| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "chrome/common/net/x509_certificate_model.h" | 5 #include "chrome/common/net/x509_certificate_model.h" |
| 6 | 6 |
| 7 #include <stddef.h> | 7 #include <stddef.h> |
| 8 | 8 |
| 9 #include "base/files/file_path.h" | 9 #include "base/files/file_path.h" |
| 10 #include "net/base/test_data_directory.h" | 10 #include "net/base/test_data_directory.h" |
| (...skipping 407 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 418 " 01 00 01", | 418 " 01 00 01", |
| 419 x509_certificate_model::ProcessSubjectPublicKeyInfo( | 419 x509_certificate_model::ProcessSubjectPublicKeyInfo( |
| 420 cert->os_cert_handle())); | 420 cert->os_cert_handle())); |
| 421 } | 421 } |
| 422 { | 422 { |
| 423 scoped_refptr<net::X509Certificate> cert(net::ImportCertFromFile( | 423 scoped_refptr<net::X509Certificate> cert(net::ImportCertFromFile( |
| 424 net::GetTestCertsDirectory(), "prime256v1-ecdsa-intermediate.pem")); | 424 net::GetTestCertsDirectory(), "prime256v1-ecdsa-intermediate.pem")); |
| 425 ASSERT_TRUE(cert.get()); | 425 ASSERT_TRUE(cert.get()); |
| 426 | 426 |
| 427 EXPECT_EQ( | 427 EXPECT_EQ( |
| 428 "04 DB 98 07 BC 61 DD 2D E6 B3 CC F7 D5 EA F7 A1\n" | 428 "04 D5 C1 4A 32 95 95 C5 88 FA 01 FA C5 9E DC E2\n" |
| 429 "0D 28 DE F2 7C 26 97 CA EB D1 DB A3 1E C1 8F E9\n" | 429 "99 62 EB 13 E5 35 42 B3 7A FC 46 C0 FA 29 12 C8\n" |
| 430 "E0 1E FE 31 BB AA 4A 5C 85 37 A6 FF 9E 2E 96 23\n" | 430 "2D EA 30 0F D2 9A 47 97 2C 7E 89 E6 EF 49 55 06\n" |
| 431 "22 B8 30 5F 8F 22 AE B9 8B 6D 4F BD 4E F3 52 12\n" | 431 "C9 37 C7 99 56 16 B2 2B C9 7C 69 8E 10 7A DD 1F\n" |
| 432 "D4", | 432 "42", |
| 433 x509_certificate_model::ProcessSubjectPublicKeyInfo( | 433 x509_certificate_model::ProcessSubjectPublicKeyInfo( |
| 434 cert->os_cert_handle())); | 434 cert->os_cert_handle())); |
| 435 } | 435 } |
| 436 } | 436 } |
| 437 | 437 |
| 438 TEST(X509CertificateModelTest, ProcessRawBitsSignatureWrap) { | 438 TEST(X509CertificateModelTest, ProcessRawBitsSignatureWrap) { |
| 439 scoped_refptr<net::X509Certificate> cert(net::ImportCertFromFile( | 439 scoped_refptr<net::X509Certificate> cert(net::ImportCertFromFile( |
| 440 net::GetTestCertsDirectory(), "root_ca_cert.pem")); | 440 net::GetTestCertsDirectory(), "root_ca_cert.pem")); |
| 441 ASSERT_TRUE(cert.get()); | 441 ASSERT_TRUE(cert.get()); |
| 442 | 442 |
| (...skipping 10 matching lines...) Expand all Loading... |
| 453 "10 21 14 7F 1B 70 3D 89 1A 40 8A 06 2C 5D 50 19\n" | 453 "10 21 14 7F 1B 70 3D 89 1A 40 8A 06 2C 5D 50 19\n" |
| 454 "62 F9 C7 45 89 F2 3D 66 05 3D 7D 75 5B 55 1E 80\n" | 454 "62 F9 C7 45 89 F2 3D 66 05 3D 7D 75 5B 55 1E 80\n" |
| 455 "42 72 A1 9A 7C 6D 0A 74 F6 EE A6 21 6C 3A 98 FB\n" | 455 "42 72 A1 9A 7C 6D 0A 74 F6 EE A6 21 6C 3A 98 FB\n" |
| 456 "77 82 5F F2 6B 56 E6 DD 9B 8E 50 F0 C6 AE FD EA\n" | 456 "77 82 5F F2 6B 56 E6 DD 9B 8E 50 F0 C6 AE FD EA\n" |
| 457 "A6 05 07 A9 26 06 56 B3 B2 D9 B2 37 A0 21 3E 79\n" | 457 "A6 05 07 A9 26 06 56 B3 B2 D9 B2 37 A0 21 3E 79\n" |
| 458 "06 1F B9 51 BE F4 B1 49 4D 90 B5 33 E5 0E C7 5E\n" | 458 "06 1F B9 51 BE F4 B1 49 4D 90 B5 33 E5 0E C7 5E\n" |
| 459 "5B 40 C5 6A 04 D1 43 7A 94 6A A4 4F 61 FC 82 E0", | 459 "5B 40 C5 6A 04 D1 43 7A 94 6A A4 4F 61 FC 82 E0", |
| 460 x509_certificate_model::ProcessRawBitsSignatureWrap( | 460 x509_certificate_model::ProcessRawBitsSignatureWrap( |
| 461 cert->os_cert_handle())); | 461 cert->os_cert_handle())); |
| 462 } | 462 } |
| OLD | NEW |