| OLD | NEW |
| 1 // Copyright (c) 2009 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2009 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "net/socket/ssl_test_util.h" |
| 6 |
| 5 #include <algorithm> | 7 #include <algorithm> |
| 6 #include <string> | 8 #include <string> |
| 7 #include <vector> | 9 #include <vector> |
| 8 | 10 |
| 9 #include "net/socket/ssl_test_util.h" | |
| 10 | |
| 11 #include "build/build_config.h" | 11 #include "build/build_config.h" |
| 12 | 12 |
| 13 #if defined(OS_WIN) | 13 #if defined(OS_WIN) |
| 14 #include <windows.h> | 14 #include <windows.h> |
| 15 #include <wincrypt.h> | 15 #include <wincrypt.h> |
| 16 #elif defined(OS_LINUX) | 16 #elif defined(USE_NSS) |
| 17 #include <nspr.h> | 17 #include <nspr.h> |
| 18 #include <nss.h> | 18 #include <nss.h> |
| 19 #include <secerr.h> | 19 #include <secerr.h> |
| 20 #include <ssl.h> | 20 #include <ssl.h> |
| 21 #include <sslerr.h> | 21 #include <sslerr.h> |
| 22 #include <pk11pub.h> | 22 #include <pk11pub.h> |
| 23 #include "base/nss_util.h" | 23 #include "base/nss_util.h" |
| 24 #elif defined(OS_MACOSX) | 24 #elif defined(OS_MACOSX) |
| 25 #include <Security/Security.h> | 25 #include <Security/Security.h> |
| 26 #include "base/scoped_cftyperef.h" | 26 #include "base/scoped_cftyperef.h" |
| (...skipping 10 matching lines...) Expand all Loading... |
| 37 #include "net/socket/tcp_client_socket.h" | 37 #include "net/socket/tcp_client_socket.h" |
| 38 #include "net/socket/tcp_pinger.h" | 38 #include "net/socket/tcp_pinger.h" |
| 39 #include "testing/platform_test.h" | 39 #include "testing/platform_test.h" |
| 40 | 40 |
| 41 #if defined(OS_WIN) | 41 #if defined(OS_WIN) |
| 42 #pragma comment(lib, "crypt32.lib") | 42 #pragma comment(lib, "crypt32.lib") |
| 43 #endif | 43 #endif |
| 44 | 44 |
| 45 namespace { | 45 namespace { |
| 46 | 46 |
| 47 #if defined(OS_LINUX) | 47 #if defined(USE_NSS) |
| 48 static CERTCertificate* LoadTemporaryCert(const FilePath& filename) { | 48 static CERTCertificate* LoadTemporaryCert(const FilePath& filename) { |
| 49 base::EnsureNSSInit(); | 49 base::EnsureNSSInit(); |
| 50 | 50 |
| 51 std::string rawcert; | 51 std::string rawcert; |
| 52 if (!file_util::ReadFileToString(filename, &rawcert)) { | 52 if (!file_util::ReadFileToString(filename, &rawcert)) { |
| 53 LOG(ERROR) << "Can't load certificate " << filename.value(); | 53 LOG(ERROR) << "Can't load certificate " << filename.value(); |
| 54 return NULL; | 54 return NULL; |
| 55 } | 55 } |
| 56 | 56 |
| 57 CERTCertificate *cert; | 57 CERTCertificate *cert; |
| (...skipping 73 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 131 const int TestServerLauncher::kBadHTTPSPort = 9666; | 131 const int TestServerLauncher::kBadHTTPSPort = 9666; |
| 132 | 132 |
| 133 // The issuer name of the cert that should be trusted for the test to work. | 133 // The issuer name of the cert that should be trusted for the test to work. |
| 134 const wchar_t TestServerLauncher::kCertIssuerName[] = L"Test CA"; | 134 const wchar_t TestServerLauncher::kCertIssuerName[] = L"Test CA"; |
| 135 | 135 |
| 136 TestServerLauncher::TestServerLauncher() : process_handle_( | 136 TestServerLauncher::TestServerLauncher() : process_handle_( |
| 137 base::kNullProcessHandle), | 137 base::kNullProcessHandle), |
| 138 forking_(false), | 138 forking_(false), |
| 139 connection_attempts_(kDefaultTestConnectionAttempts), | 139 connection_attempts_(kDefaultTestConnectionAttempts), |
| 140 connection_timeout_(kDefaultTestConnectionTimeout) | 140 connection_timeout_(kDefaultTestConnectionTimeout) |
| 141 #if defined(OS_LINUX) | 141 #if defined(USE_NSS) |
| 142 , cert_(NULL) | 142 , cert_(NULL) |
| 143 #endif | 143 #endif |
| 144 { | 144 { |
| 145 InitCertPath(); | 145 InitCertPath(); |
| 146 } | 146 } |
| 147 | 147 |
| 148 TestServerLauncher::TestServerLauncher(int connection_attempts, | 148 TestServerLauncher::TestServerLauncher(int connection_attempts, |
| 149 int connection_timeout) | 149 int connection_timeout) |
| 150 : process_handle_(base::kNullProcessHandle), | 150 : process_handle_(base::kNullProcessHandle), |
| 151 forking_(false), | 151 forking_(false), |
| 152 connection_attempts_(connection_attempts), | 152 connection_attempts_(connection_attempts), |
| 153 connection_timeout_(connection_timeout) | 153 connection_timeout_(connection_timeout) |
| 154 #if defined(OS_LINUX) | 154 #if defined(USE_NSS) |
| 155 , cert_(NULL) | 155 , cert_(NULL) |
| 156 #endif | 156 #endif |
| 157 { | 157 { |
| 158 InitCertPath(); | 158 InitCertPath(); |
| 159 } | 159 } |
| 160 | 160 |
| 161 void TestServerLauncher::InitCertPath() { | 161 void TestServerLauncher::InitCertPath() { |
| 162 PathService::Get(base::DIR_SOURCE_ROOT, &cert_dir_); | 162 PathService::Get(base::DIR_SOURCE_ROOT, &cert_dir_); |
| 163 cert_dir_ = cert_dir_.Append(FILE_PATH_LITERAL("net")) | 163 cert_dir_ = cert_dir_.Append(FILE_PATH_LITERAL("net")) |
| 164 .Append(FILE_PATH_LITERAL("data")) | 164 .Append(FILE_PATH_LITERAL("data")) |
| (...skipping 181 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 346 process_handle_ = base::kNullProcessHandle; | 346 process_handle_ = base::kNullProcessHandle; |
| 347 LOG(INFO) << "Stopped."; | 347 LOG(INFO) << "Stopped."; |
| 348 } else { | 348 } else { |
| 349 LOG(INFO) << "Kill failed?"; | 349 LOG(INFO) << "Kill failed?"; |
| 350 } | 350 } |
| 351 | 351 |
| 352 return ret; | 352 return ret; |
| 353 } | 353 } |
| 354 | 354 |
| 355 TestServerLauncher::~TestServerLauncher() { | 355 TestServerLauncher::~TestServerLauncher() { |
| 356 #if defined(OS_LINUX) | 356 #if defined(USE_NSS) |
| 357 if (cert_) | 357 if (cert_) |
| 358 CERT_DestroyCertificate(reinterpret_cast<CERTCertificate*>(cert_)); | 358 CERT_DestroyCertificate(reinterpret_cast<CERTCertificate*>(cert_)); |
| 359 #elif defined(OS_MACOSX) | 359 #elif defined(OS_MACOSX) |
| 360 SetMacTestCertificate(NULL); | 360 SetMacTestCertificate(NULL); |
| 361 #endif | 361 #endif |
| 362 Stop(); | 362 Stop(); |
| 363 } | 363 } |
| 364 | 364 |
| 365 FilePath TestServerLauncher::GetRootCertPath() { | 365 FilePath TestServerLauncher::GetRootCertPath() { |
| 366 FilePath path(cert_dir_); | 366 FilePath path(cert_dir_); |
| 367 path = path.AppendASCII("root_ca_cert.crt"); | 367 path = path.AppendASCII("root_ca_cert.crt"); |
| 368 return path; | 368 return path; |
| 369 } | 369 } |
| 370 | 370 |
| 371 FilePath TestServerLauncher::GetOKCertPath() { | 371 FilePath TestServerLauncher::GetOKCertPath() { |
| 372 FilePath path(cert_dir_); | 372 FilePath path(cert_dir_); |
| 373 path = path.AppendASCII("ok_cert.pem"); | 373 path = path.AppendASCII("ok_cert.pem"); |
| 374 return path; | 374 return path; |
| 375 } | 375 } |
| 376 | 376 |
| 377 FilePath TestServerLauncher::GetExpiredCertPath() { | 377 FilePath TestServerLauncher::GetExpiredCertPath() { |
| 378 FilePath path(cert_dir_); | 378 FilePath path(cert_dir_); |
| 379 path = path.AppendASCII("expired_cert.pem"); | 379 path = path.AppendASCII("expired_cert.pem"); |
| 380 return path; | 380 return path; |
| 381 } | 381 } |
| 382 | 382 |
| 383 bool TestServerLauncher::LoadTestRootCert() { | 383 bool TestServerLauncher::LoadTestRootCert() { |
| 384 #if defined(OS_LINUX) | 384 #if defined(USE_NSS) |
| 385 if (cert_) | 385 if (cert_) |
| 386 return true; | 386 return true; |
| 387 | 387 |
| 388 // TODO(dkegel): figure out how to get this to only happen once? | 388 // TODO(dkegel): figure out how to get this to only happen once? |
| 389 | 389 |
| 390 // This currently leaks a little memory. | 390 // This currently leaks a little memory. |
| 391 // TODO(dkegel): fix the leak and remove the entry in | 391 // TODO(dkegel): fix the leak and remove the entry in |
| 392 // tools/valgrind/suppressions.txt | 392 // tools/valgrind/suppressions.txt |
| 393 cert_ = reinterpret_cast<PrivateCERTCertificate*>( | 393 cert_ = reinterpret_cast<PrivateCERTCertificate*>( |
| 394 LoadTemporaryCert(GetRootCertPath())); | 394 LoadTemporaryCert(GetRootCertPath())); |
| (...skipping 34 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 429 "certificate to your trusted roots for this test to work. " | 429 "certificate to your trusted roots for this test to work. " |
| 430 "For more info visit:\n" | 430 "For more info visit:\n" |
| 431 "http://dev.chromium.org/developers/testing\n"; | 431 "http://dev.chromium.org/developers/testing\n"; |
| 432 return false; | 432 return false; |
| 433 } | 433 } |
| 434 #endif | 434 #endif |
| 435 return true; | 435 return true; |
| 436 } | 436 } |
| 437 | 437 |
| 438 } // namespace net | 438 } // namespace net |
| OLD | NEW |