summaryrefslogtreecommitdiff
path: root/payload_generator/payload_signer_unittest.cc
diff options
context:
space:
mode:
Diffstat (limited to 'payload_generator/payload_signer_unittest.cc')
-rw-r--r--payload_generator/payload_signer_unittest.cc20
1 files changed, 9 insertions, 11 deletions
diff --git a/payload_generator/payload_signer_unittest.cc b/payload_generator/payload_signer_unittest.cc
index c2cd2096..d74cdfb8 100644
--- a/payload_generator/payload_signer_unittest.cc
+++ b/payload_generator/payload_signer_unittest.cc
@@ -34,7 +34,7 @@ const char kDataToSign[] = "This is some data to sign.";
// Generated by:
// echo -n 'This is some data to sign.' | openssl dgst -sha256 -binary |
// hexdump -v -e '" " 8/1 "0x%02x, " "\n"'
-const unsigned char kDataHash[] = {
+const uint8_t kDataHash[] = {
0x7a, 0x07, 0xa6, 0x44, 0x08, 0x86, 0x20, 0xa6,
0xc1, 0xf8, 0xd9, 0x02, 0x05, 0x63, 0x0d, 0xb7,
0xfc, 0x2b, 0xa0, 0xa9, 0x7c, 0x9d, 0x1d, 0x8c,
@@ -46,7 +46,7 @@ const unsigned char kDataHash[] = {
// echo -n 'This is some data to sign.' | openssl dgst -sha256 -binary |
// ~/local/bin/openssl pkeyutl -sign -inkey unittest_key.pem -pkeyopt
// digest:sha256 | hexdump -v -e '" " 8/1 "0x%02x, " "\n"'
-const unsigned char kDataSignature[] = {
+const uint8_t kDataSignature[] = {
0x9f, 0x86, 0x25, 0x8b, 0xf3, 0xcc, 0xe3, 0x95,
0x5f, 0x45, 0x83, 0xb2, 0x66, 0xf0, 0x2a, 0xcf,
0xb7, 0xaa, 0x52, 0x25, 0x7a, 0xdd, 0x9d, 0x65,
@@ -82,7 +82,7 @@ const unsigned char kDataSignature[] = {
};
namespace {
-void SignSampleData(vector<char>* out_signature_blob) {
+void SignSampleData(chromeos::Blob* out_signature_blob) {
string data_path;
ASSERT_TRUE(
utils::MakeTempFile("data.XXXXXX", &data_path, nullptr));
@@ -104,12 +104,12 @@ void SignSampleData(vector<char>* out_signature_blob) {
} // namespace
TEST(PayloadSignerTest, SimpleTest) {
- vector<char> signature_blob;
+ chromeos::Blob signature_blob;
SignSampleData(&signature_blob);
// Check the signature itself
Signatures signatures;
- EXPECT_TRUE(signatures.ParseFromArray(&signature_blob[0],
+ EXPECT_TRUE(signatures.ParseFromArray(signature_blob.data(),
signature_blob.size()));
EXPECT_EQ(1, signatures.signatures_size());
const Signatures_Signature& signature = signatures.signatures(0);
@@ -117,21 +117,19 @@ TEST(PayloadSignerTest, SimpleTest) {
const string sig_data = signature.data();
ASSERT_EQ(arraysize(kDataSignature), sig_data.size());
for (size_t i = 0; i < arraysize(kDataSignature); i++) {
- EXPECT_EQ(static_cast<char>(kDataSignature[i]), sig_data[i]);
+ EXPECT_EQ(kDataSignature[i], static_cast<uint8_t>(sig_data[i]));
}
}
TEST(PayloadSignerTest, VerifySignatureTest) {
- vector<char> signature_blob;
+ chromeos::Blob signature_blob;
SignSampleData(&signature_blob);
- vector<char> hash_data;
+ chromeos::Blob hash_data;
EXPECT_TRUE(PayloadVerifier::VerifySignature(signature_blob,
kUnittestPublicKeyPath,
&hash_data));
- vector<char> padded_hash_data(reinterpret_cast<const char *>(kDataHash),
- reinterpret_cast<const char *>(kDataHash +
- sizeof(kDataHash)));
+ chromeos::Blob padded_hash_data(std::begin(kDataHash), std::end(kDataHash));
PayloadVerifier::PadRSA2048SHA256Hash(&padded_hash_data);
ASSERT_EQ(padded_hash_data.size(), hash_data.size());
for (size_t i = 0; i < padded_hash_data.size(); i++) {