Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(368)

Unified Diff: net/cert/internal/parse_certificate_unittest.cc

Issue 1573243011: Refactor der::Input helper methods into new constructors (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: fix nits Created 4 years, 11 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « net/cert/internal/name_constraints_unittest.cc ('k') | net/cert/internal/test_helpers.h » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: net/cert/internal/parse_certificate_unittest.cc
diff --git a/net/cert/internal/parse_certificate_unittest.cc b/net/cert/internal/parse_certificate_unittest.cc
index 727644c12234b5e3192338b9bb35988cd3c8418a..eea4d4024be7ab5f49975cb9d91645640511ba89 100644
--- a/net/cert/internal/parse_certificate_unittest.cc
+++ b/net/cert/internal/parse_certificate_unittest.cc
@@ -46,16 +46,14 @@ void EnsureParsingCertificateSucceeds(const std::string& file_name) {
// Parsing the certificate should succeed.
ParsedCertificate parsed;
- ASSERT_TRUE(ParseCertificate(InputFromString(&data), &parsed));
+ ASSERT_TRUE(ParseCertificate(der::Input(&data), &parsed));
// Ensure that the ParsedCertificate matches expectations.
EXPECT_EQ(0, parsed.signature_value.unused_bits());
- EXPECT_EQ(InputFromString(&expected_signature),
- parsed.signature_value.bytes());
- EXPECT_EQ(InputFromString(&expected_signature_algorithm),
+ EXPECT_EQ(der::Input(&expected_signature), parsed.signature_value.bytes());
+ EXPECT_EQ(der::Input(&expected_signature_algorithm),
parsed.signature_algorithm_tlv);
- EXPECT_EQ(InputFromString(&expected_tbs_certificate),
- parsed.tbs_certificate_tlv);
+ EXPECT_EQ(der::Input(&expected_tbs_certificate), parsed.tbs_certificate_tlv);
}
// Loads certificate data from the PEM file |file_name| and verifies that the
@@ -71,7 +69,7 @@ void EnsureParsingCertificateFails(const std::string& file_name) {
// Parsing the Certificate should fail.
ParsedCertificate parsed;
- ASSERT_FALSE(ParseCertificate(InputFromString(&data), &parsed));
+ ASSERT_FALSE(ParseCertificate(der::Input(&data), &parsed));
}
// Tests parsing a Certificate.
@@ -153,33 +151,33 @@ void EnsureParsingTbsSucceeds(const std::string& file_name,
// Parsing the TBSCertificate should succeed.
ParsedTbsCertificate parsed;
- ASSERT_TRUE(ParseTbsCertificate(InputFromString(&data), &parsed));
+ ASSERT_TRUE(ParseTbsCertificate(der::Input(&data), &parsed));
// Ensure that the ParsedTbsCertificate matches expectations.
EXPECT_EQ(expected_version, parsed.version);
- EXPECT_EQ(InputFromString(&expected_serial_number), parsed.serial_number);
- EXPECT_EQ(InputFromString(&expected_signature_algorithm),
+ EXPECT_EQ(der::Input(&expected_serial_number), parsed.serial_number);
+ EXPECT_EQ(der::Input(&expected_signature_algorithm),
parsed.signature_algorithm_tlv);
- EXPECT_EQ(InputFromString(&expected_issuer), parsed.issuer_tlv);
+ EXPECT_EQ(der::Input(&expected_issuer), parsed.issuer_tlv);
// In the test expectations PEM file, validity is described as a
// textual string of the parsed value (rather than as DER).
EXPECT_EQ(expected_validity_not_before, ToString(parsed.validity_not_before));
EXPECT_EQ(expected_validity_not_after, ToString(parsed.validity_not_after));
- EXPECT_EQ(InputFromString(&expected_subject), parsed.subject_tlv);
- EXPECT_EQ(InputFromString(&expected_spki), parsed.spki_tlv);
+ EXPECT_EQ(der::Input(&expected_subject), parsed.subject_tlv);
+ EXPECT_EQ(der::Input(&expected_spki), parsed.spki_tlv);
- EXPECT_EQ(InputFromString(&expected_issuer_unique_id),
+ EXPECT_EQ(der::Input(&expected_issuer_unique_id),
parsed.issuer_unique_id.bytes());
EXPECT_EQ(!expected_issuer_unique_id.empty(), parsed.has_issuer_unique_id);
- EXPECT_EQ(InputFromString(&expected_subject_unique_id),
+ EXPECT_EQ(der::Input(&expected_subject_unique_id),
parsed.subject_unique_id.bytes());
EXPECT_EQ(!expected_subject_unique_id.empty(), parsed.has_subject_unique_id);
- EXPECT_EQ(InputFromString(&expected_extensions), parsed.extensions_tlv);
+ EXPECT_EQ(der::Input(&expected_extensions), parsed.extensions_tlv);
EXPECT_EQ(!expected_extensions.empty(), parsed.has_extensions);
}
@@ -196,7 +194,7 @@ void EnsureParsingTbsFails(const std::string& file_name) {
// Parsing the TBSCertificate should fail.
ParsedTbsCertificate parsed;
- ASSERT_FALSE(ParseTbsCertificate(InputFromString(&data), &parsed));
+ ASSERT_FALSE(ParseTbsCertificate(der::Input(&data), &parsed));
}
// Tests parsing a TBSCertificate for v3 that contains no optional fields.
@@ -336,7 +334,7 @@ bool ParseExtensionFromFile(const std::string& file_name,
};
EXPECT_TRUE(ReadTestDataFromPemFile(GetFilePath(file_name), mappings));
- return ParseExtension(InputFromString(data), out);
+ return ParseExtension(der::Input(data), out);
}
// Parses an Extension whose critical field is true (255).
@@ -404,7 +402,7 @@ void EnsureParsingExtensionsSucceeds(
};
ASSERT_TRUE(ReadTestDataFromPemFile(GetFilePath(file_name), mappings));
- ASSERT_TRUE(ParseExtensions(InputFromString(data), extensions));
+ ASSERT_TRUE(ParseExtensions(der::Input(data), extensions));
}
// Runs a test that verifies extensions parsing fails. The input file is a PEM
@@ -418,7 +416,7 @@ void EnsureParsingExtensionsFails(const std::string& file_name) {
std::map<der::Input, ParsedExtension> extensions;
ASSERT_TRUE(ReadTestDataFromPemFile(GetFilePath(file_name), mappings));
- ASSERT_FALSE(ParseExtensions(InputFromString(&data), &extensions));
+ ASSERT_FALSE(ParseExtensions(der::Input(&data), &extensions));
}
// Parses an Extensions that is an empty sequence.
@@ -591,7 +589,7 @@ bool ParseBasicConstraintsFromFile(const std::string& file_name,
};
EXPECT_TRUE(ReadTestDataFromPemFile(GetFilePath(file_name), mappings));
- return ParseBasicConstraints(InputFromString(&data), out);
+ return ParseBasicConstraints(der::Input(&data), out);
}
// Parses a BasicConstraints with no CA or pathlen.
« no previous file with comments | « net/cert/internal/name_constraints_unittest.cc ('k') | net/cert/internal/test_helpers.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698