summaryrefslogtreecommitdiffstats
path: root/base/crypto
diff options
context:
space:
mode:
authorwtc@chromium.org <wtc@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2009-04-10 23:43:43 +0000
committerwtc@chromium.org <wtc@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2009-04-10 23:43:43 +0000
commit15b3b56a70dfa4f8c35f2723ee6ed1e9c9b25b1c (patch)
tree9c75320861f4ca9abb88e37615ec508ea4fc4cce /base/crypto
parent076c8508d3de4665b7af5803b5189a9d13a01d83 (diff)
downloadchromium_src-15b3b56a70dfa4f8c35f2723ee6ed1e9c9b25b1c.zip
chromium_src-15b3b56a70dfa4f8c35f2723ee6ed1e9c9b25b1c.tar.gz
chromium_src-15b3b56a70dfa4f8c35f2723ee6ed1e9c9b25b1c.tar.bz2
Set the svn:eol-style properties of these new files to LF.
Normalize the CRLF line endings to LF in signature_verifier.h and signature_verifier_unittest.cc. R=erikkay BUG=6305 Review URL: http://codereview.chromium.org/67060 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@13548 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'base/crypto')
-rw-r--r--base/crypto/signature_verifier.h8
-rw-r--r--base/crypto/signature_verifier_unittest.cc12
2 files changed, 10 insertions, 10 deletions
diff --git a/base/crypto/signature_verifier.h b/base/crypto/signature_verifier.h
index c7e532d..18873e8 100644
--- a/base/crypto/signature_verifier.h
+++ b/base/crypto/signature_verifier.h
@@ -36,8 +36,8 @@ class SignatureVerifier {
//
// The signature algorithm is specified as a DER encoded ASN.1
// AlgorithmIdentifier structure:
- // AlgorithmIdentifier ::= SEQUENCE {
- // algorithm OBJECT IDENTIFIER,
+ // AlgorithmIdentifier ::= SEQUENCE {
+ // algorithm OBJECT IDENTIFIER,
// parameters ANY DEFINED BY algorithm OPTIONAL }
//
// The signature is encoded according to the signature algorithm, but it
@@ -48,8 +48,8 @@ class SignatureVerifier {
// The public key is specified as a DER encoded ASN.1 SubjectPublicKeyInfo
// structure, which contains not only the public key but also its type
// (algorithm):
- // SubjectPublicKeyInfo ::= SEQUENCE {
- // algorithm AlgorithmIdentifier,
+ // SubjectPublicKeyInfo ::= SEQUENCE {
+ // algorithm AlgorithmIdentifier,
// subjectPublicKey BIT STRING }
bool VerifyInit(const uint8* signature_algorithm,
int signature_algorithm_len,
diff --git a/base/crypto/signature_verifier_unittest.cc b/base/crypto/signature_verifier_unittest.cc
index 6c7fdd9..3317601 100644
--- a/base/crypto/signature_verifier_unittest.cc
+++ b/base/crypto/signature_verifier_unittest.cc
@@ -19,8 +19,8 @@ TEST(SignatureVerifierTest, BasicTest) {
// encoding of the ASN.1 structures.
// The data that is signed is the following ASN.1 structure:
- // TBSCertificate ::= SEQUENCE {
- // ... -- omitted, not important
+ // TBSCertificate ::= SEQUENCE {
+ // ... -- omitted, not important
// }
const uint8 tbs_certificate[1017] = {
0x30, 0x82, 0x03, 0xf5, // a SEQUENCE of length 1013 (0x3f5)
@@ -112,8 +112,8 @@ TEST(SignatureVerifierTest, BasicTest) {
};
// The signature algorithm is specified as the following ASN.1 structure:
- // AlgorithmIdentifier ::= SEQUENCE {
- // algorithm OBJECT IDENTIFIER,
+ // AlgorithmIdentifier ::= SEQUENCE {
+ // algorithm OBJECT IDENTIFIER,
// parameters ANY DEFINED BY algorithm OPTIONAL }
//
const uint8 signature_algorithm[15] = {
@@ -151,8 +151,8 @@ TEST(SignatureVerifierTest, BasicTest) {
};
// The public key is specified as the following ASN.1 structure:
- // SubjectPublicKeyInfo ::= SEQUENCE {
- // algorithm AlgorithmIdentifier,
+ // SubjectPublicKeyInfo ::= SEQUENCE {
+ // algorithm AlgorithmIdentifier,
// subjectPublicKey BIT STRING }
const uint8 public_key_info[294] = {
0x30, 0x82, 0x01, 0x22, // a SEQUENCE of length 290 (0x122)