diff options
author | rsleevi@chromium.org <rsleevi@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2012-03-22 04:50:24 +0000 |
---|---|---|
committer | rsleevi@chromium.org <rsleevi@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2012-03-22 04:50:24 +0000 |
commit | 62b23c2fcde411a2198af403161050906f16f079 (patch) | |
tree | 7d537427f11deef843478e72efc210ca4e613e4b /net/base/x509_certificate_unittest.cc | |
parent | 305a8b341c1f7e73b48f9f01d0b5cadec5cd7c36 (diff) | |
download | chromium_src-62b23c2fcde411a2198af403161050906f16f079.zip chromium_src-62b23c2fcde411a2198af403161050906f16f079.tar.gz chromium_src-62b23c2fcde411a2198af403161050906f16f079.tar.bz2 |
Move X509Certificate::Verify into CertVerifyProc
With this split, CertVerifyProc is responsible for
interacting with the underlying PKIX path building and
verification library, while X509Certificate is responsible
for parsing certificates with the underlying crypto library
and exposing a common interface for higher-level code such
as UI.
BUG=114343
TEST=net_unittests
Review URL: https://chromiumcodereview.appspot.com/9691054
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@128172 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'net/base/x509_certificate_unittest.cc')
-rw-r--r-- | net/base/x509_certificate_unittest.cc | 35 |
1 files changed, 0 insertions, 35 deletions
diff --git a/net/base/x509_certificate_unittest.cc b/net/base/x509_certificate_unittest.cc index 228679d..2bea8e5 100644 --- a/net/base/x509_certificate_unittest.cc +++ b/net/base/x509_certificate_unittest.cc @@ -438,41 +438,6 @@ TEST(X509CertificateTest, CAFingerprints) { cert_chain3_ca_fingerprint, 20) == 0); } -TEST(X509CertificateTest, DigiNotarCerts) { - static const char* const kDigiNotarFilenames[] = { - "diginotar_root_ca.pem", - "diginotar_cyber_ca.pem", - "diginotar_services_1024_ca.pem", - "diginotar_pkioverheid.pem", - "diginotar_pkioverheid_g2.pem", - NULL, - }; - - FilePath certs_dir = GetTestCertsDirectory(); - - for (size_t i = 0; kDigiNotarFilenames[i]; i++) { - scoped_refptr<X509Certificate> diginotar_cert = - ImportCertFromFile(certs_dir, kDigiNotarFilenames[i]); - std::string der_bytes; - ASSERT_TRUE(X509Certificate::GetDEREncoded( - diginotar_cert->os_cert_handle(), &der_bytes)); - - base::StringPiece spki; - ASSERT_TRUE(asn1::ExtractSPKIFromDERCert(der_bytes, &spki)); - - std::string spki_sha1 = base::SHA1HashString(spki.as_string()); - - std::vector<SHA1Fingerprint> public_keys; - SHA1Fingerprint fingerprint; - ASSERT_EQ(sizeof(fingerprint.data), spki_sha1.size()); - memcpy(fingerprint.data, spki_sha1.data(), spki_sha1.size()); - public_keys.push_back(fingerprint); - - EXPECT_TRUE(X509Certificate::IsPublicKeyBlacklisted(public_keys)) << - "Public key not blocked for " << kDigiNotarFilenames[i]; - } -} - TEST(X509CertificateTest, ExtractSPKIFromDERCert) { FilePath certs_dir = GetTestCertsDirectory(); scoped_refptr<X509Certificate> cert = |