Index: net/base/keygen_handler_unittest.cc |
diff --git a/net/base/keygen_handler_unittest.cc b/net/base/keygen_handler_unittest.cc |
index 5188d9d745c37947c4ed9384af4e0eae149232bf..04e154e35296514494546e53c8057cfa663a31da 100644 |
--- a/net/base/keygen_handler_unittest.cc |
+++ b/net/base/keygen_handler_unittest.cc |
@@ -15,10 +15,14 @@ |
#include "base/synchronization/waitable_event.h" |
#include "build/build_config.h" |
#include "crypto/nss_util.h" |
+#include "net/base/keygen_handler_test_util.h" |
#include "testing/gtest/include/gtest/gtest.h" |
#if defined(USE_NSS) |
#include <private/pprthred.h> // PR_DetachThread |
+ |
+#include "crypto/nss_util.h" |
+#include "crypto/nss_util_internal.h" |
#endif |
namespace net { |
@@ -31,54 +35,24 @@ class KeygenHandlerTest : public ::testing::Test { |
virtual ~KeygenHandlerTest() {} |
virtual void SetUp() { |
+#if defined(USE_NSS) |
+ crypto::EnsureNSSInit(); |
+#endif |
#if defined(OS_CHROMEOS) |
- crypto::OpenPersistentNSSDB(); |
+ crypto::OpenPersistentNSSDB(); |
#endif |
} |
}; |
-// Assert that |result| is a valid output for KeygenHandler given challenge |
-// string of |challenge|. |
-void AssertValidSignedPublicKeyAndChallenge(const std::string& result, |
- const std::string& challenge) { |
- ASSERT_GT(result.length(), 0U); |
- |
- // Verify it's valid base64: |
- std::string spkac; |
- ASSERT_TRUE(base::Base64Decode(result, &spkac)); |
- // In lieu of actually parsing and validating the DER data, |
- // just check that it exists and has a reasonable length. |
- // (It's almost always 590 bytes, but the DER encoding of the random key |
- // and signature could sometimes be a few bytes different.) |
- ASSERT_GE(spkac.length(), 200U); |
- ASSERT_LE(spkac.length(), 300U); |
- |
- // NOTE: |
- // The value of |result| can be validated by prefixing 'SPKAC=' to it |
- // and piping it through |
- // openssl spkac -verify |
- // whose output should look like: |
- // Netscape SPKI: |
- // Public Key Algorithm: rsaEncryption |
- // RSA Public Key: (2048 bit) |
- // Modulus (2048 bit): |
- // 00:b6:cc:14:c9:43:b5:2d:51:65:7e:11:8b:80:9e: ..... |
- // Exponent: 65537 (0x10001) |
- // Challenge String: some challenge |
- // Signature Algorithm: md5WithRSAEncryption |
- // 92:f3:cc:ff:0b:d3:d0:4a:3a:4c:ba:ff:d6:38:7f:a5:4b:b5: ..... |
- // Signature OK |
- // |
- // The value of |spkac| can be ASN.1-parsed with: |
- // openssl asn1parse -inform DER |
-} |
- |
TEST_F(KeygenHandlerTest, SmokeTest) { |
KeygenHandler handler(768, "some challenge", GURL("http://www.example.com")); |
+#if defined(USE_NSS) |
+ handler.set_key_slot(crypto::ScopedPK11Slot(crypto::GetPrivateNSSKeySlot())); |
+#endif |
handler.set_stores_key(false); // Don't leave the key-pair behind |
std::string result = handler.GenKeyAndSignChallenge(); |
VLOG(1) << "KeygenHandler produced: " << result; |
- AssertValidSignedPublicKeyAndChallenge(result, "some challenge"); |
+ AssertValidSignedPublicKeyAndChallenge(result, 768, "some challenge"); |
} |
void ConcurrencyTestCallback(base::WaitableEvent* event, |
@@ -88,6 +62,9 @@ void ConcurrencyTestCallback(base::WaitableEvent* event, |
// WaitableEvent to synchronize, so it's safe. |
base::ThreadRestrictions::ScopedAllowSingleton scoped_allow_singleton; |
KeygenHandler handler(768, challenge, GURL("http://www.example.com")); |
+#if defined(USE_NSS) |
+ handler.set_key_slot(crypto::ScopedPK11Slot(crypto::GetPrivateNSSKeySlot())); |
+#endif |
handler.set_stores_key(false); // Don't leave the key-pair behind. |
*result = handler.GenKeyAndSignChallenge(); |
event->Signal(); |
@@ -125,7 +102,7 @@ TEST_F(KeygenHandlerTest, ConcurrencyTest) { |
events[i] = NULL; |
VLOG(1) << "KeygenHandler " << i << " produced: " << results[i]; |
- AssertValidSignedPublicKeyAndChallenge(results[i], "some challenge"); |
+ AssertValidSignedPublicKeyAndChallenge(results[i], 768, "some challenge"); |
} |
} |