• Home
  • Raw
  • Download

Lines Matching +full:digests +full:- +full:clang

4  *  Use of this source code is governed by a BSD-style license
32 "-----BEGIN CERTIFICATE-----\n"
44 "-----END CERTIFICATE-----\n";
71 // `SSLIdentity::Create` and invoking `identity->PrivateKeyToPEMString()`,
72 // `identity->PublicKeyToPEMString()` and
73 // `identity->certificate().ToPEMString()`. If the crypto library is updated,
76 // were created by calling `identity->certificate().GetStats()`.
78 "-----BEGIN PRIVATE KEY-----\n"
93 "-----END PRIVATE KEY-----\n";
95 "-----BEGIN PUBLIC KEY-----\n"
100 "-----END PUBLIC KEY-----\n";
102 "-----BEGIN CERTIFICATE-----\n"
112 "-----END CERTIFICATE-----\n";
116 static const char kRSA_FINGERPRINT_ALGORITHM[] = "sha-256";
128 "-----BEGIN PRIVATE KEY-----\n"
132 "-----END PRIVATE KEY-----\n";
134 "-----BEGIN PUBLIC KEY-----\n"
137 "-----END PUBLIC KEY-----\n";
139 "-----BEGIN CERTIFICATE-----\n"
146 "-----END CERTIFICATE-----\n";
150 static const char kECDSA_FINGERPRINT_ALGORITHM[] = "sha-256";
179 absl::StrReplaceAll({{"-----BEGIN CERTIFICATE-----", ""}, in CreateFakeIdentityAndInfoFromDers()
180 {"-----END CERTIFICATE-----", ""}, in CreateFakeIdentityAndInfoFromDers()
186 const rtc::SSLCertChain& chain = info.identity->cert_chain(); in CreateFakeIdentityAndInfoFromDers()
189 fp = rtc::SSLFingerprint::Create("sha-1", chain.Get(i)); in CreateFakeIdentityAndInfoFromDers()
191 info.fingerprints.push_back(fp->GetRfc4572Fingerprint()); in CreateFakeIdentityAndInfoFromDers()
217 ASSERT_TRUE(identity_rsa1_->certificate().GetSignatureDigestAlgorithm( in TestGetSignatureDigestAlgorithm()
221 ASSERT_TRUE(identity_rsa2_->certificate().GetSignatureDigestAlgorithm( in TestGetSignatureDigestAlgorithm()
225 ASSERT_TRUE(identity_ecdsa1_->certificate().GetSignatureDigestAlgorithm( in TestGetSignatureDigestAlgorithm()
229 ASSERT_TRUE(identity_ecdsa2_->certificate().GetSignatureDigestAlgorithm( in TestGetSignatureDigestAlgorithm()
233 // The test certificate has an MD5-based signature. in TestGetSignatureDigestAlgorithm()
234 ASSERT_TRUE(test_cert_->GetSignatureDigestAlgorithm(&digest_algorithm)); in TestGetSignatureDigestAlgorithm()
249 rv = identity->certificate().ComputeDigest(algorithm, digest, in TestDigestHelper()
256 rv = identity->certificate().ComputeDigest(algorithm, digest1, in TestDigestHelper()
277 // Sanity check that all four digests are unique. This could theoretically in TestDigestForGeneratedCert()
278 // fail, since cryptographic hash collisions have a non-zero probability. in TestDigestForGeneratedCert()
296 rv = test_cert_->ComputeDigest(algorithm, digest, sizeof(digest), in TestDigestForFixedCert()
316 clone->certificate().CertificateExpirationTime()); in TestCloningIdentity()
326 std::string clone_priv_pem = clone->PrivateKeyToPEMString(); in TestCloningIdentity()
327 std::string clone_publ_pem = clone->PublicKeyToPEMString(); in TestCloningIdentity()
328 std::string clone_cert_pem = clone->certificate().ToPEMString(); in TestCloningIdentity()
398 EXPECT_EQ(kRSA_PRIVATE_KEY_PEM, identity->PrivateKeyToPEMString()); in TEST_F()
399 EXPECT_EQ(kRSA_PUBLIC_KEY_PEM, identity->PublicKeyToPEMString()); in TEST_F()
400 EXPECT_EQ(kRSA_CERT_PEM, identity->certificate().ToPEMString()); in TEST_F()
407 EXPECT_EQ(kECDSA_PRIVATE_KEY_PEM, identity->PrivateKeyToPEMString()); in TEST_F()
408 EXPECT_EQ(kECDSA_PUBLIC_KEY_PEM, identity->PublicKeyToPEMString()); in TEST_F()
409 EXPECT_EQ(kECDSA_CERT_PEM, identity->certificate().ToPEMString()); in TEST_F()
420 EXPECT_EQ(kRSA_PRIVATE_KEY_PEM, identity->PrivateKeyToPEMString()); in TEST_F()
421 EXPECT_EQ(kRSA_PUBLIC_KEY_PEM, identity->PublicKeyToPEMString()); in TEST_F()
422 ASSERT_EQ(2u, identity->cert_chain().GetSize()); in TEST_F()
423 EXPECT_EQ(kRSA_CERT_PEM, identity->cert_chain().Get(0).ToPEMString()); in TEST_F()
424 EXPECT_EQ(kTestCertificate, identity->cert_chain().Get(1).ToPEMString()); in TEST_F()
456 identity->certificate().GetStats(); in TEST_F()
457 EXPECT_EQ(stats->fingerprint, kRSA_FINGERPRINT); in TEST_F()
458 EXPECT_EQ(stats->fingerprint_algorithm, kRSA_FINGERPRINT_ALGORITHM); in TEST_F()
459 EXPECT_EQ(stats->base64_certificate, kRSA_BASE64_CERTIFICATE); in TEST_F()
460 EXPECT_FALSE(stats->issuer); in TEST_F()
467 identity->certificate().GetStats(); in TEST_F()
468 EXPECT_EQ(stats->fingerprint, kECDSA_FINGERPRINT); in TEST_F()
469 EXPECT_EQ(stats->fingerprint_algorithm, kECDSA_FINGERPRINT_ALGORITHM); in TEST_F()
470 EXPECT_EQ(stats->base64_certificate, kECDSA_BASE64_CERTIFICATE); in TEST_F()
471 EXPECT_FALSE(stats->issuer); in TEST_F()
486 info.identity->cert_chain().GetStats(); in TEST_F()
489 EXPECT_EQ(cert_stats->fingerprint, info.fingerprints[i]); in TEST_F()
490 EXPECT_EQ(cert_stats->fingerprint_algorithm, "sha-1"); in TEST_F()
491 EXPECT_EQ(cert_stats->base64_certificate, info.pems[i]); in TEST_F()
492 cert_stats = cert_stats->issuer.get(); in TEST_F()
514 // clang-format off in TestASN1TimeToSec()
515 // clang formatting breaks this nice alignment in TestASN1TimeToSec()
541 {"19700101000000", true, -1}, // missing Z long format in TestASN1TimeToSec()
542 {"19700101000000X", true, -1}, // X instead of Z long format in TestASN1TimeToSec()
543 {"197001010000000", true, -1}, // 0 instead of Z long format in TestASN1TimeToSec()
544 {"1970010100000000Z", true, -1}, // excess digits long format in TestASN1TimeToSec()
545 {"700101000000", false, -1}, // missing Z short format in TestASN1TimeToSec()
546 {"700101000000X", false, -1}, // X instead of Z short format in TestASN1TimeToSec()
547 {"7001010000000", false, -1}, // 0 instead of Z short format in TestASN1TimeToSec()
548 {"70010100000000Z", false, -1}, // excess digits short format in TestASN1TimeToSec()
549 {":9700101000000Z", true, -1}, // invalid character in TestASN1TimeToSec()
550 {"1:700101000001Z", true, -1}, // invalid character in TestASN1TimeToSec()
551 {"19:00101000100Z", true, -1}, // invalid character in TestASN1TimeToSec()
552 {"197:0101000101Z", true, -1}, // invalid character in TestASN1TimeToSec()
553 {"1970:101010000Z", true, -1}, // invalid character in TestASN1TimeToSec()
554 {"19700:01010001Z", true, -1}, // invalid character in TestASN1TimeToSec()
555 {"197001:1010100Z", true, -1}, // invalid character in TestASN1TimeToSec()
556 {"1970010:010101Z", true, -1}, // invalid character in TestASN1TimeToSec()
557 {"70010100:000Z", false, -1}, // invalid character in TestASN1TimeToSec()
558 {"700101000:01Z", false, -1}, // invalid character in TestASN1TimeToSec()
559 {"2000010100:000Z", true, -1}, // invalid character in TestASN1TimeToSec()
560 {"21000101000:00Z", true, -1}, // invalid character in TestASN1TimeToSec()
561 {"240001010000:0Z", true, -1}, // invalid character in TestASN1TimeToSec()
562 {"500101000000Z", false, -1}, // but too old for epoch in TestASN1TimeToSec()
563 {"691231235959Z", false, -1}, // too old for epoch in TestASN1TimeToSec()
564 {"19611118043000Z", false, -1}, // way too old for epoch in TestASN1TimeToSec()
566 // clang-format off in TestASN1TimeToSec()
585 int64_t res = rtc::ASN1TimeToSec(buf, length - 1, entry.long_format); in TestASN1TimeToSec()
587 ASSERT_EQ(-1, res); in TestASN1TimeToSec()
596 // we hit time offset limitations in OpenSSL on some 32-bit systems. in TestExpireTime()
599 rtc::CreateRandomId() % (0x80000000 - time_before_generation); in TestExpireTime()
605 identity->certificate().CertificateExpirationTime()); in TestExpireTime()
607 identity->certificate().CertificateExpirationTime()); in TestExpireTime()