| Index: content/child/webcrypto/test/rsa_ssa_unittest.cc
|
| diff --git a/content/child/webcrypto/test/rsa_ssa_unittest.cc b/content/child/webcrypto/test/rsa_ssa_unittest.cc
|
| index 33d0751354c52129a98bc600d3c14f4852eef4c7..3ce88b100e15715810d1bb9b886dd0646ff90891 100644
|
| --- a/content/child/webcrypto/test/rsa_ssa_unittest.cc
|
| +++ b/content/child/webcrypto/test/rsa_ssa_unittest.cc
|
| @@ -38,7 +38,7 @@ void RestoreJwkRsaDictionary(base::DictionaryValue* dict) {
|
|
|
| TEST(WebCryptoRsaSsaTest, ImportExportSpki) {
|
| // Passing case: Import a valid RSA key in SPKI format.
|
| - blink::WebCryptoKey key = blink::WebCryptoKey::createNull();
|
| + blink::WebCryptoKey key;
|
| ASSERT_EQ(Status::Success(),
|
| ImportKey(blink::WebCryptoKeyFormatSpki,
|
| CryptoData(HexStringToBytes(kPublicKeySpkiDerHex)),
|
| @@ -127,7 +127,7 @@ TEST(WebCryptoRsaSsaTest, ImportExportPkcs8) {
|
| return;
|
|
|
| // Passing case: Import a valid RSA key in PKCS#8 format.
|
| - blink::WebCryptoKey key = blink::WebCryptoKey::createNull();
|
| + blink::WebCryptoKey key;
|
| ASSERT_EQ(Status::Success(),
|
| ImportKey(blink::WebCryptoKeyFormatPkcs8,
|
| CryptoData(HexStringToBytes(kPrivateKeyPkcs8DerHex)),
|
| @@ -226,7 +226,7 @@ TEST(WebCryptoRsaSsaTest, ImportInvalidPkcs8) {
|
| HexStringToBytes(kPrivateKeyPkcs8DerHex);
|
| corrupted_data[i] = ~corrupted_data[i];
|
|
|
| - blink::WebCryptoKey key = blink::WebCryptoKey::createNull();
|
| + blink::WebCryptoKey key;
|
| EXPECT_EQ(Status::DataError(),
|
| ImportKey(blink::WebCryptoKeyFormatPkcs8,
|
| CryptoData(corrupted_data),
|
| @@ -247,7 +247,7 @@ TEST(WebCryptoRsaSsaTest, ImportRsaPrivateKeyJwkToPkcs8RoundTrip) {
|
| if (!SupportsRsaPrivateKeyImport())
|
| return;
|
|
|
| - blink::WebCryptoKey key = blink::WebCryptoKey::createNull();
|
| + blink::WebCryptoKey key;
|
| ASSERT_EQ(Status::Success(),
|
| ImportKey(blink::WebCryptoKeyFormatPkcs8,
|
| CryptoData(HexStringToBytes(kPrivateKeyPkcs8DerHex)),
|
| @@ -341,7 +341,7 @@ TEST(WebCryptoRsaSsaTest, ImportMultipleRSAPrivateKeysJwk) {
|
| int modulus_length_bits = 0;
|
| ASSERT_TRUE(key_values->GetInteger("modulusLength", &modulus_length_bits));
|
|
|
| - blink::WebCryptoKey private_key = blink::WebCryptoKey::createNull();
|
| + blink::WebCryptoKey private_key;
|
|
|
| // Import the key from JWK.
|
| ASSERT_EQ(
|
| @@ -389,7 +389,7 @@ TEST(WebCryptoRsaSsaTest, ImportJwkExistingModulusAndInvalid) {
|
| base::DictionaryValue* key1_jwk;
|
| ASSERT_TRUE(key1_props->GetDictionary("jwk", &key1_jwk));
|
|
|
| - blink::WebCryptoKey key1 = blink::WebCryptoKey::createNull();
|
| + blink::WebCryptoKey key1;
|
| ASSERT_EQ(Status::Success(),
|
| ImportKeyJwkFromDict(*key1_jwk,
|
| CreateRsaHashedImportAlgorithm(
|
| @@ -413,7 +413,7 @@ TEST(WebCryptoRsaSsaTest, ImportJwkExistingModulusAndInvalid) {
|
|
|
| // This should fail, as the n,e,d parameters are not consistent. It MUST NOT
|
| // somehow return the key created earlier.
|
| - blink::WebCryptoKey key2 = blink::WebCryptoKey::createNull();
|
| + blink::WebCryptoKey key2;
|
| ASSERT_EQ(Status::OperationError(),
|
| ImportKeyJwkFromDict(*key2_jwk,
|
| CreateRsaHashedImportAlgorithm(
|
| @@ -432,7 +432,7 @@ TEST(WebCryptoRsaSsaTest, ImportJwkExistingModulusAndInvalid) {
|
| // This fails because JWA says that producers must include either ALL optional
|
| // parameters or NONE.
|
| TEST(WebCryptoRsaSsaTest, ImportRsaPrivateKeyJwkMissingOptionalParams) {
|
| - blink::WebCryptoKey key = blink::WebCryptoKey::createNull();
|
| + blink::WebCryptoKey key;
|
|
|
| base::DictionaryValue dict;
|
| dict.SetString("kty", "RSA");
|
| @@ -475,7 +475,7 @@ TEST(WebCryptoRsaSsaTest, ImportRsaPrivateKeyJwkIncorrectOptionalEmpty) {
|
| if (!SupportsRsaPrivateKeyImport())
|
| return;
|
|
|
| - blink::WebCryptoKey key = blink::WebCryptoKey::createNull();
|
| + blink::WebCryptoKey key;
|
|
|
| base::DictionaryValue dict;
|
| dict.SetString("kty", "RSA");
|
| @@ -515,7 +515,7 @@ TEST(WebCryptoRsaSsaTest, ImportJwkRsaNonMinimalExponent) {
|
| "p0LGxjD1M8jMcvYq6DPEC_JYQumEu3i9v5fAEH1VvbZi9cTg-rmEXLUUjvc5LdOq_5OuHmtm"
|
| "e7PUJHYW1PW6ENTP0ibeiNOfFvs");
|
|
|
| - blink::WebCryptoKey key = blink::WebCryptoKey::createNull();
|
| + blink::WebCryptoKey key;
|
|
|
| EXPECT_EQ(Status::ErrorJwkBigIntegerHasLeadingZero("e"),
|
| ImportKeyJwkFromDict(dict,
|
| @@ -540,8 +540,8 @@ TEST(WebCryptoRsaSsaTest, GenerateKeyPairRsa) {
|
| public_exponent);
|
| bool extractable = true;
|
| const blink::WebCryptoKeyUsageMask usage_mask = 0;
|
| - blink::WebCryptoKey public_key = blink::WebCryptoKey::createNull();
|
| - blink::WebCryptoKey private_key = blink::WebCryptoKey::createNull();
|
| + blink::WebCryptoKey public_key;
|
| + blink::WebCryptoKey private_key;
|
|
|
| EXPECT_EQ(Status::Success(),
|
| GenerateKeyPair(
|
| @@ -732,8 +732,8 @@ TEST(WebCryptoRsaSsaTest, GenerateKeyPairRsaBadModulusLength) {
|
| public_exponent);
|
| bool extractable = true;
|
| const blink::WebCryptoKeyUsageMask usage_mask = 0;
|
| - blink::WebCryptoKey public_key = blink::WebCryptoKey::createNull();
|
| - blink::WebCryptoKey private_key = blink::WebCryptoKey::createNull();
|
| + blink::WebCryptoKey public_key;
|
| + blink::WebCryptoKey private_key;
|
|
|
| EXPECT_EQ(
|
| Status::ErrorGenerateRsaUnsupportedModulus(),
|
| @@ -763,8 +763,8 @@ TEST(WebCryptoRsaSsaTest, GenerateKeyPairRsaBadExponent) {
|
| modulus_length,
|
| HexStringToBytes(kPublicExponents[i]));
|
|
|
| - blink::WebCryptoKey public_key = blink::WebCryptoKey::createNull();
|
| - blink::WebCryptoKey private_key = blink::WebCryptoKey::createNull();
|
| + blink::WebCryptoKey public_key;
|
| + blink::WebCryptoKey private_key;
|
|
|
| EXPECT_EQ(Status::ErrorGenerateKeyPublicExponent(),
|
| GenerateKeyPair(algorithm, true, 0, &public_key, &private_key));
|
| @@ -779,8 +779,8 @@ TEST(WebCryptoRsaSsaTest, SignVerifyFailures) {
|
| blink::WebCryptoAlgorithm import_algorithm =
|
| CreateRsaHashedImportAlgorithm(blink::WebCryptoAlgorithmIdRsaSsaPkcs1v1_5,
|
| blink::WebCryptoAlgorithmIdSha1);
|
| - blink::WebCryptoKey public_key = blink::WebCryptoKey::createNull();
|
| - blink::WebCryptoKey private_key = blink::WebCryptoKey::createNull();
|
| + blink::WebCryptoKey public_key;
|
| + blink::WebCryptoKey private_key;
|
| ASSERT_NO_FATAL_FAILURE(
|
| ImportRsaKeyPair(HexStringToBytes(kPublicKeySpkiDerHex),
|
| HexStringToBytes(kPrivateKeyPkcs8DerHex),
|
| @@ -872,7 +872,7 @@ TEST(WebCryptoRsaSsaTest, SignVerifyFailures) {
|
| CryptoData(data),
|
| &signature));
|
|
|
| - blink::WebCryptoKey public_key_256 = blink::WebCryptoKey::createNull();
|
| + blink::WebCryptoKey public_key_256;
|
| EXPECT_EQ(Status::Success(),
|
| ImportKey(blink::WebCryptoKeyFormatSpki,
|
| CryptoData(HexStringToBytes(kPublicKeySpkiDerHex)),
|
| @@ -914,8 +914,8 @@ TEST(WebCryptoRsaSsaTest, SignVerifyKnownAnswer) {
|
| blink::WebCryptoAlgorithm import_algorithm =
|
| CreateRsaHashedImportAlgorithm(blink::WebCryptoAlgorithmIdRsaSsaPkcs1v1_5,
|
| blink::WebCryptoAlgorithmIdSha1);
|
| - blink::WebCryptoKey public_key = blink::WebCryptoKey::createNull();
|
| - blink::WebCryptoKey private_key = blink::WebCryptoKey::createNull();
|
| + blink::WebCryptoKey public_key;
|
| + blink::WebCryptoKey private_key;
|
| ASSERT_NO_FATAL_FAILURE(
|
| ImportRsaKeyPair(HexStringToBytes(kPublicKeySpkiDerHex),
|
| HexStringToBytes(kPrivateKeyPkcs8DerHex),
|
| @@ -976,7 +976,7 @@ TEST(WebCryptoRsaSsaTest, ImportRsaSsaPublicKeyBadUsage_SPKI) {
|
| for (size_t i = 0; i < arraysize(bad_usages); ++i) {
|
| SCOPED_TRACE(i);
|
|
|
| - blink::WebCryptoKey public_key = blink::WebCryptoKey::createNull();
|
| + blink::WebCryptoKey public_key;
|
| ASSERT_EQ(Status::ErrorCreateKeyBadUsages(),
|
| ImportKey(blink::WebCryptoKeyFormatSpki,
|
| CryptoData(HexStringToBytes(kPublicKeySpkiDerHex)),
|
| @@ -1009,7 +1009,7 @@ TEST(WebCryptoRsaSsaTest, ImportRsaSsaPublicKeyBadUsage_JWK) {
|
| for (size_t i = 0; i < arraysize(bad_usages); ++i) {
|
| SCOPED_TRACE(i);
|
|
|
| - blink::WebCryptoKey public_key = blink::WebCryptoKey::createNull();
|
| + blink::WebCryptoKey public_key;
|
| ASSERT_EQ(Status::ErrorCreateKeyBadUsages(),
|
| ImportKeyJwkFromDict(
|
| dict, algorithm, false, bad_usages[i], &public_key));
|
| @@ -1031,8 +1031,8 @@ TEST(WebCryptoRsaSsaTest, GenerateKeyBadUsages) {
|
| for (size_t i = 0; i < arraysize(bad_usages); ++i) {
|
| SCOPED_TRACE(i);
|
|
|
| - blink::WebCryptoKey public_key = blink::WebCryptoKey::createNull();
|
| - blink::WebCryptoKey private_key = blink::WebCryptoKey::createNull();
|
| + blink::WebCryptoKey public_key;
|
| + blink::WebCryptoKey private_key;
|
|
|
| ASSERT_EQ(Status::ErrorCreateKeyBadUsages(),
|
| GenerateKeyPair(CreateRsaHashedKeyGenAlgorithm(
|
| @@ -1054,8 +1054,8 @@ TEST(WebCryptoRsaSsaTest, GenerateKeyPairIntersectUsages) {
|
| const unsigned int modulus_length = 256;
|
| const std::vector<uint8_t> public_exponent = HexStringToBytes("010001");
|
|
|
| - blink::WebCryptoKey public_key = blink::WebCryptoKey::createNull();
|
| - blink::WebCryptoKey private_key = blink::WebCryptoKey::createNull();
|
| + blink::WebCryptoKey public_key;
|
| + blink::WebCryptoKey private_key;
|
|
|
| ASSERT_EQ(Status::Success(),
|
| GenerateKeyPair(
|
| @@ -1112,7 +1112,7 @@ TEST(WebCryptoRsaSsaTest, ImportExportJwkRsaPublicKey) {
|
| blink::WebCryptoAlgorithmIdRsaSsaPkcs1v1_5, test.hash);
|
|
|
| // Import the spki to create a public key
|
| - blink::WebCryptoKey public_key = blink::WebCryptoKey::createNull();
|
| + blink::WebCryptoKey public_key;
|
| ASSERT_EQ(Status::Success(),
|
| ImportKey(blink::WebCryptoKeyFormatSpki,
|
| CryptoData(HexStringToBytes(kPublicKeySpkiDerHex)),
|
| @@ -1132,7 +1132,7 @@ TEST(WebCryptoRsaSsaTest, ImportExportJwkRsaPublicKey) {
|
| test.usage));
|
|
|
| // Import the JWK back in to create a new key
|
| - blink::WebCryptoKey public_key2 = blink::WebCryptoKey::createNull();
|
| + blink::WebCryptoKey public_key2;
|
| ASSERT_EQ(Status::Success(),
|
| ImportKey(blink::WebCryptoKeyFormatJwk,
|
| CryptoData(jwk),
|
| @@ -1160,7 +1160,7 @@ TEST(WebCryptoRsaSsaTest, ImportJwkRsaFailures) {
|
| CreateRsaHashedImportAlgorithm(blink::WebCryptoAlgorithmIdRsaSsaPkcs1v1_5,
|
| blink::WebCryptoAlgorithmIdSha256);
|
| blink::WebCryptoKeyUsageMask usage_mask = blink::WebCryptoKeyUsageVerify;
|
| - blink::WebCryptoKey key = blink::WebCryptoKey::createNull();
|
| + blink::WebCryptoKey key;
|
|
|
| // An RSA public key JWK _must_ have an "n" (modulus) and an "e" (exponent)
|
| // entry, while an RSA private key must have those plus at least a "d"
|
|
|