| OLD | NEW |
| 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "crypto/rsa_private_key.h" | 5 #include "crypto/rsa_private_key.h" |
| 6 | 6 |
| 7 #include <keyhi.h> | 7 #include <keyhi.h> |
| 8 #include <pk11pub.h> | 8 #include <pk11pub.h> |
| 9 | 9 |
| 10 #include "base/memory/scoped_ptr.h" | 10 #include "base/memory/scoped_ptr.h" |
| 11 #include "crypto/nss_util.h" | 11 #include "crypto/nss_util.h" |
| 12 #include "testing/gtest/include/gtest/gtest.h" | 12 #include "testing/gtest/include/gtest/gtest.h" |
| 13 | 13 |
| 14 namespace crypto { | 14 namespace crypto { |
| 15 | 15 |
| 16 class RSAPrivateKeyNSSTest : public testing::Test { | 16 class RSAPrivateKeyNSSTest : public testing::Test { |
| 17 public: | 17 public: |
| 18 RSAPrivateKeyNSSTest() {} | 18 RSAPrivateKeyNSSTest() {} |
| 19 virtual ~RSAPrivateKeyNSSTest() {} | 19 virtual ~RSAPrivateKeyNSSTest() {} |
| 20 | 20 |
| 21 virtual void SetUp() { | |
| 22 #if defined(OS_CHROMEOS) | |
| 23 OpenPersistentNSSDB(); | |
| 24 #endif | |
| 25 } | |
| 26 | |
| 27 private: | 21 private: |
| 28 ScopedTestNSSDB test_nssdb_; | 22 ScopedTestNSSDB test_nssdb_; |
| 29 | 23 |
| 30 DISALLOW_COPY_AND_ASSIGN(RSAPrivateKeyNSSTest); | 24 DISALLOW_COPY_AND_ASSIGN(RSAPrivateKeyNSSTest); |
| 31 }; | 25 }; |
| 32 | 26 |
| 33 TEST_F(RSAPrivateKeyNSSTest, CreateFromKeyTest) { | 27 TEST_F(RSAPrivateKeyNSSTest, CreateFromKeyTest) { |
| 34 scoped_ptr<crypto::RSAPrivateKey> key_pair(RSAPrivateKey::Create(256)); | 28 scoped_ptr<crypto::RSAPrivateKey> key_pair(RSAPrivateKey::Create(256)); |
| 35 | 29 |
| 36 scoped_ptr<crypto::RSAPrivateKey> key_copy( | 30 scoped_ptr<crypto::RSAPrivateKey> key_copy( |
| (...skipping 41 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 78 } | 72 } |
| 79 if (key_pair->public_key_) { | 73 if (key_pair->public_key_) { |
| 80 PK11_DestroyTokenObject(key_pair->public_key_->pkcs11Slot, | 74 PK11_DestroyTokenObject(key_pair->public_key_->pkcs11Slot, |
| 81 key_pair->public_key_->pkcs11ID); | 75 key_pair->public_key_->pkcs11ID); |
| 82 } | 76 } |
| 83 | 77 |
| 84 EXPECT_EQ(NULL, crypto::RSAPrivateKey::FindFromPublicKeyInfo(public_key)); | 78 EXPECT_EQ(NULL, crypto::RSAPrivateKey::FindFromPublicKeyInfo(public_key)); |
| 85 } | 79 } |
| 86 | 80 |
| 87 } // namespace crypto | 81 } // namespace crypto |
| OLD | NEW |