OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/common/net/x509_certificate_model.h" | 5 #include "chrome/common/net/x509_certificate_model.h" |
6 | 6 |
7 #include <stddef.h> | 7 #include <stddef.h> |
8 | 8 |
9 #include "base/files/file_path.h" | 9 #include "base/files/file_path.h" |
10 #include "net/base/test_data_directory.h" | 10 #include "net/base/test_data_directory.h" |
(...skipping 407 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
418 " 01 00 01", | 418 " 01 00 01", |
419 x509_certificate_model::ProcessSubjectPublicKeyInfo( | 419 x509_certificate_model::ProcessSubjectPublicKeyInfo( |
420 cert->os_cert_handle())); | 420 cert->os_cert_handle())); |
421 } | 421 } |
422 { | 422 { |
423 scoped_refptr<net::X509Certificate> cert(net::ImportCertFromFile( | 423 scoped_refptr<net::X509Certificate> cert(net::ImportCertFromFile( |
424 net::GetTestCertsDirectory(), "prime256v1-ecdsa-intermediate.pem")); | 424 net::GetTestCertsDirectory(), "prime256v1-ecdsa-intermediate.pem")); |
425 ASSERT_TRUE(cert.get()); | 425 ASSERT_TRUE(cert.get()); |
426 | 426 |
427 EXPECT_EQ( | 427 EXPECT_EQ( |
428 "04 DB 98 07 BC 61 DD 2D E6 B3 CC F7 D5 EA F7 A1\n" | 428 "04 D5 C1 4A 32 95 95 C5 88 FA 01 FA C5 9E DC E2\n" |
429 "0D 28 DE F2 7C 26 97 CA EB D1 DB A3 1E C1 8F E9\n" | 429 "99 62 EB 13 E5 35 42 B3 7A FC 46 C0 FA 29 12 C8\n" |
430 "E0 1E FE 31 BB AA 4A 5C 85 37 A6 FF 9E 2E 96 23\n" | 430 "2D EA 30 0F D2 9A 47 97 2C 7E 89 E6 EF 49 55 06\n" |
431 "22 B8 30 5F 8F 22 AE B9 8B 6D 4F BD 4E F3 52 12\n" | 431 "C9 37 C7 99 56 16 B2 2B C9 7C 69 8E 10 7A DD 1F\n" |
432 "D4", | 432 "42", |
433 x509_certificate_model::ProcessSubjectPublicKeyInfo( | 433 x509_certificate_model::ProcessSubjectPublicKeyInfo( |
434 cert->os_cert_handle())); | 434 cert->os_cert_handle())); |
435 } | 435 } |
436 } | 436 } |
437 | 437 |
438 TEST(X509CertificateModelTest, ProcessRawBitsSignatureWrap) { | 438 TEST(X509CertificateModelTest, ProcessRawBitsSignatureWrap) { |
439 scoped_refptr<net::X509Certificate> cert(net::ImportCertFromFile( | 439 scoped_refptr<net::X509Certificate> cert(net::ImportCertFromFile( |
440 net::GetTestCertsDirectory(), "root_ca_cert.pem")); | 440 net::GetTestCertsDirectory(), "root_ca_cert.pem")); |
441 ASSERT_TRUE(cert.get()); | 441 ASSERT_TRUE(cert.get()); |
442 | 442 |
(...skipping 10 matching lines...) Expand all Loading... |
453 "10 21 14 7F 1B 70 3D 89 1A 40 8A 06 2C 5D 50 19\n" | 453 "10 21 14 7F 1B 70 3D 89 1A 40 8A 06 2C 5D 50 19\n" |
454 "62 F9 C7 45 89 F2 3D 66 05 3D 7D 75 5B 55 1E 80\n" | 454 "62 F9 C7 45 89 F2 3D 66 05 3D 7D 75 5B 55 1E 80\n" |
455 "42 72 A1 9A 7C 6D 0A 74 F6 EE A6 21 6C 3A 98 FB\n" | 455 "42 72 A1 9A 7C 6D 0A 74 F6 EE A6 21 6C 3A 98 FB\n" |
456 "77 82 5F F2 6B 56 E6 DD 9B 8E 50 F0 C6 AE FD EA\n" | 456 "77 82 5F F2 6B 56 E6 DD 9B 8E 50 F0 C6 AE FD EA\n" |
457 "A6 05 07 A9 26 06 56 B3 B2 D9 B2 37 A0 21 3E 79\n" | 457 "A6 05 07 A9 26 06 56 B3 B2 D9 B2 37 A0 21 3E 79\n" |
458 "06 1F B9 51 BE F4 B1 49 4D 90 B5 33 E5 0E C7 5E\n" | 458 "06 1F B9 51 BE F4 B1 49 4D 90 B5 33 E5 0E C7 5E\n" |
459 "5B 40 C5 6A 04 D1 43 7A 94 6A A4 4F 61 FC 82 E0", | 459 "5B 40 C5 6A 04 D1 43 7A 94 6A A4 4F 61 FC 82 E0", |
460 x509_certificate_model::ProcessRawBitsSignatureWrap( | 460 x509_certificate_model::ProcessRawBitsSignatureWrap( |
461 cert->os_cert_handle())); | 461 cert->os_cert_handle())); |
462 } | 462 } |
OLD | NEW |