summaryrefslogtreecommitdiffstats
path: root/net/base/x509_certificate_unittest.cc
diff options
context:
space:
mode:
authorrsleevi@chromium.org <rsleevi@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2012-03-22 04:50:24 +0000
committerrsleevi@chromium.org <rsleevi@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2012-03-22 04:50:24 +0000
commit62b23c2fcde411a2198af403161050906f16f079 (patch)
tree7d537427f11deef843478e72efc210ca4e613e4b /net/base/x509_certificate_unittest.cc
parent305a8b341c1f7e73b48f9f01d0b5cadec5cd7c36 (diff)
downloadchromium_src-62b23c2fcde411a2198af403161050906f16f079.zip
chromium_src-62b23c2fcde411a2198af403161050906f16f079.tar.gz
chromium_src-62b23c2fcde411a2198af403161050906f16f079.tar.bz2
Move X509Certificate::Verify into CertVerifyProc
With this split, CertVerifyProc is responsible for interacting with the underlying PKIX path building and verification library, while X509Certificate is responsible for parsing certificates with the underlying crypto library and exposing a common interface for higher-level code such as UI. BUG=114343 TEST=net_unittests Review URL: https://chromiumcodereview.appspot.com/9691054 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@128172 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'net/base/x509_certificate_unittest.cc')
-rw-r--r--net/base/x509_certificate_unittest.cc35
1 files changed, 0 insertions, 35 deletions
diff --git a/net/base/x509_certificate_unittest.cc b/net/base/x509_certificate_unittest.cc
index 228679d..2bea8e5 100644
--- a/net/base/x509_certificate_unittest.cc
+++ b/net/base/x509_certificate_unittest.cc
@@ -438,41 +438,6 @@ TEST(X509CertificateTest, CAFingerprints) {
cert_chain3_ca_fingerprint, 20) == 0);
}
-TEST(X509CertificateTest, DigiNotarCerts) {
- static const char* const kDigiNotarFilenames[] = {
- "diginotar_root_ca.pem",
- "diginotar_cyber_ca.pem",
- "diginotar_services_1024_ca.pem",
- "diginotar_pkioverheid.pem",
- "diginotar_pkioverheid_g2.pem",
- NULL,
- };
-
- FilePath certs_dir = GetTestCertsDirectory();
-
- for (size_t i = 0; kDigiNotarFilenames[i]; i++) {
- scoped_refptr<X509Certificate> diginotar_cert =
- ImportCertFromFile(certs_dir, kDigiNotarFilenames[i]);
- std::string der_bytes;
- ASSERT_TRUE(X509Certificate::GetDEREncoded(
- diginotar_cert->os_cert_handle(), &der_bytes));
-
- base::StringPiece spki;
- ASSERT_TRUE(asn1::ExtractSPKIFromDERCert(der_bytes, &spki));
-
- std::string spki_sha1 = base::SHA1HashString(spki.as_string());
-
- std::vector<SHA1Fingerprint> public_keys;
- SHA1Fingerprint fingerprint;
- ASSERT_EQ(sizeof(fingerprint.data), spki_sha1.size());
- memcpy(fingerprint.data, spki_sha1.data(), spki_sha1.size());
- public_keys.push_back(fingerprint);
-
- EXPECT_TRUE(X509Certificate::IsPublicKeyBlacklisted(public_keys)) <<
- "Public key not blocked for " << kDigiNotarFilenames[i];
- }
-}
-
TEST(X509CertificateTest, ExtractSPKIFromDERCert) {
FilePath certs_dir = GetTestCertsDirectory();
scoped_refptr<X509Certificate> cert =