| Index: crypto/signature_creator_unittest.cc
|
| diff --git a/crypto/signature_creator_unittest.cc b/crypto/signature_creator_unittest.cc
|
| index af1a04212675a4a1f59cc1de88403ff8823b286c..fff065e58dd0f7e40a4b1a1ee22092f1721b9db9 100644
|
| --- a/crypto/signature_creator_unittest.cc
|
| +++ b/crypto/signature_creator_unittest.cc
|
| @@ -14,19 +14,6 @@
|
| #include "crypto/signature_verifier.h"
|
| #include "testing/gtest/include/gtest/gtest.h"
|
|
|
| -namespace {
|
| -
|
| -// This is the algorithm ID for SHA-1 with RSA encryption.
|
| -const uint8_t kSHA1WithRSAAlgorithmID[] = {0x30, 0x0d, 0x06, 0x09, 0x2a,
|
| - 0x86, 0x48, 0x86, 0xf7, 0x0d,
|
| - 0x01, 0x01, 0x05, 0x05, 0x00};
|
| -
|
| -// This is the algorithm ID for SHA-1 with RSA encryption.
|
| -const uint8_t kSHA256WithRSAAlgorithmID[] = {0x30, 0x0d, 0x06, 0x09, 0x2a,
|
| - 0x86, 0x48, 0x86, 0xf7, 0x0d,
|
| - 0x01, 0x01, 0x0B, 0x05, 0x00};
|
| -}
|
| -
|
| TEST(SignatureCreatorTest, BasicTest) {
|
| // Do a verify round trip.
|
| scoped_ptr<crypto::RSAPrivateKey> key_original(
|
| @@ -56,9 +43,8 @@ TEST(SignatureCreatorTest, BasicTest) {
|
|
|
| crypto::SignatureVerifier verifier;
|
| ASSERT_TRUE(verifier.VerifyInit(
|
| - kSHA1WithRSAAlgorithmID, sizeof(kSHA1WithRSAAlgorithmID),
|
| - &signature.front(), signature.size(),
|
| - &public_key_info.front(), public_key_info.size()));
|
| + crypto::SignatureVerifier::RSA_PKCS1_SHA1, &signature.front(),
|
| + signature.size(), &public_key_info.front(), public_key_info.size()));
|
|
|
| verifier.VerifyUpdate(reinterpret_cast<const uint8_t*>(data.c_str()),
|
| data.size());
|
| @@ -91,9 +77,8 @@ TEST(SignatureCreatorTest, SignDigestTest) {
|
| // Verify the input data.
|
| crypto::SignatureVerifier verifier;
|
| ASSERT_TRUE(verifier.VerifyInit(
|
| - kSHA1WithRSAAlgorithmID, sizeof(kSHA1WithRSAAlgorithmID),
|
| - &signature.front(), signature.size(),
|
| - &public_key_info.front(), public_key_info.size()));
|
| + crypto::SignatureVerifier::RSA_PKCS1_SHA1, &signature.front(),
|
| + signature.size(), &public_key_info.front(), public_key_info.size()));
|
|
|
| verifier.VerifyUpdate(reinterpret_cast<const uint8_t*>(data.c_str()),
|
| data.size());
|
| @@ -127,9 +112,8 @@ TEST(SignatureCreatorTest, SignSHA256DigestTest) {
|
| // Verify the input data.
|
| crypto::SignatureVerifier verifier;
|
| ASSERT_TRUE(verifier.VerifyInit(
|
| - kSHA256WithRSAAlgorithmID, sizeof(kSHA256WithRSAAlgorithmID),
|
| - &signature.front(), signature.size(),
|
| - &public_key_info.front(), public_key_info.size()));
|
| + crypto::SignatureVerifier::RSA_PKCS1_SHA256, &signature.front(),
|
| + signature.size(), &public_key_info.front(), public_key_info.size()));
|
|
|
| verifier.VerifyUpdate(reinterpret_cast<const uint8_t*>(data.c_str()),
|
| data.size());
|
|
|