Index: content/child/webcrypto/test/rsa_ssa_unittest.cc |
diff --git a/content/child/webcrypto/test/rsa_ssa_unittest.cc b/content/child/webcrypto/test/rsa_ssa_unittest.cc |
index f3246c07b8148731d1c306648e8f2bc31bd356b6..59e7829f3cb4e218778b10a996c487e2092dd9f9 100644 |
--- a/content/child/webcrypto/test/rsa_ssa_unittest.cc |
+++ b/content/child/webcrypto/test/rsa_ssa_unittest.cc |
@@ -544,7 +544,7 @@ TEST(WebCryptoRsaSsaTest, GenerateKeyPairRsa) { |
blink::WebCryptoKey private_key = blink::WebCryptoKey::createNull(); |
EXPECT_EQ(Status::Success(), |
- GenerateKeyPair( |
+ GenerateKey( |
algorithm, extractable, usage_mask, &public_key, &private_key)); |
EXPECT_FALSE(public_key.isNull()); |
EXPECT_FALSE(private_key.isNull()); |
@@ -610,7 +610,7 @@ TEST(WebCryptoRsaSsaTest, GenerateKeyPairRsa) { |
0, |
public_exponent); |
EXPECT_EQ(Status::ErrorGenerateRsaUnsupportedModulus(), |
- GenerateKeyPair( |
+ GenerateKey( |
algorithm, extractable, usage_mask, &public_key, &private_key)); |
// Fail with bad exponent: larger than unsigned long. |
@@ -622,7 +622,7 @@ TEST(WebCryptoRsaSsaTest, GenerateKeyPairRsa) { |
modulus_length, |
long_exponent); |
EXPECT_EQ(Status::ErrorGenerateKeyPublicExponent(), |
- GenerateKeyPair( |
+ GenerateKey( |
algorithm, extractable, usage_mask, &public_key, &private_key)); |
// Fail with bad exponent: empty. |
@@ -633,7 +633,7 @@ TEST(WebCryptoRsaSsaTest, GenerateKeyPairRsa) { |
modulus_length, |
empty_exponent); |
EXPECT_EQ(Status::ErrorGenerateKeyPublicExponent(), |
- GenerateKeyPair( |
+ GenerateKey( |
algorithm, extractable, usage_mask, &public_key, &private_key)); |
// Fail with bad exponent: all zeros. |
@@ -644,7 +644,7 @@ TEST(WebCryptoRsaSsaTest, GenerateKeyPairRsa) { |
modulus_length, |
exponent_with_leading_zeros); |
EXPECT_EQ(Status::ErrorGenerateKeyPublicExponent(), |
- GenerateKeyPair( |
+ GenerateKey( |
algorithm, extractable, usage_mask, &public_key, &private_key)); |
// Key generation success using exponent with leading zeros. |
@@ -657,7 +657,7 @@ TEST(WebCryptoRsaSsaTest, GenerateKeyPairRsa) { |
modulus_length, |
exponent_with_leading_zeros); |
EXPECT_EQ(Status::Success(), |
- GenerateKeyPair( |
+ GenerateKey( |
algorithm, extractable, usage_mask, &public_key, &private_key)); |
EXPECT_FALSE(public_key.isNull()); |
EXPECT_FALSE(private_key.isNull()); |
@@ -676,7 +676,7 @@ TEST(WebCryptoRsaSsaTest, GenerateKeyPairRsa) { |
public_exponent); |
EXPECT_EQ( |
Status::Success(), |
- GenerateKeyPair(algorithm, false, usage_mask, &public_key, &private_key)); |
+ GenerateKey(algorithm, false, usage_mask, &public_key, &private_key)); |
EXPECT_FALSE(public_key.isNull()); |
EXPECT_FALSE(private_key.isNull()); |
EXPECT_EQ(blink::WebCryptoKeyTypePublic, public_key.type()); |
@@ -706,7 +706,7 @@ TEST(WebCryptoRsaSsaTest, GenerateKeyPairRsa) { |
// This should fail since spki is for public keys. |
EXPECT_EQ( |
Status::Success(), |
- GenerateKeyPair(algorithm, true, usage_mask, &public_key, &private_key)); |
+ GenerateKey(algorithm, true, usage_mask, &public_key, &private_key)); |
EXPECT_EQ(Status::ErrorUnexpectedKeyType(), |
ExportKey(blink::WebCryptoKeyFormatSpki, private_key, &output)); |
} |
@@ -737,7 +737,7 @@ TEST(WebCryptoRsaSsaTest, GenerateKeyPairRsaBadModulusLength) { |
EXPECT_EQ( |
Status::ErrorGenerateRsaUnsupportedModulus(), |
- GenerateKeyPair( |
+ GenerateKey( |
algorithm, extractable, usage_mask, &public_key, &private_key)); |
} |
} |
@@ -767,7 +767,7 @@ TEST(WebCryptoRsaSsaTest, GenerateKeyPairRsaBadExponent) { |
blink::WebCryptoKey private_key = blink::WebCryptoKey::createNull(); |
EXPECT_EQ(Status::ErrorGenerateKeyPublicExponent(), |
- GenerateKeyPair(algorithm, true, 0, &public_key, &private_key)); |
+ GenerateKey(algorithm, true, 0, &public_key, &private_key)); |
} |
} |
@@ -1035,15 +1035,15 @@ TEST(WebCryptoRsaSsaTest, GenerateKeyBadUsages) { |
blink::WebCryptoKey private_key = blink::WebCryptoKey::createNull(); |
ASSERT_EQ(Status::ErrorCreateKeyBadUsages(), |
- GenerateKeyPair(CreateRsaHashedKeyGenAlgorithm( |
- blink::WebCryptoAlgorithmIdRsaSsaPkcs1v1_5, |
- blink::WebCryptoAlgorithmIdSha256, |
- modulus_length, |
- public_exponent), |
- true, |
- bad_usages[i], |
- &public_key, |
- &private_key)); |
+ GenerateKey(CreateRsaHashedKeyGenAlgorithm( |
+ blink::WebCryptoAlgorithmIdRsaSsaPkcs1v1_5, |
+ blink::WebCryptoAlgorithmIdSha256, |
+ modulus_length, |
+ public_exponent), |
+ true, |
+ bad_usages[i], |
+ &public_key, |
+ &private_key)); |
} |
} |
@@ -1057,32 +1057,32 @@ TEST(WebCryptoRsaSsaTest, GenerateKeyPairIntersectUsages) { |
blink::WebCryptoKey public_key = blink::WebCryptoKey::createNull(); |
blink::WebCryptoKey private_key = blink::WebCryptoKey::createNull(); |
- ASSERT_EQ(Status::Success(), |
- GenerateKeyPair( |
- CreateRsaHashedKeyGenAlgorithm( |
- blink::WebCryptoAlgorithmIdRsaSsaPkcs1v1_5, |
- blink::WebCryptoAlgorithmIdSha256, |
- modulus_length, |
- public_exponent), |
- true, |
- blink::WebCryptoKeyUsageSign | blink::WebCryptoKeyUsageVerify, |
- &public_key, |
- &private_key)); |
+ ASSERT_EQ( |
+ Status::Success(), |
+ GenerateKey(CreateRsaHashedKeyGenAlgorithm( |
+ blink::WebCryptoAlgorithmIdRsaSsaPkcs1v1_5, |
+ blink::WebCryptoAlgorithmIdSha256, |
+ modulus_length, |
+ public_exponent), |
+ true, |
+ blink::WebCryptoKeyUsageSign | blink::WebCryptoKeyUsageVerify, |
+ &public_key, |
+ &private_key)); |
EXPECT_EQ(blink::WebCryptoKeyUsageVerify, public_key.usages()); |
EXPECT_EQ(blink::WebCryptoKeyUsageSign, private_key.usages()); |
// Try again but this time without the Verify usages. |
ASSERT_EQ(Status::Success(), |
- GenerateKeyPair(CreateRsaHashedKeyGenAlgorithm( |
- blink::WebCryptoAlgorithmIdRsaSsaPkcs1v1_5, |
- blink::WebCryptoAlgorithmIdSha256, |
- modulus_length, |
- public_exponent), |
- true, |
- blink::WebCryptoKeyUsageSign, |
- &public_key, |
- &private_key)); |
+ GenerateKey(CreateRsaHashedKeyGenAlgorithm( |
+ blink::WebCryptoAlgorithmIdRsaSsaPkcs1v1_5, |
+ blink::WebCryptoAlgorithmIdSha256, |
+ modulus_length, |
+ public_exponent), |
+ true, |
+ blink::WebCryptoKeyUsageSign, |
+ &public_key, |
+ &private_key)); |
EXPECT_EQ(0, public_key.usages()); |
EXPECT_EQ(blink::WebCryptoKeyUsageSign, private_key.usages()); |