OLD | NEW |
---|---|
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "net/spdy/spdy_credential_builder.h" | 5 #include "net/spdy/spdy_credential_builder.h" |
6 | 6 |
7 #include "base/threading/sequenced_worker_pool.h" | 7 #include "base/threading/sequenced_worker_pool.h" |
8 #include "crypto/ec_signature_creator.h" | 8 #include "crypto/ec_signature_creator.h" |
9 #include "crypto/ec_private_key.h" | 9 #include "crypto/ec_private_key.h" |
10 #include "net/base/asn1_util.h" | 10 #include "net/base/asn1_util.h" |
(...skipping 57 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
68 return SpdyCredentialBuilder::GetCredentialSecret( | 68 return SpdyCredentialBuilder::GetCredentialSecret( |
69 MockClientSocket::kTlsUnique); | 69 MockClientSocket::kTlsUnique); |
70 } | 70 } |
71 | 71 |
72 SpdyTestStateHelper helper_; // Provides deterministic EC signatures. | 72 SpdyTestStateHelper helper_; // Provides deterministic EC signatures. |
73 std::string cert_; | 73 std::string cert_; |
74 std::string key_; | 74 std::string key_; |
75 SpdyCredential credential_; | 75 SpdyCredential credential_; |
76 }; | 76 }; |
77 | 77 |
78 TEST_F(SpdyCredentialBuilderTest, GetCredentialSecret) { | 78 // http://crbug.com/142833. The following tests fail on Linux redux which uses |
79 // OpenSSL due to the unimplemented ec_private_key_openssl.cc. | |
Ryan Sleevi
2012/08/16 17:34:05
Is there a reason you're using OS_LINUX here? Andr
Philippe
2012/08/17 09:10:34
Android had its own way of disabling this test thr
Ryan Sleevi
2012/08/17 17:17:25
The use of macro functions tends to harm readabili
| |
80 #if defined(OS_LINUX) && defined(USE_OPENSSL) | |
81 #define DISABLED_ON_LINUX_REDUX(Test) DISABLED_##Test | |
82 #else | |
83 #define DISABLED_ON_LINUX_REDUX(Test) Test | |
84 #endif | |
85 | |
86 TEST_F(SpdyCredentialBuilderTest, | |
87 DISABLED_ON_LINUX_REDUX(GetCredentialSecret)) { | |
79 std::string secret_str(kSecretPrefix, arraysize(kSecretPrefix)); | 88 std::string secret_str(kSecretPrefix, arraysize(kSecretPrefix)); |
80 secret_str.append(MockClientSocket::kTlsUnique); | 89 secret_str.append(MockClientSocket::kTlsUnique); |
81 | 90 |
82 EXPECT_EQ(secret_str, GetCredentialSecret()); | 91 EXPECT_EQ(secret_str, GetCredentialSecret()); |
83 } | 92 } |
84 | 93 |
85 TEST_F(SpdyCredentialBuilderTest, SucceedsWithECDSACert) { | 94 TEST_F(SpdyCredentialBuilderTest, |
95 DISABLED_ON_LINUX_REDUX(SucceedsWithECDSACert)) { | |
86 EXPECT_EQ(OK, BuildWithType(CLIENT_CERT_ECDSA_SIGN)); | 96 EXPECT_EQ(OK, BuildWithType(CLIENT_CERT_ECDSA_SIGN)); |
87 } | 97 } |
88 | 98 |
89 TEST_F(SpdyCredentialBuilderTest, FailsWithRSACert) { | 99 TEST_F(SpdyCredentialBuilderTest, DISABLED_ON_LINUX_REDUX(FailsWithRSACert)) { |
90 EXPECT_EQ(ERR_BAD_SSL_CLIENT_AUTH_CERT, | 100 EXPECT_EQ(ERR_BAD_SSL_CLIENT_AUTH_CERT, |
91 BuildWithType(CLIENT_CERT_RSA_SIGN)); | 101 BuildWithType(CLIENT_CERT_RSA_SIGN)); |
92 } | 102 } |
93 | 103 |
94 TEST_F(SpdyCredentialBuilderTest, SetsSlotCorrectly) { | 104 TEST_F(SpdyCredentialBuilderTest, DISABLED_ON_LINUX_REDUX(SetsSlotCorrectly)) { |
95 ASSERT_EQ(OK, Build()); | 105 ASSERT_EQ(OK, Build()); |
96 EXPECT_EQ(kSlot, credential_.slot); | 106 EXPECT_EQ(kSlot, credential_.slot); |
97 } | 107 } |
98 | 108 |
99 TEST_F(SpdyCredentialBuilderTest, SetsCertCorrectly) { | 109 TEST_F(SpdyCredentialBuilderTest, DISABLED_ON_LINUX_REDUX(SetsCertCorrectly)) { |
100 ASSERT_EQ(OK, Build()); | 110 ASSERT_EQ(OK, Build()); |
101 base::StringPiece spki; | 111 base::StringPiece spki; |
102 ASSERT_TRUE(asn1::ExtractSPKIFromDERCert(cert_, &spki)); | 112 ASSERT_TRUE(asn1::ExtractSPKIFromDERCert(cert_, &spki)); |
103 base::StringPiece spk; | 113 base::StringPiece spk; |
104 ASSERT_TRUE(asn1::ExtractSubjectPublicKeyFromSPKI(spki, &spk)); | 114 ASSERT_TRUE(asn1::ExtractSubjectPublicKeyFromSPKI(spki, &spk)); |
105 EXPECT_EQ(1u, credential_.certs.size()); | 115 EXPECT_EQ(1u, credential_.certs.size()); |
106 EXPECT_EQ(0, (int)spk[0]); | 116 EXPECT_EQ(0, (int)spk[0]); |
107 EXPECT_EQ(4, (int)spk[1]); | 117 EXPECT_EQ(4, (int)spk[1]); |
108 EXPECT_EQ(spk.substr(2, spk.length()).as_string(), credential_.certs[0]); | 118 EXPECT_EQ(spk.substr(2, spk.length()).as_string(), credential_.certs[0]); |
109 } | 119 } |
110 | 120 |
111 TEST_F(SpdyCredentialBuilderTest, SetsProofCorrectly) { | 121 TEST_F(SpdyCredentialBuilderTest, DISABLED_ON_LINUX_REDUX(SetsProofCorrectly)) { |
112 ASSERT_EQ(OK, Build()); | 122 ASSERT_EQ(OK, Build()); |
113 base::StringPiece spki; | 123 base::StringPiece spki; |
114 ASSERT_TRUE(asn1::ExtractSPKIFromDERCert(cert_, &spki)); | 124 ASSERT_TRUE(asn1::ExtractSPKIFromDERCert(cert_, &spki)); |
115 std::vector<uint8> spki_data(spki.data(), | 125 std::vector<uint8> spki_data(spki.data(), |
116 spki.data() + spki.size()); | 126 spki.data() + spki.size()); |
117 std::vector<uint8> key_data(key_.data(), | 127 std::vector<uint8> key_data(key_.data(), |
118 key_.data() + key_.length()); | 128 key_.data() + key_.length()); |
119 std::vector<uint8> proof_data; | 129 std::vector<uint8> proof_data; |
120 scoped_ptr<crypto::ECPrivateKey> private_key( | 130 scoped_ptr<crypto::ECPrivateKey> private_key( |
121 crypto::ECPrivateKey::CreateFromEncryptedPrivateKeyInfo( | 131 crypto::ECPrivateKey::CreateFromEncryptedPrivateKeyInfo( |
122 ServerBoundCertService::kEPKIPassword, key_data, spki_data)); | 132 ServerBoundCertService::kEPKIPassword, key_data, spki_data)); |
123 scoped_ptr<crypto::ECSignatureCreator> creator( | 133 scoped_ptr<crypto::ECSignatureCreator> creator( |
124 crypto::ECSignatureCreator::Create(private_key.get())); | 134 crypto::ECSignatureCreator::Create(private_key.get())); |
125 std::string secret = GetCredentialSecret(); | 135 std::string secret = GetCredentialSecret(); |
126 creator->Sign(reinterpret_cast<const unsigned char *>(secret.data()), | 136 creator->Sign(reinterpret_cast<const unsigned char *>(secret.data()), |
127 secret.length(), &proof_data); | 137 secret.length(), &proof_data); |
128 | 138 |
129 std::string proof(proof_data.begin(), proof_data.end()); | 139 std::string proof(proof_data.begin(), proof_data.end()); |
130 EXPECT_EQ(proof, credential_.proof); | 140 EXPECT_EQ(proof, credential_.proof); |
131 } | 141 } |
132 | 142 |
143 #undef DISABLED_ON_LINUX_REDUX | |
144 | |
133 } // namespace net | 145 } // namespace net |
OLD | NEW |