| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "chrome/common/net/x509_certificate_model.h" | 5 #include "chrome/common/net/x509_certificate_model.h" |
| 6 | 6 |
| 7 #include <stddef.h> | 7 #include <stddef.h> |
| 8 | 8 |
| 9 #include "base/files/file_path.h" | 9 #include "base/files/file_path.h" |
| 10 #include "net/test/cert_test_util.h" | 10 #include "net/test/cert_test_util.h" |
| (...skipping 58 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 69 ASSERT_EQ(3U, extensions.size()); | 69 ASSERT_EQ(3U, extensions.size()); |
| 70 | 70 |
| 71 EXPECT_EQ("Certificate Basic Constraints", extensions[0].name); | 71 EXPECT_EQ("Certificate Basic Constraints", extensions[0].name); |
| 72 EXPECT_EQ( | 72 EXPECT_EQ( |
| 73 "critical\nIs a Certification Authority\n" | 73 "critical\nIs a Certification Authority\n" |
| 74 "Maximum number of intermediate CAs: unlimited", | 74 "Maximum number of intermediate CAs: unlimited", |
| 75 extensions[0].value); | 75 extensions[0].value); |
| 76 | 76 |
| 77 EXPECT_EQ("Certificate Subject Key ID", extensions[1].name); | 77 EXPECT_EQ("Certificate Subject Key ID", extensions[1].name); |
| 78 EXPECT_EQ( | 78 EXPECT_EQ( |
| 79 "notcrit\nKey ID: BC F7 30 D1 3C C0 F2 79 FA EF 9F C9 6C 5C 93 F3\n8A " | 79 "notcrit\nKey ID: 9B 26 0B 8A 98 A9 BB 1D B9 1F 1C E3 1A 40 33 ED\n8E " |
| 80 "68 AB 83", | 80 "17 88 AB", |
| 81 extensions[1].value); | 81 extensions[1].value); |
| 82 | 82 |
| 83 EXPECT_EQ("Certificate Key Usage", extensions[2].name); | 83 EXPECT_EQ("Certificate Key Usage", extensions[2].name); |
| 84 EXPECT_EQ("critical\nCertificate Signer\nCRL Signer", extensions[2].value); | 84 EXPECT_EQ("critical\nCertificate Signer\nCRL Signer", extensions[2].value); |
| 85 } | 85 } |
| 86 | 86 |
| 87 { | 87 { |
| 88 scoped_refptr<net::X509Certificate> cert(net::ImportCertFromFile( | 88 scoped_refptr<net::X509Certificate> cert(net::ImportCertFromFile( |
| 89 net::GetTestCertsDirectory(), "subjectAltName_sanity_check.pem")); | 89 net::GetTestCertsDirectory(), "subjectAltName_sanity_check.pem")); |
| 90 ASSERT_TRUE(cert.get()); | 90 ASSERT_TRUE(cert.get()); |
| (...skipping 232 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 323 EXPECT_TRUE(certs[0]->Equals(decoded_certs[0].get())); | 323 EXPECT_TRUE(certs[0]->Equals(decoded_certs[0].get())); |
| 324 } | 324 } |
| 325 } | 325 } |
| 326 | 326 |
| 327 TEST(X509CertificateModelTest, ProcessSecAlgorithms) { | 327 TEST(X509CertificateModelTest, ProcessSecAlgorithms) { |
| 328 { | 328 { |
| 329 scoped_refptr<net::X509Certificate> cert(net::ImportCertFromFile( | 329 scoped_refptr<net::X509Certificate> cert(net::ImportCertFromFile( |
| 330 net::GetTestCertsDirectory(), "root_ca_cert.pem")); | 330 net::GetTestCertsDirectory(), "root_ca_cert.pem")); |
| 331 ASSERT_TRUE(cert.get()); | 331 ASSERT_TRUE(cert.get()); |
| 332 | 332 |
| 333 EXPECT_EQ("PKCS #1 SHA-1 With RSA Encryption", | 333 EXPECT_EQ("PKCS #1 SHA-256 With RSA Encryption", |
| 334 x509_certificate_model::ProcessSecAlgorithmSignature( | 334 x509_certificate_model::ProcessSecAlgorithmSignature( |
| 335 cert->os_cert_handle())); | 335 cert->os_cert_handle())); |
| 336 EXPECT_EQ("PKCS #1 SHA-1 With RSA Encryption", | 336 EXPECT_EQ("PKCS #1 SHA-256 With RSA Encryption", |
| 337 x509_certificate_model::ProcessSecAlgorithmSignatureWrap( | 337 x509_certificate_model::ProcessSecAlgorithmSignatureWrap( |
| 338 cert->os_cert_handle())); | 338 cert->os_cert_handle())); |
| 339 EXPECT_EQ("PKCS #1 RSA Encryption", | 339 EXPECT_EQ("PKCS #1 RSA Encryption", |
| 340 x509_certificate_model::ProcessSecAlgorithmSubjectPublicKey( | 340 x509_certificate_model::ProcessSecAlgorithmSubjectPublicKey( |
| 341 cert->os_cert_handle())); | 341 cert->os_cert_handle())); |
| 342 } | 342 } |
| 343 { | 343 { |
| 344 scoped_refptr<net::X509Certificate> cert(net::ImportCertFromFile( | 344 scoped_refptr<net::X509Certificate> cert(net::ImportCertFromFile( |
| 345 net::GetTestCertsDirectory(), "weak_digest_md5_root.pem")); | 345 net::GetTestCertsDirectory(), "weak_digest_md5_root.pem")); |
| 346 ASSERT_TRUE(cert.get()); | 346 ASSERT_TRUE(cert.get()); |
| (...skipping 11 matching lines...) Expand all Loading... |
| 358 } | 358 } |
| 359 | 359 |
| 360 TEST(X509CertificateModelTest, ProcessSubjectPublicKeyInfo) { | 360 TEST(X509CertificateModelTest, ProcessSubjectPublicKeyInfo) { |
| 361 { | 361 { |
| 362 scoped_refptr<net::X509Certificate> cert(net::ImportCertFromFile( | 362 scoped_refptr<net::X509Certificate> cert(net::ImportCertFromFile( |
| 363 net::GetTestCertsDirectory(), "root_ca_cert.pem")); | 363 net::GetTestCertsDirectory(), "root_ca_cert.pem")); |
| 364 ASSERT_TRUE(cert.get()); | 364 ASSERT_TRUE(cert.get()); |
| 365 | 365 |
| 366 EXPECT_EQ( | 366 EXPECT_EQ( |
| 367 "Modulus (2048 bits):\n" | 367 "Modulus (2048 bits):\n" |
| 368 " B6 49 41 E3 42 01 51 A8 7F 3C 7A 71 D3 FB CD 91\n" | 368 " C6 81 1F 92 73 B6 58 85 D9 8D AC B7 20 FD C7 BF\n" |
| 369 "35 17 84 1A 8E F6 36 C7 D1 70 1D FA 86 F3 6E BB\n" | 369 "40 B2 EA FA E5 0B 52 01 8F 9A C1 EB 7A 80 C1 F3\n" |
| 370 "76 6F E8 32 2E 37 FD 38 92 3D 68 E4 8A 7D 42 33\n" | 370 "89 A4 3E D5 1B 61 CC B5 CF 80 B1 1A DB BB 25 E0\n" |
| 371 "14 46 1B DC 04 F6 91 6E 54 40 C4 0A 09 FD EC 2D\n" | 371 "18 BF 92 69 26 50 CD E7 3F FF 0D 3C B4 1F 14 12\n" |
| 372 "62 E2 5E E1 BA 2C 9C C1 B1 60 4C DA C7 F8 22 5C\n" | 372 "AB 67 37 DE 07 03 6C 12 74 82 36 AC C3 D4 D3 64\n" |
| 373 "82 20 65 42 1E 56 77 75 4F EB 90 2C 4A EA 57 0E\n" | 373 "9F 91 ED 5B F6 A9 7A A4 9C 98 E8 65 6C 94 E1 CB\n" |
| 374 "22 8D 6C 95 AC 11 EA CC D7 EE F6 70 0D 09 DD A6\n" | 374 "55 73 AE F8 1D 50 B0 78 E5 74 FF B1 37 2C CB 19\n" |
| 375 "35 61 5D C9 76 6D B0 F2 1E BF 30 86 D8 77 52 36\n" | 375 "3D A4 8C E7 76 4E 86 5C 3F DF B3 ED 45 23 4F 54\n" |
| 376 "95 97 0E D1 46 C5 ED 81 3D 1B B0 F2 61 95 3C C1\n" | 376 "9B 33 C6 89 5E 13 1D DD 7D 59 A5 07 34 28 86 27\n" |
| 377 "40 38 EF 5F 5D BA 61 9F EF 2B 9C 9F 85 89 74 70\n" | 377 "1F FA 9E 53 4F 2A B6 42 AD 37 12 62 F5 72 36 B6\n" |
| 378 "63 D5 76 E8 35 7E CE 01 E1 F3 11 11 90 1C 0D F5\n" | 378 "02 12 40 44 FE C7 9E 95 89 43 51 5E B4 6E C7 67\n" |
| 379 "FD 8D CE 10 6C AD 7C 55 1A 21 6F D7 2D F4 78 15\n" | 379 "80 58 43 BE CC 07 28 BD 59 FF 1C 4C 8D 90 42 F4\n" |
| 380 "EA 2F 38 BD 91 9E 3C 1D 07 46 F5 43 C1 82 8B AF\n" | 380 "CF FD 54 00 4F 48 72 2B E1 67 3C 84 17 68 95 BF\n" |
| 381 "12 53 65 19 8A 69 69 66 06 B2 DA 0B FA 2A 00 A1\n" | 381 "CA 07 7B DF 86 9D 56 E3 32 E3 70 87 B7 F8 3A F7\n" |
| 382 "2A 15 84 49 F1 01 BF 9B 30 06 D0 15 A0 1F 9D 51\n" | 382 "E3 6E 65 14 7C BB 76 B7 17 F1 42 8C 6F 2A 34 64\n" |
| 383 "91 47 E1 53 5F EF 5E EC C2 61 79 C2 14 9F C4 E3\n" | 383 "10 35 14 8C 85 F6 57 BF F3 5C 55 9D AD 03 10 F3\n" |
| 384 "\n" | 384 "\n" |
| 385 " Public Exponent (24 bits):\n" | 385 " Public Exponent (24 bits):\n" |
| 386 " 01 00 01", | 386 " 01 00 01", |
| 387 x509_certificate_model::ProcessSubjectPublicKeyInfo( | 387 x509_certificate_model::ProcessSubjectPublicKeyInfo( |
| 388 cert->os_cert_handle())); | 388 cert->os_cert_handle())); |
| 389 } | 389 } |
| 390 { | 390 { |
| 391 scoped_refptr<net::X509Certificate> cert(net::ImportCertFromFile( | 391 scoped_refptr<net::X509Certificate> cert(net::ImportCertFromFile( |
| 392 net::GetTestCertsDirectory(), "prime256v1-ecdsa-intermediate.pem")); | 392 net::GetTestCertsDirectory(), "prime256v1-ecdsa-intermediate.pem")); |
| 393 ASSERT_TRUE(cert.get()); | 393 ASSERT_TRUE(cert.get()); |
| 394 | 394 |
| 395 EXPECT_EQ( | 395 EXPECT_EQ( |
| 396 "04 D5 C1 4A 32 95 95 C5 88 FA 01 FA C5 9E DC E2\n" | 396 "04 D5 C1 4A 32 95 95 C5 88 FA 01 FA C5 9E DC E2\n" |
| 397 "99 62 EB 13 E5 35 42 B3 7A FC 46 C0 FA 29 12 C8\n" | 397 "99 62 EB 13 E5 35 42 B3 7A FC 46 C0 FA 29 12 C8\n" |
| 398 "2D EA 30 0F D2 9A 47 97 2C 7E 89 E6 EF 49 55 06\n" | 398 "2D EA 30 0F D2 9A 47 97 2C 7E 89 E6 EF 49 55 06\n" |
| 399 "C9 37 C7 99 56 16 B2 2B C9 7C 69 8E 10 7A DD 1F\n" | 399 "C9 37 C7 99 56 16 B2 2B C9 7C 69 8E 10 7A DD 1F\n" |
| 400 "42", | 400 "42", |
| 401 x509_certificate_model::ProcessSubjectPublicKeyInfo( | 401 x509_certificate_model::ProcessSubjectPublicKeyInfo( |
| 402 cert->os_cert_handle())); | 402 cert->os_cert_handle())); |
| 403 } | 403 } |
| 404 } | 404 } |
| 405 | 405 |
| 406 TEST(X509CertificateModelTest, ProcessRawBitsSignatureWrap) { | 406 TEST(X509CertificateModelTest, ProcessRawBitsSignatureWrap) { |
| 407 scoped_refptr<net::X509Certificate> cert(net::ImportCertFromFile( | 407 scoped_refptr<net::X509Certificate> cert(net::ImportCertFromFile( |
| 408 net::GetTestCertsDirectory(), "root_ca_cert.pem")); | 408 net::GetTestCertsDirectory(), "root_ca_cert.pem")); |
| 409 ASSERT_TRUE(cert.get()); | 409 ASSERT_TRUE(cert.get()); |
| 410 | 410 |
| 411 EXPECT_EQ( | 411 EXPECT_EQ( |
| 412 "57 07 29 FB 7F E8 FF B0 E6 D8 58 6A C3 90 A1 38\n" | 412 "5B 53 FF 6D D5 0A 43 A5 0F D4 7D C6 5D 88 E3 98\n" |
| 413 "1C B4 F3 68 B1 EC E8 89 23 24 D7 A8 F2 21 C3 60\n" | 413 "9D 67 EB 32 82 B3 0F F5 C1 78 F8 05 4A BF BC 21\n" |
| 414 "E4 A4 49 5C 00 BF DF C7 82 78 80 2B 18 F7 AD DD\n" | 414 "05 EE 21 08 2C B2 15 A1 B8 B2 F6 A3 15 61 E4 C1\n" |
| 415 "D0 62 5E A7 B0 CC F0 AA B4 CE 70 12 59 65 67 76\n" | 415 "AD 84 A4 A7 40 0C 87 09 5F 2B 1B F9 4D 6C 92 7D\n" |
| 416 "05 00 18 9A FF C4 2A 17 E3 F1 55 D8 BE 5C 5E EB\n" | 416 "CB 7E 2B B0 01 0A ED 40 E5 4E AF 1A F1 0D EC 1D\n" |
| 417 "CA CB 53 87 10 D5 09 32 36 A7 5E 41 F4 53 DA 7E\n" | 417 "9E 96 C7 D4 61 64 39 23 FA 5F 29 C4 2A 3A B8 ED\n" |
| 418 "56 60 D2 7E 4E 9A A5 08 5F 5D 75 E9 E7 30 CB 22\n" | 418 "8A 72 50 6A AC 45 04 76 09 A8 3D 57 D7 F0 4B AE\n" |
| 419 "E9 EF 19 49 83 A5 23 A1 F8 60 4C E5 36 D5 39 78\n" | 419 "46 B4 83 C1 14 50 2A 19 59 53 B2 4D AE FC 2F 40\n" |
| 420 "18 F1 5E BF CE AA 0B 53 81 2C 78 A9 0A 6B DB 13\n" | 420 "49 C8 AD 4D 9D C8 22 8D 8C 01 DB 31 33 5A F4 BC\n" |
| 421 "10 21 14 7F 1B 70 3D 89 1A 40 8A 06 2C 5D 50 19\n" | 421 "4C 9B ED D7 E3 43 D9 E8 1D 53 8B 30 D8 81 9E 72\n" |
| 422 "62 F9 C7 45 89 F2 3D 66 05 3D 7D 75 5B 55 1E 80\n" | 422 "AB 9E CE B8 F5 83 93 F2 72 DB DE CD B0 52 9A 45\n" |
| 423 "42 72 A1 9A 7C 6D 0A 74 F6 EE A6 21 6C 3A 98 FB\n" | 423 "4D CF E7 21 D8 CE 16 64 8F 42 AF C1 87 A8 F9 D5\n" |
| 424 "77 82 5F F2 6B 56 E6 DD 9B 8E 50 F0 C6 AE FD EA\n" | 424 "E2 03 DD BA 6B 1B 7C 7D A0 38 33 61 39 B4 DD 5C\n" |
| 425 "A6 05 07 A9 26 06 56 B3 B2 D9 B2 37 A0 21 3E 79\n" | 425 "69 17 79 02 3A EC 1D 6F 5E BB 13 FB A6 82 5D 07\n" |
| 426 "06 1F B9 51 BE F4 B1 49 4D 90 B5 33 E5 0E C7 5E\n" | 426 "20 FC 86 FE 6E 8B AC E1 C2 18 A2 FE 3F 95 66 D3\n" |
| 427 "5B 40 C5 6A 04 D1 43 7A 94 6A A4 4F 61 FC 82 E0", | 427 "69 8A 00 06 2C 56 37 34 B9 B6 31 DE 0F F6 44 39", |
| 428 x509_certificate_model::ProcessRawBitsSignatureWrap( | 428 x509_certificate_model::ProcessRawBitsSignatureWrap( |
| 429 cert->os_cert_handle())); | 429 cert->os_cert_handle())); |
| 430 } | 430 } |
| OLD | NEW |