Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(243)

Side by Side Diff: chrome/common/net/x509_certificate_model_unittest.cc

Issue 2926463002: Fix TransportSecurityState unittests to run in --single-process mode. (Closed)
Patch Set: Fixup model tests Created 3 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « no previous file | components/certificate_reporting/error_report_unittest.cc » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "chrome/common/net/x509_certificate_model.h" 5 #include "chrome/common/net/x509_certificate_model.h"
6 6
7 #include <stddef.h> 7 #include <stddef.h>
8 8
9 #include "base/files/file_path.h" 9 #include "base/files/file_path.h"
10 #include "net/test/cert_test_util.h" 10 #include "net/test/cert_test_util.h"
(...skipping 58 matching lines...) Expand 10 before | Expand all | Expand 10 after
69 ASSERT_EQ(3U, extensions.size()); 69 ASSERT_EQ(3U, extensions.size());
70 70
71 EXPECT_EQ("Certificate Basic Constraints", extensions[0].name); 71 EXPECT_EQ("Certificate Basic Constraints", extensions[0].name);
72 EXPECT_EQ( 72 EXPECT_EQ(
73 "critical\nIs a Certification Authority\n" 73 "critical\nIs a Certification Authority\n"
74 "Maximum number of intermediate CAs: unlimited", 74 "Maximum number of intermediate CAs: unlimited",
75 extensions[0].value); 75 extensions[0].value);
76 76
77 EXPECT_EQ("Certificate Subject Key ID", extensions[1].name); 77 EXPECT_EQ("Certificate Subject Key ID", extensions[1].name);
78 EXPECT_EQ( 78 EXPECT_EQ(
79 "notcrit\nKey ID: BC F7 30 D1 3C C0 F2 79 FA EF 9F C9 6C 5C 93 F3\n8A " 79 "notcrit\nKey ID: 9B 26 0B 8A 98 A9 BB 1D B9 1F 1C E3 1A 40 33 ED\n8E "
80 "68 AB 83", 80 "17 88 AB",
81 extensions[1].value); 81 extensions[1].value);
82 82
83 EXPECT_EQ("Certificate Key Usage", extensions[2].name); 83 EXPECT_EQ("Certificate Key Usage", extensions[2].name);
84 EXPECT_EQ("critical\nCertificate Signer\nCRL Signer", extensions[2].value); 84 EXPECT_EQ("critical\nCertificate Signer\nCRL Signer", extensions[2].value);
85 } 85 }
86 86
87 { 87 {
88 scoped_refptr<net::X509Certificate> cert(net::ImportCertFromFile( 88 scoped_refptr<net::X509Certificate> cert(net::ImportCertFromFile(
89 net::GetTestCertsDirectory(), "subjectAltName_sanity_check.pem")); 89 net::GetTestCertsDirectory(), "subjectAltName_sanity_check.pem"));
90 ASSERT_TRUE(cert.get()); 90 ASSERT_TRUE(cert.get());
(...skipping 232 matching lines...) Expand 10 before | Expand all | Expand 10 after
323 EXPECT_TRUE(certs[0]->Equals(decoded_certs[0].get())); 323 EXPECT_TRUE(certs[0]->Equals(decoded_certs[0].get()));
324 } 324 }
325 } 325 }
326 326
327 TEST(X509CertificateModelTest, ProcessSecAlgorithms) { 327 TEST(X509CertificateModelTest, ProcessSecAlgorithms) {
328 { 328 {
329 scoped_refptr<net::X509Certificate> cert(net::ImportCertFromFile( 329 scoped_refptr<net::X509Certificate> cert(net::ImportCertFromFile(
330 net::GetTestCertsDirectory(), "root_ca_cert.pem")); 330 net::GetTestCertsDirectory(), "root_ca_cert.pem"));
331 ASSERT_TRUE(cert.get()); 331 ASSERT_TRUE(cert.get());
332 332
333 EXPECT_EQ("PKCS #1 SHA-1 With RSA Encryption", 333 EXPECT_EQ("PKCS #1 SHA-256 With RSA Encryption",
334 x509_certificate_model::ProcessSecAlgorithmSignature( 334 x509_certificate_model::ProcessSecAlgorithmSignature(
335 cert->os_cert_handle())); 335 cert->os_cert_handle()));
336 EXPECT_EQ("PKCS #1 SHA-1 With RSA Encryption", 336 EXPECT_EQ("PKCS #1 SHA-256 With RSA Encryption",
337 x509_certificate_model::ProcessSecAlgorithmSignatureWrap( 337 x509_certificate_model::ProcessSecAlgorithmSignatureWrap(
338 cert->os_cert_handle())); 338 cert->os_cert_handle()));
339 EXPECT_EQ("PKCS #1 RSA Encryption", 339 EXPECT_EQ("PKCS #1 RSA Encryption",
340 x509_certificate_model::ProcessSecAlgorithmSubjectPublicKey( 340 x509_certificate_model::ProcessSecAlgorithmSubjectPublicKey(
341 cert->os_cert_handle())); 341 cert->os_cert_handle()));
342 } 342 }
343 { 343 {
344 scoped_refptr<net::X509Certificate> cert(net::ImportCertFromFile( 344 scoped_refptr<net::X509Certificate> cert(net::ImportCertFromFile(
345 net::GetTestCertsDirectory(), "weak_digest_md5_root.pem")); 345 net::GetTestCertsDirectory(), "weak_digest_md5_root.pem"));
346 ASSERT_TRUE(cert.get()); 346 ASSERT_TRUE(cert.get());
(...skipping 11 matching lines...) Expand all
358 } 358 }
359 359
360 TEST(X509CertificateModelTest, ProcessSubjectPublicKeyInfo) { 360 TEST(X509CertificateModelTest, ProcessSubjectPublicKeyInfo) {
361 { 361 {
362 scoped_refptr<net::X509Certificate> cert(net::ImportCertFromFile( 362 scoped_refptr<net::X509Certificate> cert(net::ImportCertFromFile(
363 net::GetTestCertsDirectory(), "root_ca_cert.pem")); 363 net::GetTestCertsDirectory(), "root_ca_cert.pem"));
364 ASSERT_TRUE(cert.get()); 364 ASSERT_TRUE(cert.get());
365 365
366 EXPECT_EQ( 366 EXPECT_EQ(
367 "Modulus (2048 bits):\n" 367 "Modulus (2048 bits):\n"
368 " B6 49 41 E3 42 01 51 A8 7F 3C 7A 71 D3 FB CD 91\n" 368 " C6 81 1F 92 73 B6 58 85 D9 8D AC B7 20 FD C7 BF\n"
369 "35 17 84 1A 8E F6 36 C7 D1 70 1D FA 86 F3 6E BB\n" 369 "40 B2 EA FA E5 0B 52 01 8F 9A C1 EB 7A 80 C1 F3\n"
370 "76 6F E8 32 2E 37 FD 38 92 3D 68 E4 8A 7D 42 33\n" 370 "89 A4 3E D5 1B 61 CC B5 CF 80 B1 1A DB BB 25 E0\n"
371 "14 46 1B DC 04 F6 91 6E 54 40 C4 0A 09 FD EC 2D\n" 371 "18 BF 92 69 26 50 CD E7 3F FF 0D 3C B4 1F 14 12\n"
372 "62 E2 5E E1 BA 2C 9C C1 B1 60 4C DA C7 F8 22 5C\n" 372 "AB 67 37 DE 07 03 6C 12 74 82 36 AC C3 D4 D3 64\n"
373 "82 20 65 42 1E 56 77 75 4F EB 90 2C 4A EA 57 0E\n" 373 "9F 91 ED 5B F6 A9 7A A4 9C 98 E8 65 6C 94 E1 CB\n"
374 "22 8D 6C 95 AC 11 EA CC D7 EE F6 70 0D 09 DD A6\n" 374 "55 73 AE F8 1D 50 B0 78 E5 74 FF B1 37 2C CB 19\n"
375 "35 61 5D C9 76 6D B0 F2 1E BF 30 86 D8 77 52 36\n" 375 "3D A4 8C E7 76 4E 86 5C 3F DF B3 ED 45 23 4F 54\n"
376 "95 97 0E D1 46 C5 ED 81 3D 1B B0 F2 61 95 3C C1\n" 376 "9B 33 C6 89 5E 13 1D DD 7D 59 A5 07 34 28 86 27\n"
377 "40 38 EF 5F 5D BA 61 9F EF 2B 9C 9F 85 89 74 70\n" 377 "1F FA 9E 53 4F 2A B6 42 AD 37 12 62 F5 72 36 B6\n"
378 "63 D5 76 E8 35 7E CE 01 E1 F3 11 11 90 1C 0D F5\n" 378 "02 12 40 44 FE C7 9E 95 89 43 51 5E B4 6E C7 67\n"
379 "FD 8D CE 10 6C AD 7C 55 1A 21 6F D7 2D F4 78 15\n" 379 "80 58 43 BE CC 07 28 BD 59 FF 1C 4C 8D 90 42 F4\n"
380 "EA 2F 38 BD 91 9E 3C 1D 07 46 F5 43 C1 82 8B AF\n" 380 "CF FD 54 00 4F 48 72 2B E1 67 3C 84 17 68 95 BF\n"
381 "12 53 65 19 8A 69 69 66 06 B2 DA 0B FA 2A 00 A1\n" 381 "CA 07 7B DF 86 9D 56 E3 32 E3 70 87 B7 F8 3A F7\n"
382 "2A 15 84 49 F1 01 BF 9B 30 06 D0 15 A0 1F 9D 51\n" 382 "E3 6E 65 14 7C BB 76 B7 17 F1 42 8C 6F 2A 34 64\n"
383 "91 47 E1 53 5F EF 5E EC C2 61 79 C2 14 9F C4 E3\n" 383 "10 35 14 8C 85 F6 57 BF F3 5C 55 9D AD 03 10 F3\n"
384 "\n" 384 "\n"
385 " Public Exponent (24 bits):\n" 385 " Public Exponent (24 bits):\n"
386 " 01 00 01", 386 " 01 00 01",
387 x509_certificate_model::ProcessSubjectPublicKeyInfo( 387 x509_certificate_model::ProcessSubjectPublicKeyInfo(
388 cert->os_cert_handle())); 388 cert->os_cert_handle()));
389 } 389 }
390 { 390 {
391 scoped_refptr<net::X509Certificate> cert(net::ImportCertFromFile( 391 scoped_refptr<net::X509Certificate> cert(net::ImportCertFromFile(
392 net::GetTestCertsDirectory(), "prime256v1-ecdsa-intermediate.pem")); 392 net::GetTestCertsDirectory(), "prime256v1-ecdsa-intermediate.pem"));
393 ASSERT_TRUE(cert.get()); 393 ASSERT_TRUE(cert.get());
394 394
395 EXPECT_EQ( 395 EXPECT_EQ(
396 "04 D5 C1 4A 32 95 95 C5 88 FA 01 FA C5 9E DC E2\n" 396 "04 D5 C1 4A 32 95 95 C5 88 FA 01 FA C5 9E DC E2\n"
397 "99 62 EB 13 E5 35 42 B3 7A FC 46 C0 FA 29 12 C8\n" 397 "99 62 EB 13 E5 35 42 B3 7A FC 46 C0 FA 29 12 C8\n"
398 "2D EA 30 0F D2 9A 47 97 2C 7E 89 E6 EF 49 55 06\n" 398 "2D EA 30 0F D2 9A 47 97 2C 7E 89 E6 EF 49 55 06\n"
399 "C9 37 C7 99 56 16 B2 2B C9 7C 69 8E 10 7A DD 1F\n" 399 "C9 37 C7 99 56 16 B2 2B C9 7C 69 8E 10 7A DD 1F\n"
400 "42", 400 "42",
401 x509_certificate_model::ProcessSubjectPublicKeyInfo( 401 x509_certificate_model::ProcessSubjectPublicKeyInfo(
402 cert->os_cert_handle())); 402 cert->os_cert_handle()));
403 } 403 }
404 } 404 }
405 405
406 TEST(X509CertificateModelTest, ProcessRawBitsSignatureWrap) { 406 TEST(X509CertificateModelTest, ProcessRawBitsSignatureWrap) {
407 scoped_refptr<net::X509Certificate> cert(net::ImportCertFromFile( 407 scoped_refptr<net::X509Certificate> cert(net::ImportCertFromFile(
408 net::GetTestCertsDirectory(), "root_ca_cert.pem")); 408 net::GetTestCertsDirectory(), "root_ca_cert.pem"));
409 ASSERT_TRUE(cert.get()); 409 ASSERT_TRUE(cert.get());
410 410
411 EXPECT_EQ( 411 EXPECT_EQ(
412 "57 07 29 FB 7F E8 FF B0 E6 D8 58 6A C3 90 A1 38\n" 412 "5B 53 FF 6D D5 0A 43 A5 0F D4 7D C6 5D 88 E3 98\n"
413 "1C B4 F3 68 B1 EC E8 89 23 24 D7 A8 F2 21 C3 60\n" 413 "9D 67 EB 32 82 B3 0F F5 C1 78 F8 05 4A BF BC 21\n"
414 "E4 A4 49 5C 00 BF DF C7 82 78 80 2B 18 F7 AD DD\n" 414 "05 EE 21 08 2C B2 15 A1 B8 B2 F6 A3 15 61 E4 C1\n"
415 "D0 62 5E A7 B0 CC F0 AA B4 CE 70 12 59 65 67 76\n" 415 "AD 84 A4 A7 40 0C 87 09 5F 2B 1B F9 4D 6C 92 7D\n"
416 "05 00 18 9A FF C4 2A 17 E3 F1 55 D8 BE 5C 5E EB\n" 416 "CB 7E 2B B0 01 0A ED 40 E5 4E AF 1A F1 0D EC 1D\n"
417 "CA CB 53 87 10 D5 09 32 36 A7 5E 41 F4 53 DA 7E\n" 417 "9E 96 C7 D4 61 64 39 23 FA 5F 29 C4 2A 3A B8 ED\n"
418 "56 60 D2 7E 4E 9A A5 08 5F 5D 75 E9 E7 30 CB 22\n" 418 "8A 72 50 6A AC 45 04 76 09 A8 3D 57 D7 F0 4B AE\n"
419 "E9 EF 19 49 83 A5 23 A1 F8 60 4C E5 36 D5 39 78\n" 419 "46 B4 83 C1 14 50 2A 19 59 53 B2 4D AE FC 2F 40\n"
420 "18 F1 5E BF CE AA 0B 53 81 2C 78 A9 0A 6B DB 13\n" 420 "49 C8 AD 4D 9D C8 22 8D 8C 01 DB 31 33 5A F4 BC\n"
421 "10 21 14 7F 1B 70 3D 89 1A 40 8A 06 2C 5D 50 19\n" 421 "4C 9B ED D7 E3 43 D9 E8 1D 53 8B 30 D8 81 9E 72\n"
422 "62 F9 C7 45 89 F2 3D 66 05 3D 7D 75 5B 55 1E 80\n" 422 "AB 9E CE B8 F5 83 93 F2 72 DB DE CD B0 52 9A 45\n"
423 "42 72 A1 9A 7C 6D 0A 74 F6 EE A6 21 6C 3A 98 FB\n" 423 "4D CF E7 21 D8 CE 16 64 8F 42 AF C1 87 A8 F9 D5\n"
424 "77 82 5F F2 6B 56 E6 DD 9B 8E 50 F0 C6 AE FD EA\n" 424 "E2 03 DD BA 6B 1B 7C 7D A0 38 33 61 39 B4 DD 5C\n"
425 "A6 05 07 A9 26 06 56 B3 B2 D9 B2 37 A0 21 3E 79\n" 425 "69 17 79 02 3A EC 1D 6F 5E BB 13 FB A6 82 5D 07\n"
426 "06 1F B9 51 BE F4 B1 49 4D 90 B5 33 E5 0E C7 5E\n" 426 "20 FC 86 FE 6E 8B AC E1 C2 18 A2 FE 3F 95 66 D3\n"
427 "5B 40 C5 6A 04 D1 43 7A 94 6A A4 4F 61 FC 82 E0", 427 "69 8A 00 06 2C 56 37 34 B9 B6 31 DE 0F F6 44 39",
428 x509_certificate_model::ProcessRawBitsSignatureWrap( 428 x509_certificate_model::ProcessRawBitsSignatureWrap(
429 cert->os_cert_handle())); 429 cert->os_cert_handle()));
430 } 430 }
OLDNEW
« no previous file with comments | « no previous file | components/certificate_reporting/error_report_unittest.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698