| Index: net/android/keystore_unittest.cc
|
| diff --git a/net/android/keystore_unittest.cc b/net/android/keystore_unittest.cc
|
| index 3213731484fbd6b7d38377eb0a358906f0bc08c7..677e59aaa5c55ce93a038458f451f1ea1b3a674e 100644
|
| --- a/net/android/keystore_unittest.cc
|
| +++ b/net/android/keystore_unittest.cc
|
| @@ -51,6 +51,8 @@
|
| // Finally, it also checks that using the EVP_PKEY generated with
|
| // GetOpenSSLPrivateKeyWrapper() works correctly.
|
|
|
| +using base::android::JavaRef;
|
| +
|
| namespace net {
|
| namespace android {
|
|
|
| @@ -355,7 +357,7 @@ bool CompareSignatureWithOpenSSL(const base::StringPiece& message,
|
| // same key content.
|
| // |message| is a message.
|
| // |result| will receive the result.
|
| -void DoKeySigning(jobject android_key,
|
| +void DoKeySigning(const JavaRef<jobject>& android_key,
|
| EVP_PKEY* openssl_key,
|
| const base::StringPiece& message,
|
| std::string* result) {
|
| @@ -413,7 +415,7 @@ TEST(AndroidKeyStore, GetRSAKeyModulus) {
|
|
|
| // Retrieve the corresponding modulus through JNI
|
| std::vector<uint8_t> modulus_java;
|
| - ASSERT_TRUE(GetRSAKeyModulus(key_java.obj(), &modulus_java));
|
| + ASSERT_TRUE(GetRSAKeyModulus(key_java, &modulus_java));
|
|
|
| // Create an OpenSSL BIGNUM from it.
|
| crypto::ScopedBIGNUM bn(
|
| @@ -434,8 +436,7 @@ TEST(AndroidKeyStore,GetPrivateKeyTypeRSA) {
|
|
|
| ScopedJava rsa_key = GetRSATestKeyJava();
|
| ASSERT_FALSE(rsa_key.is_null());
|
| - EXPECT_EQ(PRIVATE_KEY_TYPE_RSA,
|
| - GetPrivateKeyType(rsa_key.obj()));
|
| + EXPECT_EQ(PRIVATE_KEY_TYPE_RSA, GetPrivateKeyType(rsa_key));
|
| }
|
|
|
| TEST(AndroidKeyStore,SignWithPrivateKeyRSA) {
|
| @@ -454,7 +455,7 @@ TEST(AndroidKeyStore,SignWithPrivateKeyRSA) {
|
| ASSERT_EQ(36U, message.size());
|
|
|
| std::string signature;
|
| - DoKeySigning(rsa_key.obj(), openssl_key.get(), message, &signature);
|
| + DoKeySigning(rsa_key, openssl_key.get(), message, &signature);
|
| ASSERT_TRUE(
|
| CompareSignatureWithOpenSSL(message, signature, openssl_key.get()));
|
| // All good.
|
| @@ -466,8 +467,7 @@ TEST(AndroidKeyStore,SignWithWrapperKeyRSA) {
|
| ScopedJava rsa_key = GetRSATestKeyJava();
|
| ASSERT_FALSE(rsa_key.is_null());
|
|
|
| - crypto::ScopedEVP_PKEY wrapper_key(
|
| - GetOpenSSLPrivateKeyWrapper(rsa_key.obj()));
|
| + crypto::ScopedEVP_PKEY wrapper_key(GetOpenSSLPrivateKeyWrapper(rsa_key));
|
| ASSERT_TRUE(wrapper_key.get() != NULL);
|
|
|
| crypto::ScopedEVP_PKEY openssl_key(ImportPrivateKeyFile(kTestRsaKeyFile));
|
| @@ -496,8 +496,7 @@ TEST(AndroidKeyStore,GetPrivateKeyTypeECDSA) {
|
|
|
| ScopedJava ecdsa_key = GetECDSATestKeyJava();
|
| ASSERT_FALSE(ecdsa_key.is_null());
|
| - EXPECT_EQ(PRIVATE_KEY_TYPE_ECDSA,
|
| - GetPrivateKeyType(ecdsa_key.obj()));
|
| + EXPECT_EQ(PRIVATE_KEY_TYPE_ECDSA, GetPrivateKeyType(ecdsa_key));
|
| }
|
|
|
| TEST(AndroidKeyStore,SignWithPrivateKeyECDSA) {
|
| @@ -509,7 +508,7 @@ TEST(AndroidKeyStore,SignWithPrivateKeyECDSA) {
|
|
|
| std::string message = kTestEcdsaHash;
|
| std::string signature;
|
| - DoKeySigning(ecdsa_key.obj(), openssl_key.get(), message, &signature);
|
| + DoKeySigning(ecdsa_key, openssl_key.get(), message, &signature);
|
| ASSERT_TRUE(VerifyTestECDSASignature(message, signature));
|
| }
|
|
|
| @@ -519,8 +518,7 @@ TEST(AndroidKeyStore, SignWithWrapperKeyECDSA) {
|
| ScopedJava ecdsa_key = GetECDSATestKeyJava();
|
| ASSERT_FALSE(ecdsa_key.is_null());
|
|
|
| - crypto::ScopedEVP_PKEY wrapper_key(
|
| - GetOpenSSLPrivateKeyWrapper(ecdsa_key.obj()));
|
| + crypto::ScopedEVP_PKEY wrapper_key(GetOpenSSLPrivateKeyWrapper(ecdsa_key));
|
| ASSERT_TRUE(wrapper_key.get());
|
|
|
| crypto::ScopedEVP_PKEY openssl_key(ImportPrivateKeyFile(kTestEcdsaKeyFile));
|
|
|