Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(927)

Side by Side Diff: net/base/origin_bound_cert_service_unittest.cc

Issue 7565023: Gave the GetOriginBoundCertificate an asynchronous interface because certificate (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src/
Patch Set: '' Created 9 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « net/base/origin_bound_cert_service.cc ('k') | no next file » | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "net/base/origin_bound_cert_service.h" 5 #include "net/base/origin_bound_cert_service.h"
6 6
7 #include <string> 7 #include <string>
8 #include <vector> 8 #include <vector>
9 9
10 #include "base/memory/ref_counted.h" 10 #include "base/memory/scoped_ptr.h"
11 #include "crypto/rsa_private_key.h" 11 #include "crypto/rsa_private_key.h"
12 #include "net/base/default_origin_bound_cert_store.h" 12 #include "net/base/default_origin_bound_cert_store.h"
13 #include "net/base/net_errors.h"
14 #include "net/base/test_completion_callback.h"
13 #include "net/base/x509_certificate.h" 15 #include "net/base/x509_certificate.h"
14 #include "testing/gtest/include/gtest/gtest.h" 16 #include "testing/gtest/include/gtest/gtest.h"
15 17
16 namespace net { 18 namespace net {
17 19
20 class OriginBoundCertServiceTest : public testing::Test {
21 };
22
23 class ExplodingCallback : public CallbackRunner<Tuple1<int> > {
24 public:
25 virtual void RunWithParams(const Tuple1<int>& params) {
26 FAIL();
27 }
28 };
29
18 // See http://crbug.com/91512 - implement OpenSSL version of CreateSelfSigned. 30 // See http://crbug.com/91512 - implement OpenSSL version of CreateSelfSigned.
19 #if !defined(USE_OPENSSL) 31 #if !defined(USE_OPENSSL)
20 32
21 TEST(OriginBoundCertServiceTest, DuplicateCertTest) { 33 TEST_F(OriginBoundCertServiceTest, CacheHit) {
22 scoped_refptr<OriginBoundCertService> service( 34 scoped_ptr<OriginBoundCertService> service(
23 new OriginBoundCertService(new DefaultOriginBoundCertStore(NULL))); 35 new OriginBoundCertService(new DefaultOriginBoundCertStore(NULL)));
24 std::string origin1("https://encrypted.google.com/"); 36 std::string origin("https://encrypted.google.com:443");
25 std::string origin2("https://www.verisign.com/");
26 37
27 // The store should start out empty and should increment appropriately. 38 int error;
28 std::string private_key_info_1a, der_cert_1a; 39 TestCompletionCallback callback;
29 EXPECT_EQ(0, service->GetCertCount()); 40 OriginBoundCertService::RequestHandle request_handle;
30 EXPECT_TRUE(service->GetOriginBoundCert(
31 origin1, &private_key_info_1a, &der_cert_1a));
32 EXPECT_EQ(1, service->GetCertCount());
33 41
34 // We should get the same cert and key for the same origin. 42 // Asynchronous completion.
35 std::string private_key_info_1b, der_cert_1b; 43 std::string private_key_info1, der_cert1;
36 EXPECT_TRUE(service->GetOriginBoundCert( 44 EXPECT_EQ(0, service->cert_count());
37 origin1, &private_key_info_1b, &der_cert_1b)); 45 error = service->GetOriginBoundCert(
38 EXPECT_EQ(1, service->GetCertCount()); 46 origin, &private_key_info1, &der_cert1, &callback, &request_handle);
39 EXPECT_EQ(private_key_info_1a, private_key_info_1b); 47 EXPECT_EQ(ERR_IO_PENDING, error);
40 EXPECT_EQ(der_cert_1a, der_cert_1b); 48 EXPECT_TRUE(request_handle != NULL);
49 error = callback.WaitForResult();
50 EXPECT_EQ(OK, error);
51 EXPECT_EQ(1, service->cert_count());
52 EXPECT_FALSE(private_key_info1.empty());
53 EXPECT_FALSE(der_cert1.empty());
41 54
42 // We should get a different cert and key for different origins. 55 // Synchronous completion.
43 std::string private_key_info_2, der_cert_2; 56 std::string private_key_info2, der_cert2;
44 EXPECT_TRUE(service->GetOriginBoundCert( 57 error = service->GetOriginBoundCert(
45 origin2, &private_key_info_2, &der_cert_2)); 58 origin, &private_key_info2, &der_cert2, &callback, &request_handle);
46 EXPECT_EQ(2, service->GetCertCount()); 59 EXPECT_TRUE(request_handle == NULL);
47 EXPECT_NE(private_key_info_1a, private_key_info_2); 60 EXPECT_EQ(OK, error);
48 EXPECT_NE(der_cert_1a, der_cert_2); 61 EXPECT_EQ(1, service->cert_count());
62
63 EXPECT_EQ(private_key_info1, private_key_info2);
64 EXPECT_EQ(der_cert1, der_cert2);
65
66 EXPECT_EQ(2u, service->requests());
67 EXPECT_EQ(1u, service->cert_store_hits());
68 EXPECT_EQ(0u, service->inflight_joins());
49 } 69 }
50 70
51 TEST(OriginBoundCertServiceTest, ExtractValuesFromBytes) { 71 TEST_F(OriginBoundCertServiceTest, StoreCerts) {
52 scoped_refptr<OriginBoundCertService> service( 72 scoped_ptr<OriginBoundCertService> service(
53 new OriginBoundCertService(new DefaultOriginBoundCertStore(NULL))); 73 new OriginBoundCertService(new DefaultOriginBoundCertStore(NULL)));
54 std::string origin("https://encrypted.google.com/"); 74 int error;
75 TestCompletionCallback callback;
76 OriginBoundCertService::RequestHandle request_handle;
77
78 std::string origin1("https://encrypted.google.com:443");
79 std::string private_key_info1, der_cert1;
80 EXPECT_EQ(0, service->cert_count());
81 error = service->GetOriginBoundCert(
82 origin1, &private_key_info1, &der_cert1, &callback, &request_handle);
83 EXPECT_EQ(ERR_IO_PENDING, error);
84 EXPECT_TRUE(request_handle != NULL);
85 error = callback.WaitForResult();
86 EXPECT_EQ(OK, error);
87 EXPECT_EQ(1, service->cert_count());
88
89 std::string origin2("https://www.verisign.com:443");
90 std::string private_key_info2, der_cert2;
91 error = service->GetOriginBoundCert(
92 origin2, &private_key_info2, &der_cert2, &callback, &request_handle);
93 EXPECT_EQ(ERR_IO_PENDING, error);
94 EXPECT_TRUE(request_handle != NULL);
95 error = callback.WaitForResult();
96 EXPECT_EQ(OK, error);
97 EXPECT_EQ(2, service->cert_count());
98
99 std::string origin3("https://www.twitter.com:443");
100 std::string private_key_info3, der_cert3;
101 error = service->GetOriginBoundCert(
102 origin3, &private_key_info3, &der_cert3, &callback, &request_handle);
103 EXPECT_EQ(ERR_IO_PENDING, error);
104 EXPECT_TRUE(request_handle != NULL);
105 error = callback.WaitForResult();
106 EXPECT_EQ(OK, error);
107 EXPECT_EQ(3, service->cert_count());
108
109 EXPECT_NE(private_key_info1, private_key_info2);
110 EXPECT_NE(der_cert1, der_cert2);
111 EXPECT_NE(private_key_info1, private_key_info3);
112 EXPECT_NE(der_cert1, der_cert3);
113 EXPECT_NE(private_key_info2, private_key_info3);
114 EXPECT_NE(der_cert2, der_cert3);
115 }
116
117 // Tests an inflight join.
118 TEST_F(OriginBoundCertServiceTest, InflightJoin) {
119 scoped_ptr<OriginBoundCertService> service(
120 new OriginBoundCertService(new DefaultOriginBoundCertStore(NULL)));
121 std::string origin("https://encrypted.google.com:443");
122 int error;
123
124 std::string private_key_info1, der_cert1;
125 TestCompletionCallback callback1;
126 OriginBoundCertService::RequestHandle request_handle1;
127
128 std::string private_key_info2, der_cert2;
129 TestCompletionCallback callback2;
130 OriginBoundCertService::RequestHandle request_handle2;
131
132 error = service->GetOriginBoundCert(
133 origin, &private_key_info1, &der_cert1, &callback1, &request_handle1);
134 EXPECT_EQ(ERR_IO_PENDING, error);
135 EXPECT_TRUE(request_handle1 != NULL);
136 error = service->GetOriginBoundCert(
137 origin, &private_key_info2, &der_cert2, &callback2, &request_handle2);
138 EXPECT_EQ(ERR_IO_PENDING, error);
139 EXPECT_TRUE(request_handle2 != NULL);
140
141 error = callback1.WaitForResult();
142 EXPECT_EQ(OK, error);
143 error = callback2.WaitForResult();
144 EXPECT_EQ(OK, error);
145
146 EXPECT_EQ(2u, service->requests());
147 EXPECT_EQ(0u, service->cert_store_hits());
148 EXPECT_EQ(1u, service->inflight_joins());
149 }
150
151 TEST_F(OriginBoundCertServiceTest, ExtractValuesFromBytes) {
152 scoped_ptr<OriginBoundCertService> service(
153 new OriginBoundCertService(new DefaultOriginBoundCertStore(NULL)));
154 std::string origin("https://encrypted.google.com:443");
55 std::string private_key_info, der_cert; 155 std::string private_key_info, der_cert;
56 EXPECT_TRUE(service->GetOriginBoundCert( 156 int error;
57 origin, &private_key_info, &der_cert)); 157 TestCompletionCallback callback;
158 OriginBoundCertService::RequestHandle request_handle;
159
160 error = service->GetOriginBoundCert(
161 origin, &private_key_info, &der_cert, &callback, &request_handle);
162 EXPECT_EQ(ERR_IO_PENDING, error);
163 EXPECT_TRUE(request_handle != NULL);
164 error = callback.WaitForResult();
165 EXPECT_EQ(OK, error);
166
167 // Check that we can retrieve the key from the bytes.
58 std::vector<uint8> key_vec(private_key_info.begin(), private_key_info.end()); 168 std::vector<uint8> key_vec(private_key_info.begin(), private_key_info.end());
59
60 // Check that we can retrieve the key pair from the bytes.
61 scoped_ptr<crypto::RSAPrivateKey> private_key( 169 scoped_ptr<crypto::RSAPrivateKey> private_key(
62 crypto::RSAPrivateKey::CreateFromPrivateKeyInfo(key_vec)); 170 crypto::RSAPrivateKey::CreateFromPrivateKeyInfo(key_vec));
63 EXPECT_TRUE(private_key != NULL); 171 EXPECT_TRUE(private_key != NULL);
64 172
65 // Check that we can retrieve the cert from the bytes. 173 // Check that we can retrieve the cert from the bytes.
66 scoped_refptr<X509Certificate> x509cert( 174 scoped_refptr<X509Certificate> x509cert(
67 X509Certificate::CreateFromBytes(der_cert.data(), der_cert.size())); 175 X509Certificate::CreateFromBytes(der_cert.data(), der_cert.size()));
68 EXPECT_TRUE(x509cert != NULL); 176 EXPECT_TRUE(x509cert != NULL);
69 } 177 }
70 178
179 // Tests that the callback of a canceled request is never made.
180 TEST_F(OriginBoundCertServiceTest, CancelRequest) {
181 scoped_ptr<OriginBoundCertService> service(
182 new OriginBoundCertService(new DefaultOriginBoundCertStore(NULL)));
183 std::string origin("https://encrypted.google.com:443");
184 std::string private_key_info, der_cert;
185 int error;
186 ExplodingCallback exploding_callback;
187 OriginBoundCertService::RequestHandle request_handle;
188
189 error = service->GetOriginBoundCert(origin,
190 &private_key_info,
191 &der_cert,
192 &exploding_callback,
193 &request_handle);
194 EXPECT_EQ(ERR_IO_PENDING, error);
195 EXPECT_TRUE(request_handle != NULL);
196 service->CancelRequest(request_handle);
197
198 // Issue a few more requests to the worker pool and wait for their
199 // completion, so that the task of the canceled request (which runs on a
200 // worker thread) is likely to complete by the end of this test.
201 TestCompletionCallback callback;
202 for (int i = 0; i < 5; ++i) {
203 error = service->GetOriginBoundCert(
204 "https://encrypted.google.com:" + std::string(1, (char) ('1' + i)),
205 &private_key_info,
206 &der_cert,
207 &callback,
208 &request_handle);
209 EXPECT_EQ(ERR_IO_PENDING, error);
210 EXPECT_TRUE(request_handle != NULL);
211 error = callback.WaitForResult();
212 }
213 }
214
71 #endif // !defined(USE_OPENSSL) 215 #endif // !defined(USE_OPENSSL)
72 216
73 } // namespace net 217 } // namespace net
OLDNEW
« no previous file with comments | « net/base/origin_bound_cert_service.cc ('k') | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698