Index: net/base/ssl_client_socket_unittest.cc |
=================================================================== |
--- net/base/ssl_client_socket_unittest.cc (revision 18948) |
+++ net/base/ssl_client_socket_unittest.cc (working copy) |
@@ -1,370 +0,0 @@ |
-// Copyright (c) 2006-2008 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-#include "net/base/address_list.h" |
-#include "net/base/client_socket_factory.h" |
-#include "net/base/host_resolver.h" |
-#include "net/base/io_buffer.h" |
-#include "net/base/net_errors.h" |
-#include "net/base/ssl_client_socket.h" |
-#include "net/base/ssl_config_service.h" |
-#include "net/base/ssl_test_util.h" |
-#include "net/base/tcp_client_socket.h" |
-#include "net/base/test_completion_callback.h" |
-#include "testing/gtest/include/gtest/gtest.h" |
-#include "testing/platform_test.h" |
- |
-//----------------------------------------------------------------------------- |
- |
-const net::SSLConfig kDefaultSSLConfig; |
- |
-class SSLClientSocketTest : public PlatformTest { |
- public: |
- SSLClientSocketTest() |
- : socket_factory_(net::ClientSocketFactory::GetDefaultFactory()) { |
- } |
- |
- void StartOKServer() { |
- bool success = server_.Start(net::TestServerLauncher::ProtoHTTP, |
- server_.kHostName, server_.kOKHTTPSPort, |
- FilePath(), server_.GetOKCertPath(), std::wstring()); |
- ASSERT_TRUE(success); |
- } |
- |
- void StartMismatchedServer() { |
- bool success = server_.Start(net::TestServerLauncher::ProtoHTTP, |
- server_.kMismatchedHostName, server_.kOKHTTPSPort, |
- FilePath(), server_.GetOKCertPath(), std::wstring()); |
- ASSERT_TRUE(success); |
- } |
- |
- void StartExpiredServer() { |
- bool success = server_.Start(net::TestServerLauncher::ProtoHTTP, |
- server_.kHostName, server_.kBadHTTPSPort, |
- FilePath(), server_.GetExpiredCertPath(), std::wstring()); |
- ASSERT_TRUE(success); |
- } |
- |
- protected: |
- net::ClientSocketFactory* socket_factory_; |
- net::TestServerLauncher server_; |
-}; |
- |
-//----------------------------------------------------------------------------- |
- |
-#if defined(OS_MACOSX) |
-// Status 6/19/09: |
-// |
-// If these tests are enabled on OSX, we choke at the point |
-// SSLHandshake() (Security framework call) is called from |
-// SSLClientSocketMac::DoHandshake(). Return value is -9812 (cert |
-// valid but root not trusted), but if you don't have the cert in your |
-// keychain as documented on |
-// http://dev.chromium.org/developers/testing, the -9812 becomes a |
-// -9813 (no root cert). |
-// |
-// See related handshake failures exhibited by disabled tests in |
-// net/url_request/url_request_unittest.cc. |
-#define MAYBE_Connect DISABLED_Connect |
-#define MAYBE_ConnectExpired DISABLED_ConnectExpired |
-#define MAYBE_ConnectMismatched DISABLED_ConnectMismatched |
-#define MAYBE_Read DISABLED_Read |
-#define MAYBE_Read_SmallChunks DISABLED_Read_SmallChunks |
-#define MAYBE_Read_Interrupted DISABLED_Read_Interrupted |
-#else |
-#define MAYBE_Connect Connect |
-#define MAYBE_ConnectExpired ConnectExpired |
-#define MAYBE_ConnectMismatched ConnectMismatched |
-#define MAYBE_Read Read |
-#define MAYBE_Read_SmallChunks Read_SmallChunks |
-#define MAYBE_Read_Interrupted Read_Interrupted |
-#endif |
- |
-TEST_F(SSLClientSocketTest, MAYBE_Connect) { |
- StartOKServer(); |
- |
- net::AddressList addr; |
- net::HostResolver resolver; |
- TestCompletionCallback callback; |
- |
- net::HostResolver::RequestInfo info(server_.kHostName, server_.kOKHTTPSPort); |
- int rv = resolver.Resolve(info, &addr, NULL, NULL); |
- EXPECT_EQ(net::OK, rv); |
- |
- net::ClientSocket *transport = new net::TCPClientSocket(addr); |
- rv = transport->Connect(&callback); |
- if (rv == net::ERR_IO_PENDING) |
- rv = callback.WaitForResult(); |
- EXPECT_EQ(net::OK, rv); |
- |
- scoped_ptr<net::SSLClientSocket> sock( |
- socket_factory_->CreateSSLClientSocket(transport, |
- server_.kHostName, kDefaultSSLConfig)); |
- |
- EXPECT_FALSE(sock->IsConnected()); |
- |
- rv = sock->Connect(&callback); |
- if (rv != net::OK) { |
- ASSERT_EQ(net::ERR_IO_PENDING, rv); |
- EXPECT_FALSE(sock->IsConnected()); |
- |
- rv = callback.WaitForResult(); |
- EXPECT_EQ(net::OK, rv); |
- } |
- |
- EXPECT_TRUE(sock->IsConnected()); |
- |
- sock->Disconnect(); |
- EXPECT_FALSE(sock->IsConnected()); |
-} |
- |
-TEST_F(SSLClientSocketTest, MAYBE_ConnectExpired) { |
- StartExpiredServer(); |
- |
- net::AddressList addr; |
- net::HostResolver resolver; |
- TestCompletionCallback callback; |
- |
- net::HostResolver::RequestInfo info(server_.kHostName, server_.kBadHTTPSPort); |
- int rv = resolver.Resolve(info, &addr, NULL, NULL); |
- EXPECT_EQ(net::OK, rv); |
- |
- net::ClientSocket *transport = new net::TCPClientSocket(addr); |
- rv = transport->Connect(&callback); |
- if (rv == net::ERR_IO_PENDING) |
- rv = callback.WaitForResult(); |
- EXPECT_EQ(net::OK, rv); |
- |
- scoped_ptr<net::SSLClientSocket> sock( |
- socket_factory_->CreateSSLClientSocket(transport, |
- server_.kHostName, kDefaultSSLConfig)); |
- |
- EXPECT_FALSE(sock->IsConnected()); |
- |
- rv = sock->Connect(&callback); |
- if (rv != net::OK) { |
- ASSERT_EQ(net::ERR_IO_PENDING, rv); |
- EXPECT_FALSE(sock->IsConnected()); |
- |
- rv = callback.WaitForResult(); |
- EXPECT_EQ(net::ERR_CERT_DATE_INVALID, rv); |
- } |
- |
- // We cannot test sock->IsConnected(), as the NSS implementation disconnects |
- // the socket when it encounters an error, whereas other implementations |
- // leave it connected. |
-} |
- |
-TEST_F(SSLClientSocketTest, MAYBE_ConnectMismatched) { |
- StartMismatchedServer(); |
- |
- net::AddressList addr; |
- net::HostResolver resolver; |
- TestCompletionCallback callback; |
- |
- net::HostResolver::RequestInfo info(server_.kMismatchedHostName, |
- server_.kOKHTTPSPort); |
- int rv = resolver.Resolve(info, &addr, NULL, NULL); |
- EXPECT_EQ(net::OK, rv); |
- |
- net::ClientSocket *transport = new net::TCPClientSocket(addr); |
- rv = transport->Connect(&callback); |
- if (rv == net::ERR_IO_PENDING) |
- rv = callback.WaitForResult(); |
- EXPECT_EQ(net::OK, rv); |
- |
- scoped_ptr<net::SSLClientSocket> sock( |
- socket_factory_->CreateSSLClientSocket(transport, |
- server_.kMismatchedHostName, kDefaultSSLConfig)); |
- |
- EXPECT_FALSE(sock->IsConnected()); |
- |
- rv = sock->Connect(&callback); |
- if (rv != net::ERR_CERT_COMMON_NAME_INVALID) { |
- ASSERT_EQ(net::ERR_IO_PENDING, rv); |
- EXPECT_FALSE(sock->IsConnected()); |
- |
- rv = callback.WaitForResult(); |
- EXPECT_EQ(net::ERR_CERT_COMMON_NAME_INVALID, rv); |
- } |
- |
- // We cannot test sock->IsConnected(), as the NSS implementation disconnects |
- // the socket when it encounters an error, whereas other implementations |
- // leave it connected. |
-} |
- |
-// TODO(wtc): Add unit tests for IsConnectedAndIdle: |
-// - Server closes an SSL connection (with a close_notify alert message). |
-// - Server closes the underlying TCP connection directly. |
-// - Server sends data unexpectedly. |
- |
-TEST_F(SSLClientSocketTest, MAYBE_Read) { |
- StartOKServer(); |
- |
- net::AddressList addr; |
- net::HostResolver resolver; |
- TestCompletionCallback callback; |
- |
- net::HostResolver::RequestInfo info(server_.kHostName, server_.kOKHTTPSPort); |
- int rv = resolver.Resolve(info, &addr, &callback, NULL); |
- EXPECT_EQ(net::ERR_IO_PENDING, rv); |
- |
- rv = callback.WaitForResult(); |
- EXPECT_EQ(net::OK, rv); |
- |
- net::ClientSocket *transport = new net::TCPClientSocket(addr); |
- rv = transport->Connect(&callback); |
- if (rv == net::ERR_IO_PENDING) |
- rv = callback.WaitForResult(); |
- EXPECT_EQ(net::OK, rv); |
- |
- scoped_ptr<net::SSLClientSocket> sock( |
- socket_factory_->CreateSSLClientSocket(transport, |
- server_.kHostName, |
- kDefaultSSLConfig)); |
- |
- rv = sock->Connect(&callback); |
- if (rv != net::OK) { |
- ASSERT_EQ(net::ERR_IO_PENDING, rv); |
- |
- rv = callback.WaitForResult(); |
- EXPECT_EQ(net::OK, rv); |
- } |
- EXPECT_TRUE(sock->IsConnected()); |
- |
- const char request_text[] = "GET / HTTP/1.0\r\n\r\n"; |
- scoped_refptr<net::IOBuffer> request_buffer = |
- new net::IOBuffer(arraysize(request_text) - 1); |
- memcpy(request_buffer->data(), request_text, arraysize(request_text) - 1); |
- |
- rv = sock->Write(request_buffer, arraysize(request_text) - 1, &callback); |
- EXPECT_TRUE(rv >= 0 || rv == net::ERR_IO_PENDING); |
- |
- if (rv == net::ERR_IO_PENDING) { |
- rv = callback.WaitForResult(); |
- EXPECT_EQ(static_cast<int>(arraysize(request_text) - 1), rv); |
- } |
- |
- scoped_refptr<net::IOBuffer> buf = new net::IOBuffer(4096); |
- for (;;) { |
- rv = sock->Read(buf, 4096, &callback); |
- EXPECT_TRUE(rv >= 0 || rv == net::ERR_IO_PENDING); |
- |
- if (rv == net::ERR_IO_PENDING) |
- rv = callback.WaitForResult(); |
- |
- EXPECT_GE(rv, 0); |
- if (rv <= 0) |
- break; |
- } |
-} |
- |
-TEST_F(SSLClientSocketTest, MAYBE_Read_SmallChunks) { |
- StartOKServer(); |
- |
- net::AddressList addr; |
- net::HostResolver resolver; |
- TestCompletionCallback callback; |
- |
- net::HostResolver::RequestInfo info(server_.kHostName, server_.kOKHTTPSPort); |
- int rv = resolver.Resolve(info, &addr, NULL, NULL); |
- EXPECT_EQ(net::OK, rv); |
- |
- net::ClientSocket *transport = new net::TCPClientSocket(addr); |
- rv = transport->Connect(&callback); |
- if (rv == net::ERR_IO_PENDING) |
- rv = callback.WaitForResult(); |
- EXPECT_EQ(net::OK, rv); |
- |
- scoped_ptr<net::SSLClientSocket> sock( |
- socket_factory_->CreateSSLClientSocket(transport, |
- server_.kHostName, kDefaultSSLConfig)); |
- |
- rv = sock->Connect(&callback); |
- if (rv != net::OK) { |
- ASSERT_EQ(net::ERR_IO_PENDING, rv); |
- |
- rv = callback.WaitForResult(); |
- EXPECT_EQ(net::OK, rv); |
- } |
- |
- const char request_text[] = "GET / HTTP/1.0\r\n\r\n"; |
- scoped_refptr<net::IOBuffer> request_buffer = |
- new net::IOBuffer(arraysize(request_text) - 1); |
- memcpy(request_buffer->data(), request_text, arraysize(request_text) - 1); |
- |
- rv = sock->Write(request_buffer, arraysize(request_text) - 1, &callback); |
- EXPECT_TRUE(rv >= 0 || rv == net::ERR_IO_PENDING); |
- |
- if (rv == net::ERR_IO_PENDING) { |
- rv = callback.WaitForResult(); |
- EXPECT_EQ(static_cast<int>(arraysize(request_text) - 1), rv); |
- } |
- |
- scoped_refptr<net::IOBuffer> buf = new net::IOBuffer(1); |
- for (;;) { |
- rv = sock->Read(buf, 1, &callback); |
- EXPECT_TRUE(rv >= 0 || rv == net::ERR_IO_PENDING); |
- |
- if (rv == net::ERR_IO_PENDING) |
- rv = callback.WaitForResult(); |
- |
- EXPECT_GE(rv, 0); |
- if (rv <= 0) |
- break; |
- } |
-} |
- |
-TEST_F(SSLClientSocketTest, MAYBE_Read_Interrupted) { |
- StartOKServer(); |
- |
- net::AddressList addr; |
- net::HostResolver resolver; |
- TestCompletionCallback callback; |
- |
- net::HostResolver::RequestInfo info(server_.kHostName, server_.kOKHTTPSPort); |
- int rv = resolver.Resolve(info, &addr, NULL, NULL); |
- EXPECT_EQ(net::OK, rv); |
- |
- net::ClientSocket *transport = new net::TCPClientSocket(addr); |
- rv = transport->Connect(&callback); |
- if (rv == net::ERR_IO_PENDING) |
- rv = callback.WaitForResult(); |
- EXPECT_EQ(net::OK, rv); |
- |
- scoped_ptr<net::SSLClientSocket> sock( |
- socket_factory_->CreateSSLClientSocket(transport, |
- server_.kHostName, kDefaultSSLConfig)); |
- |
- rv = sock->Connect(&callback); |
- if (rv != net::OK) { |
- ASSERT_EQ(net::ERR_IO_PENDING, rv); |
- |
- rv = callback.WaitForResult(); |
- EXPECT_EQ(net::OK, rv); |
- } |
- |
- const char request_text[] = "GET / HTTP/1.0\r\n\r\n"; |
- scoped_refptr<net::IOBuffer> request_buffer = |
- new net::IOBuffer(arraysize(request_text) - 1); |
- memcpy(request_buffer->data(), request_text, arraysize(request_text) - 1); |
- |
- rv = sock->Write(request_buffer, arraysize(request_text) - 1, &callback); |
- EXPECT_TRUE(rv >= 0 || rv == net::ERR_IO_PENDING); |
- |
- if (rv == net::ERR_IO_PENDING) { |
- rv = callback.WaitForResult(); |
- EXPECT_EQ(static_cast<int>(arraysize(request_text) - 1), rv); |
- } |
- |
- // Do a partial read and then exit. This test should not crash! |
- scoped_refptr<net::IOBuffer> buf = new net::IOBuffer(512); |
- rv = sock->Read(buf, 512, &callback); |
- EXPECT_TRUE(rv >= 0 || rv == net::ERR_IO_PENDING); |
- |
- if (rv == net::ERR_IO_PENDING) |
- rv = callback.WaitForResult(); |
- |
- EXPECT_NE(rv, 0); |
-} |