Further fixups on the new tests.
I messed up the indentation in one place, and Shane Lontis pointed out
that the comment is slightly out of date now that there are two
codepaths involved.
Change-Id: I1be69f3f9a3835fffc4801b4464b9fb8ecb092cc
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/54745
Auto-Submit: David Benjamin <davidben@google.com>
Reviewed-by: Bob Beck <bbe@google.com>
Commit-Queue: Bob Beck <bbe@google.com>
diff --git a/crypto/x509/x509_test.cc b/crypto/x509/x509_test.cc
index 66ae124..bfd8fa7 100644
--- a/crypto/x509/x509_test.cc
+++ b/crypto/x509/x509_test.cc
@@ -2025,7 +2025,7 @@
EXPECT_TRUE(X509_verify(cert.get(), pkey.get()));
// Re-encode the certificate. X509 objects contain a cached TBSCertificate
- // encoding and |i2d_re_X509_tbs| should have dropped that cache.
+ // encoding and re-signing should have dropped that cache.
bssl::UniquePtr<X509> copy = ReencodeCertificate(cert.get());
ASSERT_TRUE(copy);
EXPECT_TRUE(X509_verify(copy.get(), pkey.get()));
@@ -2115,7 +2115,7 @@
EXPECT_TRUE(X509_CRL_verify(crl.get(), pkey.get()));
// Re-encode the CRL. X509_CRL objects contain a cached TBSCertList
- // encoding and |i2d_re_X509_tbs| should have dropped that cache.
+ // encoding and re-signing should have dropped that cache.
bssl::UniquePtr<X509_CRL> copy = ReencodeCRL(crl.get());
ASSERT_TRUE(copy);
EXPECT_TRUE(X509_CRL_verify(copy.get(), pkey.get()));
@@ -2189,28 +2189,28 @@
EXPECT_TRUE(X509_REQ_set_pubkey(csr.get(), pkey.get()));
if (sign_manual) {
- // Fill in the signature algorithm.
- ASSERT_TRUE(X509_REQ_set1_signature_algo(csr.get(), algor.get()));
+ // Fill in the signature algorithm.
+ ASSERT_TRUE(X509_REQ_set1_signature_algo(csr.get(), algor.get()));
- // Extract the CertificationRequestInfo.
- uint8_t *tbs = nullptr;
- int tbs_len = i2d_re_X509_REQ_tbs(csr.get(), &tbs);
- bssl::UniquePtr<uint8_t> free_tbs(tbs);
- ASSERT_GT(tbs_len, 0);
+ // Extract the CertificationRequestInfo.
+ uint8_t *tbs = nullptr;
+ int tbs_len = i2d_re_X509_REQ_tbs(csr.get(), &tbs);
+ bssl::UniquePtr<uint8_t> free_tbs(tbs);
+ ASSERT_GT(tbs_len, 0);
- // Generate a signature externally and fill it in.
- bssl::ScopedEVP_MD_CTX md_ctx;
- ASSERT_TRUE(EVP_DigestSignInit(md_ctx.get(), nullptr, kSignatureHash,
- nullptr, pkey.get()));
- size_t sig_len;
- ASSERT_TRUE(
- EVP_DigestSign(md_ctx.get(), nullptr, &sig_len, tbs, tbs_len));
- std::vector<uint8_t> sig(sig_len);
- ASSERT_TRUE(
- EVP_DigestSign(md_ctx.get(), sig.data(), &sig_len, tbs, tbs_len));
- sig.resize(sig_len);
- ASSERT_TRUE(
- X509_REQ_set1_signature_value(csr.get(), sig.data(), sig.size()));
+ // Generate a signature externally and fill it in.
+ bssl::ScopedEVP_MD_CTX md_ctx;
+ ASSERT_TRUE(EVP_DigestSignInit(md_ctx.get(), nullptr, kSignatureHash,
+ nullptr, pkey.get()));
+ size_t sig_len;
+ ASSERT_TRUE(
+ EVP_DigestSign(md_ctx.get(), nullptr, &sig_len, tbs, tbs_len));
+ std::vector<uint8_t> sig(sig_len);
+ ASSERT_TRUE(
+ EVP_DigestSign(md_ctx.get(), sig.data(), &sig_len, tbs, tbs_len));
+ sig.resize(sig_len);
+ ASSERT_TRUE(
+ X509_REQ_set1_signature_value(csr.get(), sig.data(), sig.size()));
} else {
ASSERT_TRUE(X509_REQ_sign(csr.get(), pkey.get(), EVP_sha384()));
}
@@ -2219,8 +2219,8 @@
EXPECT_TRUE(X509_REQ_verify(csr.get(), pkey.get()));
// Re-encode the CSR. X509_REQ objects contain a cached
- // CertificationRequestInfo encoding and |i2d_re_X509_REQ_tbs| should have
- // dropped that cache.
+ // CertificationRequestInfo encoding and re-signing should have dropped
+ // that cache.
bssl::UniquePtr<X509_REQ> copy = ReencodeCSR(csr.get());
ASSERT_TRUE(copy);
EXPECT_TRUE(X509_REQ_verify(copy.get(), pkey.get()));