Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(108)

Unified Diff: crypto/signature_creator_unittest.cc

Issue 956613002: Reland "Cut down /crypto and switch what is left of it to boringssl". (Closed) Base URL: git@github.com:domokit/mojo.git@master
Patch Set: Rebase. Created 5 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « crypto/signature_creator_openssl.cc ('k') | crypto/signature_verifier.h » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: crypto/signature_creator_unittest.cc
diff --git a/crypto/signature_creator_unittest.cc b/crypto/signature_creator_unittest.cc
deleted file mode 100644
index 694becdcb4475effc0e4c35dceebe0c6db2a14d5..0000000000000000000000000000000000000000
--- a/crypto/signature_creator_unittest.cc
+++ /dev/null
@@ -1,143 +0,0 @@
-// Copyright (c) 2012 The Chromium Authors. All rights reserved.
-// Use of this source code is governed by a BSD-style license that can be
-// found in the LICENSE file.
-
-#include <vector>
-
-#include "base/memory/scoped_ptr.h"
-#include "base/sha1.h"
-#include "crypto/rsa_private_key.h"
-#include "crypto/sha2.h"
-#include "crypto/signature_creator.h"
-#include "crypto/signature_verifier.h"
-#include "testing/gtest/include/gtest/gtest.h"
-
-namespace {
-
-// This is the algorithm ID for SHA-1 with RSA encryption.
-const uint8 kSHA1WithRSAAlgorithmID[] = {
- 0x30, 0x0d, 0x06, 0x09, 0x2a, 0x86, 0x48, 0x86,
- 0xf7, 0x0d, 0x01, 0x01, 0x05, 0x05, 0x00
-};
-
-// This is the algorithm ID for SHA-1 with RSA encryption.
-const uint8 kSHA256WithRSAAlgorithmID[] = {
- 0x30, 0x0d, 0x06, 0x09, 0x2a, 0x86, 0x48, 0x86,
- 0xf7, 0x0d, 0x01, 0x01, 0x0B, 0x05, 0x00
-};
-
-}
-
-TEST(SignatureCreatorTest, BasicTest) {
- // Do a verify round trip.
- scoped_ptr<crypto::RSAPrivateKey> key_original(
- crypto::RSAPrivateKey::Create(1024));
- ASSERT_TRUE(key_original.get());
-
- std::vector<uint8> key_info;
- key_original->ExportPrivateKey(&key_info);
- scoped_ptr<crypto::RSAPrivateKey> key(
- crypto::RSAPrivateKey::CreateFromPrivateKeyInfo(key_info));
- ASSERT_TRUE(key.get());
-
- scoped_ptr<crypto::SignatureCreator> signer(
- crypto::SignatureCreator::Create(key.get(),
- crypto::SignatureCreator::SHA1));
- ASSERT_TRUE(signer.get());
-
- std::string data("Hello, World!");
- ASSERT_TRUE(signer->Update(reinterpret_cast<const uint8*>(data.c_str()),
- data.size()));
-
- std::vector<uint8> signature;
- ASSERT_TRUE(signer->Final(&signature));
-
- std::vector<uint8> public_key_info;
- ASSERT_TRUE(key_original->ExportPublicKey(&public_key_info));
-
- crypto::SignatureVerifier verifier;
- ASSERT_TRUE(verifier.VerifyInit(
- kSHA1WithRSAAlgorithmID, sizeof(kSHA1WithRSAAlgorithmID),
- &signature.front(), signature.size(),
- &public_key_info.front(), public_key_info.size()));
-
- verifier.VerifyUpdate(reinterpret_cast<const uint8*>(data.c_str()),
- data.size());
- ASSERT_TRUE(verifier.VerifyFinal());
-}
-
-TEST(SignatureCreatorTest, SignDigestTest) {
- // Do a verify round trip.
- scoped_ptr<crypto::RSAPrivateKey> key_original(
- crypto::RSAPrivateKey::Create(1024));
- ASSERT_TRUE(key_original.get());
-
- std::vector<uint8> key_info;
- key_original->ExportPrivateKey(&key_info);
- scoped_ptr<crypto::RSAPrivateKey> key(
- crypto::RSAPrivateKey::CreateFromPrivateKeyInfo(key_info));
- ASSERT_TRUE(key.get());
-
- std::string data("Hello, World!");
- std::string sha1 = base::SHA1HashString(data);
- // Sign sha1 of the input data.
- std::vector<uint8> signature;
- ASSERT_TRUE(crypto::SignatureCreator::Sign(
- key.get(),
- crypto::SignatureCreator::SHA1,
- reinterpret_cast<const uint8*>(sha1.c_str()),
- sha1.size(),
- &signature));
-
- std::vector<uint8> public_key_info;
- ASSERT_TRUE(key_original->ExportPublicKey(&public_key_info));
-
- // Verify the input data.
- crypto::SignatureVerifier verifier;
- ASSERT_TRUE(verifier.VerifyInit(
- kSHA1WithRSAAlgorithmID, sizeof(kSHA1WithRSAAlgorithmID),
- &signature.front(), signature.size(),
- &public_key_info.front(), public_key_info.size()));
-
- verifier.VerifyUpdate(reinterpret_cast<const uint8*>(data.c_str()),
- data.size());
- ASSERT_TRUE(verifier.VerifyFinal());
-}
-
-TEST(SignatureCreatorTest, SignSHA256DigestTest) {
- // Do a verify round trip.
- scoped_ptr<crypto::RSAPrivateKey> key_original(
- crypto::RSAPrivateKey::Create(1024));
- ASSERT_TRUE(key_original.get());
-
- std::vector<uint8> key_info;
- key_original->ExportPrivateKey(&key_info);
- scoped_ptr<crypto::RSAPrivateKey> key(
- crypto::RSAPrivateKey::CreateFromPrivateKeyInfo(key_info));
- ASSERT_TRUE(key.get());
-
- std::string data("Hello, World!");
- std::string sha256 = crypto::SHA256HashString(data);
- // Sign sha256 of the input data.
- std::vector<uint8> signature;
- ASSERT_TRUE(crypto::SignatureCreator::Sign(
- key.get(),
- crypto::SignatureCreator::HashAlgorithm::SHA256,
- reinterpret_cast<const uint8*>(sha256.c_str()),
- sha256.size(),
- &signature));
-
- std::vector<uint8> public_key_info;
- ASSERT_TRUE(key_original->ExportPublicKey(&public_key_info));
-
- // Verify the input data.
- crypto::SignatureVerifier verifier;
- ASSERT_TRUE(verifier.VerifyInit(
- kSHA256WithRSAAlgorithmID, sizeof(kSHA256WithRSAAlgorithmID),
- &signature.front(), signature.size(),
- &public_key_info.front(), public_key_info.size()));
-
- verifier.VerifyUpdate(reinterpret_cast<const uint8*>(data.c_str()),
- data.size());
- ASSERT_TRUE(verifier.VerifyFinal());
-}
« no previous file with comments | « crypto/signature_creator_openssl.cc ('k') | crypto/signature_verifier.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698