diff options
author | wtc@chromium.org <wtc@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2009-04-10 23:43:43 +0000 |
---|---|---|
committer | wtc@chromium.org <wtc@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2009-04-10 23:43:43 +0000 |
commit | 15b3b56a70dfa4f8c35f2723ee6ed1e9c9b25b1c (patch) | |
tree | 9c75320861f4ca9abb88e37615ec508ea4fc4cce /base | |
parent | 076c8508d3de4665b7af5803b5189a9d13a01d83 (diff) | |
download | chromium_src-15b3b56a70dfa4f8c35f2723ee6ed1e9c9b25b1c.zip chromium_src-15b3b56a70dfa4f8c35f2723ee6ed1e9c9b25b1c.tar.gz chromium_src-15b3b56a70dfa4f8c35f2723ee6ed1e9c9b25b1c.tar.bz2 |
Set the svn:eol-style properties of these new files to LF.
Normalize the CRLF line endings to LF in
signature_verifier.h and signature_verifier_unittest.cc.
R=erikkay
BUG=6305
Review URL: http://codereview.chromium.org/67060
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@13548 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'base')
-rw-r--r-- | base/crypto/signature_verifier.h | 8 | ||||
-rw-r--r-- | base/crypto/signature_verifier_unittest.cc | 12 |
2 files changed, 10 insertions, 10 deletions
diff --git a/base/crypto/signature_verifier.h b/base/crypto/signature_verifier.h index c7e532d..18873e8 100644 --- a/base/crypto/signature_verifier.h +++ b/base/crypto/signature_verifier.h @@ -36,8 +36,8 @@ class SignatureVerifier { // // The signature algorithm is specified as a DER encoded ASN.1 // AlgorithmIdentifier structure: - // AlgorithmIdentifier ::= SEQUENCE {
- // algorithm OBJECT IDENTIFIER,
+ // AlgorithmIdentifier ::= SEQUENCE { + // algorithm OBJECT IDENTIFIER, // parameters ANY DEFINED BY algorithm OPTIONAL } // // The signature is encoded according to the signature algorithm, but it @@ -48,8 +48,8 @@ class SignatureVerifier { // The public key is specified as a DER encoded ASN.1 SubjectPublicKeyInfo // structure, which contains not only the public key but also its type // (algorithm): - // SubjectPublicKeyInfo ::= SEQUENCE {
- // algorithm AlgorithmIdentifier,
+ // SubjectPublicKeyInfo ::= SEQUENCE { + // algorithm AlgorithmIdentifier, // subjectPublicKey BIT STRING } bool VerifyInit(const uint8* signature_algorithm, int signature_algorithm_len, diff --git a/base/crypto/signature_verifier_unittest.cc b/base/crypto/signature_verifier_unittest.cc index 6c7fdd9..3317601 100644 --- a/base/crypto/signature_verifier_unittest.cc +++ b/base/crypto/signature_verifier_unittest.cc @@ -19,8 +19,8 @@ TEST(SignatureVerifierTest, BasicTest) { // encoding of the ASN.1 structures. // The data that is signed is the following ASN.1 structure: - // TBSCertificate ::= SEQUENCE {
- // ... -- omitted, not important
+ // TBSCertificate ::= SEQUENCE { + // ... -- omitted, not important // } const uint8 tbs_certificate[1017] = { 0x30, 0x82, 0x03, 0xf5, // a SEQUENCE of length 1013 (0x3f5) @@ -112,8 +112,8 @@ TEST(SignatureVerifierTest, BasicTest) { }; // The signature algorithm is specified as the following ASN.1 structure: - // AlgorithmIdentifier ::= SEQUENCE {
- // algorithm OBJECT IDENTIFIER,
+ // AlgorithmIdentifier ::= SEQUENCE { + // algorithm OBJECT IDENTIFIER, // parameters ANY DEFINED BY algorithm OPTIONAL } // const uint8 signature_algorithm[15] = { @@ -151,8 +151,8 @@ TEST(SignatureVerifierTest, BasicTest) { }; // The public key is specified as the following ASN.1 structure: - // SubjectPublicKeyInfo ::= SEQUENCE {
- // algorithm AlgorithmIdentifier,
+ // SubjectPublicKeyInfo ::= SEQUENCE { + // algorithm AlgorithmIdentifier, // subjectPublicKey BIT STRING } const uint8 public_key_info[294] = { 0x30, 0x82, 0x01, 0x22, // a SEQUENCE of length 290 (0x122) |