(&data), &extensions));
|
| + ASSERT_FALSE(ParseExtensions(der::Input(&data), &extensions));
|
| }
|
|
|
| // Parses an Extensions that is an empty sequence.
|
| @@ -591,7 +589,7 @@ bool ParseBasicConstraintsFromFile(const std::string& file_name,
|
| };
|
|
|
| EXPECT_TRUE(ReadTestDataFromPemFile(GetFilePath(file_name), mappings));
|
| - return ParseBasicConstraints(InputFromString(&data), out);
|
| + return ParseBasicConstraints(der::Input(&data), out);
|
| }
|
|
|
| // Parses a BasicConstraints with no CA or pathlen.
|
|
|