Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(18)

Side by Side Diff: net/cert/jwk_serializer_unittest.cc

Issue 29303007: android: Enable -Wunused-const-variable. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: . Created 7 years, 2 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 // Copyright 2013 The Chromium Authors. All rights reserved. 1 // Copyright 2013 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "net/cert/jwk_serializer.h" 5 #include "net/cert/jwk_serializer.h"
6 6
7 #include "base/base64.h" 7 #include "base/base64.h"
8 #include "base/values.h" 8 #include "base/values.h"
9 #include "testing/gtest/include/gtest/gtest.h" 9 #include "testing/gtest/include/gtest/gtest.h"
10 10
11 namespace net { 11 namespace net {
12 12
13 #if !defined(USE_OPENSSL)
13 // This is the ASN.1 prefix for a P-256 public key. Specifically it's: 14 // This is the ASN.1 prefix for a P-256 public key. Specifically it's:
14 // SEQUENCE 15 // SEQUENCE
15 // SEQUENCE 16 // SEQUENCE
16 // OID id-ecPublicKey 17 // OID id-ecPublicKey
17 // OID prime256v1 18 // OID prime256v1
18 // BIT STRING, length 66, 0 trailing bits: 0x04 19 // BIT STRING, length 66, 0 trailing bits: 0x04
19 // 20 //
20 // The 0x04 in the BIT STRING is the prefix for an uncompressed, X9.62 21 // The 0x04 in the BIT STRING is the prefix for an uncompressed, X9.62
21 // public key. Following that are the two field elements as 32-byte, 22 // public key. Following that are the two field elements as 32-byte,
22 // big-endian numbers, as required by the Channel ID. 23 // big-endian numbers, as required by the Channel ID.
23 static const unsigned char kP256SpkiPrefix[] = { 24 static const unsigned char kP256SpkiPrefix[] = {
24 0x30, 0x59, 0x30, 0x13, 0x06, 0x07, 0x2a, 0x86, 25 0x30, 0x59, 0x30, 0x13, 0x06, 0x07, 0x2a, 0x86,
25 0x48, 0xce, 0x3d, 0x02, 0x01, 0x06, 0x08, 0x2a, 26 0x48, 0xce, 0x3d, 0x02, 0x01, 0x06, 0x08, 0x2a,
26 0x86, 0x48, 0xce, 0x3d, 0x03, 0x01, 0x07, 0x03, 27 0x86, 0x48, 0xce, 0x3d, 0x03, 0x01, 0x07, 0x03,
27 0x42, 0x00, 0x04 28 0x42, 0x00, 0x04
28 }; 29 };
29 static const unsigned int kEcCoordinateSize = 32U; 30 static const unsigned int kEcCoordinateSize = 32U;
31 #endif
30 32
31 // This is a valid P-256 public key. 33 // This is a valid P-256 public key.
32 static const unsigned char kSpkiEc[] = { 34 static const unsigned char kSpkiEc[] = {
33 0x30, 0x59, 0x30, 0x13, 0x06, 0x07, 0x2a, 0x86, 35 0x30, 0x59, 0x30, 0x13, 0x06, 0x07, 0x2a, 0x86,
34 0x48, 0xce, 0x3d, 0x02, 0x01, 0x06, 0x08, 0x2a, 36 0x48, 0xce, 0x3d, 0x02, 0x01, 0x06, 0x08, 0x2a,
35 0x86, 0x48, 0xce, 0x3d, 0x03, 0x01, 0x07, 0x03, 37 0x86, 0x48, 0xce, 0x3d, 0x03, 0x01, 0x07, 0x03,
36 0x42, 0x00, 0x04, 38 0x42, 0x00, 0x04,
37 0x29, 0x5d, 0x6e, 0xfe, 0x33, 0x77, 0x26, 0xea, 39 0x29, 0x5d, 0x6e, 0xfe, 0x33, 0x77, 0x26, 0xea,
38 0x5b, 0xa4, 0xe6, 0x1b, 0x34, 0x6e, 0x7b, 0xa0, 40 0x5b, 0xa4, 0xe6, 0x1b, 0x34, 0x6e, 0x7b, 0xa0,
39 0xa3, 0x8f, 0x33, 0x49, 0xa0, 0x9c, 0xae, 0x98, 41 0xa3, 0x8f, 0x33, 0x49, 0xa0, 0x9c, 0xae, 0x98,
40 0xbd, 0x46, 0x0d, 0xf6, 0xd4, 0x5a, 0xdc, 0x8a, 42 0xbd, 0x46, 0x0d, 0xf6, 0xd4, 0x5a, 0xdc, 0x8a,
41 0x1f, 0x8a, 0xb2, 0x20, 0x51, 0xb7, 0xd2, 0x87, 43 0x1f, 0x8a, 0xb2, 0x20, 0x51, 0xb7, 0xd2, 0x87,
42 0x0d, 0x53, 0x7e, 0x5d, 0x94, 0xa3, 0xe0, 0x34, 44 0x0d, 0x53, 0x7e, 0x5d, 0x94, 0xa3, 0xe0, 0x34,
43 0x16, 0xa1, 0xcc, 0x10, 0x48, 0xcd, 0x70, 0x9c, 45 0x16, 0xa1, 0xcc, 0x10, 0x48, 0xcd, 0x70, 0x9c,
44 0x05, 0xd3, 0xd2, 0xca, 0xdf, 0x44, 0x2f, 0xf4 46 0x05, 0xd3, 0xd2, 0xca, 0xdf, 0x44, 0x2f, 0xf4
45 }; 47 };
46 48
49 #if !defined(USE_OPENSSL)
47 // This is a P-256 public key with 0 X and Y values. 50 // This is a P-256 public key with 0 X and Y values.
48 static const unsigned char kSpkiEcWithZeroXY[] = { 51 static const unsigned char kSpkiEcWithZeroXY[] = {
49 0x30, 0x59, 0x30, 0x13, 0x06, 0x07, 0x2a, 0x86, 52 0x30, 0x59, 0x30, 0x13, 0x06, 0x07, 0x2a, 0x86,
50 0x48, 0xce, 0x3d, 0x02, 0x01, 0x06, 0x08, 0x2a, 53 0x48, 0xce, 0x3d, 0x02, 0x01, 0x06, 0x08, 0x2a,
51 0x86, 0x48, 0xce, 0x3d, 0x03, 0x01, 0x07, 0x03, 54 0x86, 0x48, 0xce, 0x3d, 0x03, 0x01, 0x07, 0x03,
52 0x42, 0x00, 0x04, 55 0x42, 0x00, 0x04,
53 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 56 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
54 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 57 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
55 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 58 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
56 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 59 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
57 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 60 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
58 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 61 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
59 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 62 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
60 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 63 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00
61 }; 64 };
62 65
63 #if !defined(USE_OPENSSL)
64
65 TEST(JwkSerializerNSSTest, ConvertSpkiFromDerToJwkEc) { 66 TEST(JwkSerializerNSSTest, ConvertSpkiFromDerToJwkEc) {
66 base::StringPiece spki; 67 base::StringPiece spki;
67 base::DictionaryValue public_key_jwk; 68 base::DictionaryValue public_key_jwk;
68 69
69 EXPECT_FALSE(JwkSerializer::ConvertSpkiFromDerToJwk(spki, &public_key_jwk)); 70 EXPECT_FALSE(JwkSerializer::ConvertSpkiFromDerToJwk(spki, &public_key_jwk));
70 EXPECT_TRUE(public_key_jwk.empty()); 71 EXPECT_TRUE(public_key_jwk.empty());
71 72
72 // Test the result of a "normal" point on this curve. 73 // Test the result of a "normal" point on this curve.
73 spki.set(reinterpret_cast<const char*>(kSpkiEc), sizeof(kSpkiEc)); 74 spki.set(reinterpret_cast<const char*>(kSpkiEc), sizeof(kSpkiEc));
74 EXPECT_TRUE(JwkSerializer::ConvertSpkiFromDerToJwk(spki, &public_key_jwk)); 75 EXPECT_TRUE(JwkSerializer::ConvertSpkiFromDerToJwk(spki, &public_key_jwk));
(...skipping 64 matching lines...) Expand 10 before | Expand all | Expand 10 after
139 // but even a valid SPKI is non-convertible via the stub OpenSSL 140 // but even a valid SPKI is non-convertible via the stub OpenSSL
140 // implementation. 141 // implementation.
141 spki.set(reinterpret_cast<const char*>(kSpkiEc), sizeof(kSpkiEc)); 142 spki.set(reinterpret_cast<const char*>(kSpkiEc), sizeof(kSpkiEc));
142 EXPECT_FALSE(JwkSerializer::ConvertSpkiFromDerToJwk(spki, &public_key_jwk)); 143 EXPECT_FALSE(JwkSerializer::ConvertSpkiFromDerToJwk(spki, &public_key_jwk));
143 EXPECT_TRUE(public_key_jwk.empty()); 144 EXPECT_TRUE(public_key_jwk.empty());
144 } 145 }
145 146
146 #endif // !defined(USE_OPENSSL) 147 #endif // !defined(USE_OPENSSL)
147 148
148 } // namespace net 149 } // namespace net
OLDNEW
« no previous file with comments | « media/filters/stream_parser_factory.cc ('k') | net/quic/crypto/aes_128_gcm_12_decrypter_openssl.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698