Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(582)

Side by Side Diff: chrome/browser/safe_browsing/signature_util_win_unittest.cc

Issue 8536035: Include the full certificate chain in the download pingback. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src/
Patch Set: Created 9 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "chrome/browser/safe_browsing/signature_util.h" 5 #include "chrome/browser/safe_browsing/signature_util.h"
6 6
7 #include <string> 7 #include <string>
8 #include <vector>
9
8 #include "base/base_paths.h" 10 #include "base/base_paths.h"
9 #include "base/file_path.h" 11 #include "base/file_path.h"
10 #include "base/path_service.h" 12 #include "base/path_service.h"
11 #include "base/memory/ref_counted.h" 13 #include "base/memory/ref_counted.h"
12 #include "chrome/common/safe_browsing/csd.pb.h" 14 #include "chrome/common/safe_browsing/csd.pb.h"
13 #include "net/base/x509_cert_types.h" 15 #include "net/base/x509_cert_types.h"
14 #include "net/base/x509_certificate.h" 16 #include "net/base/x509_certificate.h"
15 #include "testing/gtest/include/gtest/gtest.h" 17 #include "testing/gtest/include/gtest/gtest.h"
16 18
17 namespace safe_browsing { 19 namespace safe_browsing {
18 20
19 TEST(SignatureUtilWinTest, CheckSignature) { 21 class SignatureUtilWinTest : public testing::Test {
20 FilePath source_path; 22 protected:
21 ASSERT_TRUE(PathService::Get(base::DIR_SOURCE_ROOT, &source_path)); 23 virtual void SetUp() {
24 FilePath source_path;
25 ASSERT_TRUE(PathService::Get(base::DIR_SOURCE_ROOT, &source_path));
26 testdata_path_ = source_path
27 .AppendASCII("chrome")
28 .AppendASCII("test")
29 .AppendASCII("data")
30 .AppendASCII("safe_browsing")
31 .AppendASCII("download_protection");
32 }
22 33
23 FilePath testdata_path = source_path 34 // Given a certificate chain protobuf, parse it into X509Certificates.
24 .AppendASCII("chrome") 35 void ParseCertificateChain(
25 .AppendASCII("test") 36 const ClientDownloadRequest_CertificateChain& chain,
26 .AppendASCII("data") 37 std::vector<scoped_refptr<net::X509Certificate> >* certs) {
27 .AppendASCII("safe_browsing") 38 for (int i = 0; i < chain.element_size(); ++i) {
28 .AppendASCII("download_protection"); 39 certs->push_back(
40 net::X509Certificate::CreateFromBytes(
41 chain.element(i).certificate().data(),
42 chain.element(i).certificate().size()));
43 }
44 }
29 45
30 // signed.exe is signed with a self-signed certificate. The certificate 46 FilePath testdata_path_;
31 // should be returned, but it is not trusted. 47 };
48
49 TEST_F(SignatureUtilWinTest, UntrustedSignedBinary) {
50 // signed.exe is signed by an untrusted root CA.
32 scoped_refptr<SignatureUtil> signature_util(new SignatureUtil()); 51 scoped_refptr<SignatureUtil> signature_util(new SignatureUtil());
33 ClientDownloadRequest_SignatureInfo signature_info; 52 ClientDownloadRequest_SignatureInfo signature_info;
34 signature_util->CheckSignature(testdata_path.Append(L"signed.exe"), 53 signature_util->CheckSignature(testdata_path_.Append(L"signed.exe"),
35 &signature_info); 54 &signature_info);
36 EXPECT_FALSE(signature_info.certificate_contents().empty()); 55 ASSERT_EQ(1, signature_info.certificate_chain_size());
37 scoped_refptr<net::X509Certificate> cert( 56 std::vector<scoped_refptr<net::X509Certificate> > certs;
38 net::X509Certificate::CreateFromBytes( 57 ParseCertificateChain(signature_info.certificate_chain(0), &certs);
39 signature_info.certificate_contents().data(), 58 ASSERT_EQ(2, certs.size());
40 signature_info.certificate_contents().size())); 59 EXPECT_EQ("Joe's-Software-Emporium", certs[0]->subject().common_name);
41 ASSERT_TRUE(cert.get()); 60 EXPECT_EQ("Root Agency", certs[1]->subject().common_name);
42 EXPECT_EQ("Joe's-Software-Emporium", cert->subject().common_name);
43 EXPECT_FALSE(signature_info.trusted());
44 61
45 // wow_helper.exe is signed using Google's signing certifiacte.
46 signature_info.Clear();
47 signature_util->CheckSignature(testdata_path.Append(L"wow_helper.exe"),
48 &signature_info);
49 EXPECT_TRUE(signature_info.has_certificate_contents());
50 cert = net::X509Certificate::CreateFromBytes(
51 signature_info.certificate_contents().data(),
52 signature_info.certificate_contents().size());
53 ASSERT_TRUE(cert.get());
54 EXPECT_EQ("Google Inc", cert->subject().common_name);
55 EXPECT_TRUE(signature_info.trusted());
56
57 // unsigned.exe has no signature information.
58 signature_info.Clear();
59 signature_util->CheckSignature(testdata_path.Append(L"unsigned.exe"),
60 &signature_info);
61 EXPECT_FALSE(signature_info.has_certificate_contents());
62 EXPECT_FALSE(signature_info.trusted());
63
64 // Test a file that doesn't exist.
65 signature_info.Clear();
66 signature_util->CheckSignature(testdata_path.Append(L"doesnotexist.exe"),
67 &signature_info);
68 EXPECT_FALSE(signature_info.has_certificate_contents());
69 EXPECT_FALSE(signature_info.trusted()); 62 EXPECT_FALSE(signature_info.trusted());
70 } 63 }
71 64
65 TEST_F(SignatureUtilWinTest, TrustedBinary) {
66 // wow_helper.exe is signed using Google's signing certifiacte.
67 scoped_refptr<SignatureUtil> signature_util(new SignatureUtil());
68 ClientDownloadRequest_SignatureInfo signature_info;
69 signature_util->CheckSignature(testdata_path_.Append(L"wow_helper.exe"),
70 &signature_info);
71 ASSERT_EQ(1, signature_info.certificate_chain_size());
72 std::vector<scoped_refptr<net::X509Certificate> > certs;
73 ParseCertificateChain(signature_info.certificate_chain(0), &certs);
74 ASSERT_EQ(3, certs.size());
75
76 EXPECT_EQ("Google Inc", certs[0]->subject().common_name);
77 EXPECT_EQ("VeriSign Class 3 Code Signing 2009-2 CA",
78 certs[1]->subject().common_name);
79 EXPECT_EQ("Class 3 Public Primary Certification Authority",
80 certs[2]->subject().organization_unit_names[0]);
81
82 EXPECT_TRUE(signature_info.trusted());
83 }
84
85 TEST_F(SignatureUtilWinTest, UnsignedBinary) {
86 // unsigned.exe has no signature information.
87 scoped_refptr<SignatureUtil> signature_util(new SignatureUtil());
88 ClientDownloadRequest_SignatureInfo signature_info;
89 signature_util->CheckSignature(testdata_path_.Append(L"unsigned.exe"),
90 &signature_info);
91 EXPECT_EQ(0, signature_info.certificate_chain_size());
92 EXPECT_FALSE(signature_info.trusted());
93 }
94
95 TEST_F(SignatureUtilWinTest, NonExistentBinary) {
96 // Test a file that doesn't exist.
97 scoped_refptr<SignatureUtil> signature_util(new SignatureUtil());
98 ClientDownloadRequest_SignatureInfo signature_info;
99 signature_util->CheckSignature(testdata_path_.Append(L"doesnotexist.exe"),
100 &signature_info);
101 EXPECT_EQ(0, signature_info.certificate_chain_size());
102 EXPECT_FALSE(signature_info.trusted());
103 }
104
72 } // namespace safe_browsing 105 } // namespace safe_browsing
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698