| OLD | NEW |
| 1 /* | 1 /* |
| 2 * Copyright 2011 The WebRTC Project Authors. All rights reserved. | 2 * Copyright 2011 The WebRTC Project Authors. All rights reserved. |
| 3 * | 3 * |
| 4 * Use of this source code is governed by a BSD-style license | 4 * Use of this source code is governed by a BSD-style license |
| 5 * that can be found in the LICENSE file in the root of the source | 5 * that can be found in the LICENSE file in the root of the source |
| 6 * tree. An additional intellectual property rights grant can be found | 6 * tree. An additional intellectual property rights grant can be found |
| 7 * in the file PATENTS. All contributing project authors may | 7 * in the file PATENTS. All contributing project authors may |
| 8 * be found in the AUTHORS file in the root of the source tree. | 8 * be found in the AUTHORS file in the root of the source tree. |
| 9 */ | 9 */ |
| 10 | 10 |
| (...skipping 51 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 62 0xce, 0x26, 0x58, 0x4a, 0x33, 0x6d, 0xbc, 0xb6}; | 62 0xce, 0x26, 0x58, 0x4a, 0x33, 0x6d, 0xbc, 0xb6}; |
| 63 | 63 |
| 64 class SSLIdentityTest : public testing::Test { | 64 class SSLIdentityTest : public testing::Test { |
| 65 public: | 65 public: |
| 66 SSLIdentityTest() {} | 66 SSLIdentityTest() {} |
| 67 | 67 |
| 68 ~SSLIdentityTest() { | 68 ~SSLIdentityTest() { |
| 69 } | 69 } |
| 70 | 70 |
| 71 virtual void SetUp() { | 71 virtual void SetUp() { |
| 72 identity_rsa1_.reset(SSLIdentity::Generate("test1", rtc::KT_RSA)); | 72 identity_rsa1_.reset( |
| 73 identity_rsa2_.reset(SSLIdentity::Generate("test2", rtc::KT_RSA)); | 73 SSLIdentity::Generate("test1", rtc::KeyTypeFull::RSA())); |
| 74 identity_ecdsa1_.reset(SSLIdentity::Generate("test3", rtc::KT_ECDSA)); | 74 identity_rsa2_.reset( |
| 75 identity_ecdsa2_.reset(SSLIdentity::Generate("test4", rtc::KT_ECDSA)); | 75 SSLIdentity::Generate("test2", rtc::KeyTypeFull::RSA())); |
| 76 identity_ecdsa1_.reset( |
| 77 SSLIdentity::Generate("test3", rtc::KeyTypeFull::ECDSA())); |
| 78 identity_ecdsa2_.reset( |
| 79 SSLIdentity::Generate("test4", rtc::KeyTypeFull::ECDSA())); |
| 76 | 80 |
| 77 ASSERT_TRUE(identity_rsa1_); | 81 ASSERT_TRUE(identity_rsa1_); |
| 78 ASSERT_TRUE(identity_rsa2_); | 82 ASSERT_TRUE(identity_rsa2_); |
| 79 ASSERT_TRUE(identity_ecdsa1_); | 83 ASSERT_TRUE(identity_ecdsa1_); |
| 80 ASSERT_TRUE(identity_ecdsa2_); | 84 ASSERT_TRUE(identity_ecdsa2_); |
| 81 | 85 |
| 82 test_cert_.reset(rtc::SSLCertificate::FromPEMString(kTestCertificate)); | 86 test_cert_.reset(rtc::SSLCertificate::FromPEMString(kTestCertificate)); |
| 83 ASSERT_TRUE(test_cert_); | 87 ASSERT_TRUE(test_cert_); |
| 84 } | 88 } |
| 85 | 89 |
| (...skipping 202 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 288 EXPECT_TRUE(SSLIdentity::PemToDer("CERTIFICATE", kTestCertificate, &der)); | 292 EXPECT_TRUE(SSLIdentity::PemToDer("CERTIFICATE", kTestCertificate, &der)); |
| 289 | 293 |
| 290 EXPECT_EQ(kTestCertificate, SSLIdentity::DerToPem( | 294 EXPECT_EQ(kTestCertificate, SSLIdentity::DerToPem( |
| 291 "CERTIFICATE", | 295 "CERTIFICATE", |
| 292 reinterpret_cast<const unsigned char*>(der.data()), der.length())); | 296 reinterpret_cast<const unsigned char*>(der.data()), der.length())); |
| 293 } | 297 } |
| 294 | 298 |
| 295 TEST_F(SSLIdentityTest, GetSignatureDigestAlgorithm) { | 299 TEST_F(SSLIdentityTest, GetSignatureDigestAlgorithm) { |
| 296 TestGetSignatureDigestAlgorithm(); | 300 TestGetSignatureDigestAlgorithm(); |
| 297 } | 301 } |
| OLD | NEW |