OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/common/net/x509_certificate_model.h" | 5 #include "chrome/common/net/x509_certificate_model.h" |
6 | 6 |
7 #include "base/files/file_path.h" | 7 #include "base/files/file_path.h" |
8 #include "base/path_service.h" | 8 #include "base/path_service.h" |
9 #include "net/base/test_data_directory.h" | 9 #include "net/base/test_data_directory.h" |
10 #include "net/test/cert_test_util.h" | 10 #include "net/test/cert_test_util.h" |
(...skipping 303 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
314 pkcs7_string.data(), | 314 pkcs7_string.data(), |
315 pkcs7_string.size(), | 315 pkcs7_string.size(), |
316 net::X509Certificate::FORMAT_PKCS7); | 316 net::X509Certificate::FORMAT_PKCS7); |
317 | 317 |
318 ASSERT_EQ(certs.size(), decoded_certs.size()); | 318 ASSERT_EQ(certs.size(), decoded_certs.size()); |
319 #if defined(USE_OPENSSL) | 319 #if defined(USE_OPENSSL) |
320 for (size_t i = 0; i < certs.size(); ++i) | 320 for (size_t i = 0; i < certs.size(); ++i) |
321 EXPECT_TRUE(certs[i]->Equals(decoded_certs[i])); | 321 EXPECT_TRUE(certs[i]->Equals(decoded_certs[i])); |
322 #else | 322 #else |
323 // NSS sorts the certs before writing the file. | 323 // NSS sorts the certs before writing the file. |
324 EXPECT_TRUE(certs[0]->Equals(decoded_certs.back())); | 324 EXPECT_TRUE(certs[0]->Equals(decoded_certs.back().get())); |
325 for (size_t i = 1; i < certs.size(); ++i) | 325 for (size_t i = 1; i < certs.size(); ++i) |
326 EXPECT_TRUE(certs[i]->Equals(decoded_certs[i-1])); | 326 EXPECT_TRUE(certs[i]->Equals(decoded_certs[i - 1].get())); |
327 #endif | 327 #endif |
328 } | 328 } |
329 | 329 |
330 { | 330 { |
331 // Write only the first cert. | 331 // Write only the first cert. |
332 std::string pkcs7_string = | 332 std::string pkcs7_string = |
333 x509_certificate_model::GetCMSString(cert_handles, 0, 1); | 333 x509_certificate_model::GetCMSString(cert_handles, 0, 1); |
334 | 334 |
335 net::CertificateList decoded_certs = | 335 net::CertificateList decoded_certs = |
336 net::X509Certificate::CreateCertificateListFromBytes( | 336 net::X509Certificate::CreateCertificateListFromBytes( |
337 pkcs7_string.data(), | 337 pkcs7_string.data(), |
338 pkcs7_string.size(), | 338 pkcs7_string.size(), |
339 net::X509Certificate::FORMAT_PKCS7); | 339 net::X509Certificate::FORMAT_PKCS7); |
340 | 340 |
341 ASSERT_EQ(1U, decoded_certs.size()); | 341 ASSERT_EQ(1U, decoded_certs.size()); |
342 EXPECT_TRUE(certs[0]->Equals(decoded_certs[0])); | 342 EXPECT_TRUE(certs[0]->Equals(decoded_certs[0].get())); |
343 } | 343 } |
344 } | 344 } |
345 | 345 |
346 TEST(X509CertificateModelTest, ProcessSecAlgorithms) { | 346 TEST(X509CertificateModelTest, ProcessSecAlgorithms) { |
347 { | 347 { |
348 scoped_refptr<net::X509Certificate> cert(net::ImportCertFromFile( | 348 scoped_refptr<net::X509Certificate> cert(net::ImportCertFromFile( |
349 net::GetTestCertsDirectory(), "root_ca_cert.pem")); | 349 net::GetTestCertsDirectory(), "root_ca_cert.pem")); |
350 ASSERT_TRUE(cert.get()); | 350 ASSERT_TRUE(cert.get()); |
351 EXPECT_EQ("PKCS #1 SHA-1 With RSA Encryption", | 351 EXPECT_EQ("PKCS #1 SHA-1 With RSA Encryption", |
352 x509_certificate_model::ProcessSecAlgorithmSignature( | 352 x509_certificate_model::ProcessSecAlgorithmSignature( |
(...skipping 86 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
439 "09 6B 5A 6B F1 95 D3 9D 3F E0 42 63 FC B7 32 90\n" | 439 "09 6B 5A 6B F1 95 D3 9D 3F E0 42 63 FC B7 32 90\n" |
440 "55 56 F2 76 1B 71 38 BD BD FB 3B 23 50 46 4C 2C\n" | 440 "55 56 F2 76 1B 71 38 BD BD FB 3B 23 50 46 4C 2C\n" |
441 "4E 49 48 52 EA 05 5F 16 F2 98 51 AF 2F 79 36 2A\n" | 441 "4E 49 48 52 EA 05 5F 16 F2 98 51 AF 2F 79 36 2A\n" |
442 "A0 BA 36 68 1B 29 8B 7B E8 8C EA 73 31 E5 86 D7\n" | 442 "A0 BA 36 68 1B 29 8B 7B E8 8C EA 73 31 E5 86 D7\n" |
443 "2C D8 56 06 43 D7 72 D2 F0 27 4E 64 0A 2B 27 38\n" | 443 "2C D8 56 06 43 D7 72 D2 F0 27 4E 64 0A 2B 27 38\n" |
444 "36 CD BE C1 33 DB 74 4B 4E 74 BE 21 BD F6 81 66\n" | 444 "36 CD BE C1 33 DB 74 4B 4E 74 BE 21 BD F6 81 66\n" |
445 "D2 FD 2B 7F F4 55 36 C0 ED A7 44 CA B1 78 1D 0F", | 445 "D2 FD 2B 7F F4 55 36 C0 ED A7 44 CA B1 78 1D 0F", |
446 x509_certificate_model::ProcessRawBitsSignatureWrap( | 446 x509_certificate_model::ProcessRawBitsSignatureWrap( |
447 cert->os_cert_handle())); | 447 cert->os_cert_handle())); |
448 } | 448 } |
OLD | NEW |