Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(192)

Side by Side Diff: net/cert/jwk_serializer_unittest.cc

Issue 266243004: Clang format slam. Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Created 6 years, 7 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 // Copyright 2013 The Chromium Authors. All rights reserved. 1 // Copyright 2013 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "net/cert/jwk_serializer.h" 5 #include "net/cert/jwk_serializer.h"
6 6
7 #include "base/base64.h" 7 #include "base/base64.h"
8 #include "base/values.h" 8 #include "base/values.h"
9 #include "testing/gtest/include/gtest/gtest.h" 9 #include "testing/gtest/include/gtest/gtest.h"
10 10
11 namespace net { 11 namespace net {
12 12
13 #if !defined(USE_OPENSSL) 13 #if !defined(USE_OPENSSL)
14 // This is the ASN.1 prefix for a P-256 public key. Specifically it's: 14 // This is the ASN.1 prefix for a P-256 public key. Specifically it's:
15 // SEQUENCE 15 // SEQUENCE
16 // SEQUENCE 16 // SEQUENCE
17 // OID id-ecPublicKey 17 // OID id-ecPublicKey
18 // OID prime256v1 18 // OID prime256v1
19 // BIT STRING, length 66, 0 trailing bits: 0x04 19 // BIT STRING, length 66, 0 trailing bits: 0x04
20 // 20 //
21 // The 0x04 in the BIT STRING is the prefix for an uncompressed, X9.62 21 // The 0x04 in the BIT STRING is the prefix for an uncompressed, X9.62
22 // public key. Following that are the two field elements as 32-byte, 22 // public key. Following that are the two field elements as 32-byte,
23 // big-endian numbers, as required by the Channel ID. 23 // big-endian numbers, as required by the Channel ID.
24 static const unsigned char kP256SpkiPrefix[] = { 24 static const unsigned char kP256SpkiPrefix[] = {
25 0x30, 0x59, 0x30, 0x13, 0x06, 0x07, 0x2a, 0x86, 25 0x30, 0x59, 0x30, 0x13, 0x06, 0x07, 0x2a, 0x86, 0x48,
26 0x48, 0xce, 0x3d, 0x02, 0x01, 0x06, 0x08, 0x2a, 26 0xce, 0x3d, 0x02, 0x01, 0x06, 0x08, 0x2a, 0x86, 0x48,
27 0x86, 0x48, 0xce, 0x3d, 0x03, 0x01, 0x07, 0x03, 27 0xce, 0x3d, 0x03, 0x01, 0x07, 0x03, 0x42, 0x00, 0x04};
28 0x42, 0x00, 0x04
29 };
30 static const unsigned int kEcCoordinateSize = 32U; 28 static const unsigned int kEcCoordinateSize = 32U;
31 #endif 29 #endif
32 30
33 // This is a valid P-256 public key. 31 // This is a valid P-256 public key.
34 static const unsigned char kSpkiEc[] = { 32 static const unsigned char kSpkiEc[] = {
35 0x30, 0x59, 0x30, 0x13, 0x06, 0x07, 0x2a, 0x86, 33 0x30, 0x59, 0x30, 0x13, 0x06, 0x07, 0x2a, 0x86, 0x48, 0xce, 0x3d, 0x02,
36 0x48, 0xce, 0x3d, 0x02, 0x01, 0x06, 0x08, 0x2a, 34 0x01, 0x06, 0x08, 0x2a, 0x86, 0x48, 0xce, 0x3d, 0x03, 0x01, 0x07, 0x03,
37 0x86, 0x48, 0xce, 0x3d, 0x03, 0x01, 0x07, 0x03, 35 0x42, 0x00, 0x04, 0x29, 0x5d, 0x6e, 0xfe, 0x33, 0x77, 0x26, 0xea, 0x5b,
38 0x42, 0x00, 0x04, 36 0xa4, 0xe6, 0x1b, 0x34, 0x6e, 0x7b, 0xa0, 0xa3, 0x8f, 0x33, 0x49, 0xa0,
39 0x29, 0x5d, 0x6e, 0xfe, 0x33, 0x77, 0x26, 0xea, 37 0x9c, 0xae, 0x98, 0xbd, 0x46, 0x0d, 0xf6, 0xd4, 0x5a, 0xdc, 0x8a, 0x1f,
40 0x5b, 0xa4, 0xe6, 0x1b, 0x34, 0x6e, 0x7b, 0xa0, 38 0x8a, 0xb2, 0x20, 0x51, 0xb7, 0xd2, 0x87, 0x0d, 0x53, 0x7e, 0x5d, 0x94,
41 0xa3, 0x8f, 0x33, 0x49, 0xa0, 0x9c, 0xae, 0x98, 39 0xa3, 0xe0, 0x34, 0x16, 0xa1, 0xcc, 0x10, 0x48, 0xcd, 0x70, 0x9c, 0x05,
42 0xbd, 0x46, 0x0d, 0xf6, 0xd4, 0x5a, 0xdc, 0x8a, 40 0xd3, 0xd2, 0xca, 0xdf, 0x44, 0x2f, 0xf4};
43 0x1f, 0x8a, 0xb2, 0x20, 0x51, 0xb7, 0xd2, 0x87,
44 0x0d, 0x53, 0x7e, 0x5d, 0x94, 0xa3, 0xe0, 0x34,
45 0x16, 0xa1, 0xcc, 0x10, 0x48, 0xcd, 0x70, 0x9c,
46 0x05, 0xd3, 0xd2, 0xca, 0xdf, 0x44, 0x2f, 0xf4
47 };
48 41
49 #if !defined(USE_OPENSSL) 42 #if !defined(USE_OPENSSL)
50 // This is a P-256 public key with 0 X and Y values. 43 // This is a P-256 public key with 0 X and Y values.
51 static const unsigned char kSpkiEcWithZeroXY[] = { 44 static const unsigned char kSpkiEcWithZeroXY[] = {
52 0x30, 0x59, 0x30, 0x13, 0x06, 0x07, 0x2a, 0x86, 45 0x30, 0x59, 0x30, 0x13, 0x06, 0x07, 0x2a, 0x86, 0x48, 0xce, 0x3d, 0x02,
53 0x48, 0xce, 0x3d, 0x02, 0x01, 0x06, 0x08, 0x2a, 46 0x01, 0x06, 0x08, 0x2a, 0x86, 0x48, 0xce, 0x3d, 0x03, 0x01, 0x07, 0x03,
54 0x86, 0x48, 0xce, 0x3d, 0x03, 0x01, 0x07, 0x03, 47 0x42, 0x00, 0x04, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
55 0x42, 0x00, 0x04, 48 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
56 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 49 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
57 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 50 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
58 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 51 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
59 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 52 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00};
60 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
61 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
62 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
63 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00
64 };
65 53
66 TEST(JwkSerializerNSSTest, ConvertSpkiFromDerToJwkEc) { 54 TEST(JwkSerializerNSSTest, ConvertSpkiFromDerToJwkEc) {
67 base::StringPiece spki; 55 base::StringPiece spki;
68 base::DictionaryValue public_key_jwk; 56 base::DictionaryValue public_key_jwk;
69 57
70 EXPECT_FALSE(JwkSerializer::ConvertSpkiFromDerToJwk(spki, &public_key_jwk)); 58 EXPECT_FALSE(JwkSerializer::ConvertSpkiFromDerToJwk(spki, &public_key_jwk));
71 EXPECT_TRUE(public_key_jwk.empty()); 59 EXPECT_TRUE(public_key_jwk.empty());
72 60
73 // Test the result of a "normal" point on this curve. 61 // Test the result of a "normal" point on this curve.
74 spki.set(reinterpret_cast<const char*>(kSpkiEc), sizeof(kSpkiEc)); 62 spki.set(reinterpret_cast<const char*>(kSpkiEc), sizeof(kSpkiEc));
(...skipping 12 matching lines...) Expand all
87 EXPECT_EQ(0, 75 EXPECT_EQ(0,
88 memcmp(decoded_coordinate.data(), 76 memcmp(decoded_coordinate.data(),
89 kSpkiEc + sizeof(kP256SpkiPrefix), 77 kSpkiEc + sizeof(kP256SpkiPrefix),
90 kEcCoordinateSize)); 78 kEcCoordinateSize));
91 79
92 EXPECT_TRUE(public_key_jwk.GetString("y", &string_value)); 80 EXPECT_TRUE(public_key_jwk.GetString("y", &string_value));
93 EXPECT_TRUE(base::Base64Decode(string_value, &decoded_coordinate)); 81 EXPECT_TRUE(base::Base64Decode(string_value, &decoded_coordinate));
94 EXPECT_EQ(kEcCoordinateSize, decoded_coordinate.size()); 82 EXPECT_EQ(kEcCoordinateSize, decoded_coordinate.size());
95 EXPECT_EQ(0, 83 EXPECT_EQ(0,
96 memcmp(decoded_coordinate.data(), 84 memcmp(decoded_coordinate.data(),
97 kSpkiEc + sizeof(kP256SpkiPrefix) + kEcCoordinateSize, 85 kSpkiEc + sizeof(kP256SpkiPrefix) + kEcCoordinateSize,
98 kEcCoordinateSize)); 86 kEcCoordinateSize));
99 87
100 // Test the result of a corner case: leading 0s in the x, y coordinates are 88 // Test the result of a corner case: leading 0s in the x, y coordinates are
101 // not trimmed, but the point is fixed-length encoded. 89 // not trimmed, but the point is fixed-length encoded.
102 spki.set(reinterpret_cast<const char*>(kSpkiEcWithZeroXY), 90 spki.set(reinterpret_cast<const char*>(kSpkiEcWithZeroXY),
103 sizeof(kSpkiEcWithZeroXY)); 91 sizeof(kSpkiEcWithZeroXY));
104 EXPECT_TRUE(JwkSerializer::ConvertSpkiFromDerToJwk(spki, &public_key_jwk)); 92 EXPECT_TRUE(JwkSerializer::ConvertSpkiFromDerToJwk(spki, &public_key_jwk));
105 93
106 EXPECT_TRUE(public_key_jwk.GetString("kty", &string_value)); 94 EXPECT_TRUE(public_key_jwk.GetString("kty", &string_value));
107 EXPECT_STREQ("EC", string_value.c_str()); 95 EXPECT_STREQ("EC", string_value.c_str());
108 EXPECT_TRUE(public_key_jwk.GetString("crv", &string_value)); 96 EXPECT_TRUE(public_key_jwk.GetString("crv", &string_value));
109 EXPECT_STREQ("P-256", string_value.c_str()); 97 EXPECT_STREQ("P-256", string_value.c_str());
110 98
111 EXPECT_TRUE(public_key_jwk.GetString("x", &string_value)); 99 EXPECT_TRUE(public_key_jwk.GetString("x", &string_value));
112 EXPECT_TRUE(base::Base64Decode(string_value, &decoded_coordinate)); 100 EXPECT_TRUE(base::Base64Decode(string_value, &decoded_coordinate));
113 EXPECT_EQ(kEcCoordinateSize, decoded_coordinate.size()); 101 EXPECT_EQ(kEcCoordinateSize, decoded_coordinate.size());
114 EXPECT_EQ(0, 102 EXPECT_EQ(0,
115 memcmp(decoded_coordinate.data(), 103 memcmp(decoded_coordinate.data(),
116 kSpkiEcWithZeroXY + sizeof(kP256SpkiPrefix), 104 kSpkiEcWithZeroXY + sizeof(kP256SpkiPrefix),
117 kEcCoordinateSize)); 105 kEcCoordinateSize));
118 106
119 EXPECT_TRUE(public_key_jwk.GetString("y", &string_value)); 107 EXPECT_TRUE(public_key_jwk.GetString("y", &string_value));
120 EXPECT_TRUE(base::Base64Decode(string_value, &decoded_coordinate)); 108 EXPECT_TRUE(base::Base64Decode(string_value, &decoded_coordinate));
121 EXPECT_EQ(kEcCoordinateSize, decoded_coordinate.size()); 109 EXPECT_EQ(kEcCoordinateSize, decoded_coordinate.size());
122 EXPECT_EQ(0, 110 EXPECT_EQ(
111 0,
123 memcmp(decoded_coordinate.data(), 112 memcmp(decoded_coordinate.data(),
124 kSpkiEcWithZeroXY + sizeof(kP256SpkiPrefix) + kEcCoordinateSize, 113 kSpkiEcWithZeroXY + sizeof(kP256SpkiPrefix) + kEcCoordinateSize,
125 kEcCoordinateSize)); 114 kEcCoordinateSize));
126 } 115 }
127 116
128 #else 117 #else
129 118
130 // For OpenSSL, JwkSerializer::ConvertSpkiFromDerToJwk() is not yet implemented 119 // For OpenSSL, JwkSerializer::ConvertSpkiFromDerToJwk() is not yet implemented
131 // and should return false. This unit test ensures that a stub implementation 120 // and should return false. This unit test ensures that a stub implementation
132 // is present. 121 // is present.
133 TEST(JwkSerializerOpenSSLTest, ConvertSpkiFromDerToJwkNotImplemented) { 122 TEST(JwkSerializerOpenSSLTest, ConvertSpkiFromDerToJwkNotImplemented) {
134 base::StringPiece spki; 123 base::StringPiece spki;
135 base::DictionaryValue public_key_jwk; 124 base::DictionaryValue public_key_jwk;
136 125
137 // The empty SPKI is trivially non-convertible... 126 // The empty SPKI is trivially non-convertible...
138 EXPECT_FALSE(JwkSerializer::ConvertSpkiFromDerToJwk(spki, &public_key_jwk)); 127 EXPECT_FALSE(JwkSerializer::ConvertSpkiFromDerToJwk(spki, &public_key_jwk));
139 EXPECT_TRUE(public_key_jwk.empty()); 128 EXPECT_TRUE(public_key_jwk.empty());
140 // but even a valid SPKI is non-convertible via the stub OpenSSL 129 // but even a valid SPKI is non-convertible via the stub OpenSSL
141 // implementation. 130 // implementation.
142 spki.set(reinterpret_cast<const char*>(kSpkiEc), sizeof(kSpkiEc)); 131 spki.set(reinterpret_cast<const char*>(kSpkiEc), sizeof(kSpkiEc));
143 EXPECT_FALSE(JwkSerializer::ConvertSpkiFromDerToJwk(spki, &public_key_jwk)); 132 EXPECT_FALSE(JwkSerializer::ConvertSpkiFromDerToJwk(spki, &public_key_jwk));
144 EXPECT_TRUE(public_key_jwk.empty()); 133 EXPECT_TRUE(public_key_jwk.empty());
145 } 134 }
146 135
147 #endif // !defined(USE_OPENSSL) 136 #endif // !defined(USE_OPENSSL)
148 137
149 } // namespace net 138 } // namespace net
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698