OLD | NEW |
---|---|
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include <cert.h> | 5 #include <cert.h> |
6 #include <certdb.h> | 6 #include <certdb.h> |
7 #include <pk11pub.h> | 7 #include <pk11pub.h> |
8 | 8 |
9 #include <algorithm> | 9 #include <algorithm> |
10 | 10 |
(...skipping 20 matching lines...) Expand all Loading... | |
31 #include "testing/gtest/include/gtest/gtest.h" | 31 #include "testing/gtest/include/gtest/gtest.h" |
32 | 32 |
33 // In NSS 3.13, CERTDB_VALID_PEER was renamed CERTDB_TERMINAL_RECORD. So we use | 33 // In NSS 3.13, CERTDB_VALID_PEER was renamed CERTDB_TERMINAL_RECORD. So we use |
34 // the new name of the macro. | 34 // the new name of the macro. |
35 #if !defined(CERTDB_TERMINAL_RECORD) | 35 #if !defined(CERTDB_TERMINAL_RECORD) |
36 #define CERTDB_TERMINAL_RECORD CERTDB_VALID_PEER | 36 #define CERTDB_TERMINAL_RECORD CERTDB_VALID_PEER |
37 #endif | 37 #endif |
38 | 38 |
39 namespace net { | 39 namespace net { |
40 | 40 |
41 // TODO(mattm): when https://bugzilla.mozilla.org/show_bug.cgi?id=588269 is | |
42 // fixed, switch back to using a separate userdb for each test. | |
43 // (When doing so, remember to add some standalone tests of DeleteCert since it | |
44 // won't be tested by TearDown anymore.) | |
45 class CertDatabaseNSSTest : public testing::Test { | 41 class CertDatabaseNSSTest : public testing::Test { |
46 public: | 42 public: |
47 static void SetUpTestCase() { | |
48 ASSERT_TRUE(crypto::OpenTestNSSDB()); | |
49 // There is no matching TearDownTestCase call to close the test NSS DB | |
50 // because that would leave NSS in a potentially broken state for further | |
51 // tests, due to https://bugzilla.mozilla.org/show_bug.cgi?id=588269 | |
52 } | |
53 | |
54 virtual void SetUp() { | 43 virtual void SetUp() { |
44 test_nssdb_.reset(new crypto::ScopedTestNSSDB()); | |
45 ASSERT_TRUE(test_nssdb_->is_open()); | |
55 cert_db_ = NSSCertDatabase::GetInstance(); | 46 cert_db_ = NSSCertDatabase::GetInstance(); |
56 slot_ = cert_db_->GetPublicModule(); | 47 slot_ = cert_db_->GetPublicModule(); |
57 | 48 |
58 // Test db should be empty at start of test. | 49 // Test db should be empty at start of test. |
59 EXPECT_EQ(0U, ListCertsInSlot(slot_->os_module_handle()).size()); | 50 EXPECT_EQ(0U, ListCertsInSlot(slot_->os_module_handle()).size()); |
60 } | 51 } |
61 | 52 |
62 virtual void TearDown() { | 53 virtual void TearDown() { |
63 // Don't try to cleanup if the setup failed. | 54 // Don't try to cleanup if the setup failed. |
64 ASSERT_TRUE(slot_->os_module_handle()); | 55 ASSERT_TRUE(slot_->os_module_handle()); |
65 | 56 |
66 EXPECT_TRUE(CleanupSlotContents()); | 57 EXPECT_TRUE(CleanupSlotContents()); |
67 | 58 |
68 // Run the message loop to process any observer callbacks (e.g. for the | 59 // Run the message loop to process any observer callbacks (e.g. for the |
69 // ClientSocketFactory singleton) so that the scoped ref ptrs created in | 60 // ClientSocketFactory singleton) so that the scoped ref ptrs created in |
70 // NSSCertDatabase::NotifyObservers* get released. | 61 // NSSCertDatabase::NotifyObservers* get released. |
71 MessageLoop::current()->RunAllPending(); | 62 MessageLoop::current()->RunAllPending(); |
72 | 63 |
73 EXPECT_EQ(0U, ListCertsInSlot(slot_->os_module_handle()).size()); | 64 EXPECT_EQ(0U, ListCertsInSlot(slot_->os_module_handle()).size()); |
65 | |
66 test_nssdb_.reset(); | |
74 } | 67 } |
75 | 68 |
76 protected: | 69 protected: |
77 static std::string ReadTestFile(const std::string& name) { | 70 static std::string ReadTestFile(const std::string& name) { |
78 std::string result; | 71 std::string result; |
79 FilePath cert_path = GetTestCertsDirectory().AppendASCII(name); | 72 FilePath cert_path = GetTestCertsDirectory().AppendASCII(name); |
80 EXPECT_TRUE(file_util::ReadFileToString(cert_path, &result)); | 73 EXPECT_TRUE(file_util::ReadFileToString(cert_path, &result)); |
81 return result; | 74 return result; |
82 } | 75 } |
83 | 76 |
(...skipping 38 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
122 SECStatus srv = CERT_ChangeCertTrust( | 115 SECStatus srv = CERT_ChangeCertTrust( |
123 CERT_GetDefaultCertDB(), certs[i]->os_cert_handle(), &default_trust); | 116 CERT_GetDefaultCertDB(), certs[i]->os_cert_handle(), &default_trust); |
124 if (srv != SECSuccess) | 117 if (srv != SECSuccess) |
125 ok = false; | 118 ok = false; |
126 | 119 |
127 if (!cert_db_->DeleteCertAndKey(certs[i])) | 120 if (!cert_db_->DeleteCertAndKey(certs[i])) |
128 ok = false; | 121 ok = false; |
129 } | 122 } |
130 return ok; | 123 return ok; |
131 } | 124 } |
125 | |
126 scoped_ptr<crypto::ScopedTestNSSDB> test_nssdb_; | |
Ryan Sleevi
2012/10/16 18:19:02
No need to use scoped_ptr here
Takashi Toyoshima
2012/10/17 04:58:53
Done.
| |
132 }; | 127 }; |
133 | 128 |
134 TEST_F(CertDatabaseNSSTest, ListCerts) { | 129 TEST_F(CertDatabaseNSSTest, ListCerts) { |
135 // This test isn't terribly useful, though it will at least let valgrind test | 130 // This test isn't terribly useful, though it will at least let valgrind test |
136 // for leaks. | 131 // for leaks. |
137 CertificateList certs; | 132 CertificateList certs; |
138 cert_db_->ListCerts(&certs); | 133 cert_db_->ListCerts(&certs); |
139 // The test DB is empty, but let's assume there will always be something in | 134 // The test DB is empty, but let's assume there will always be something in |
140 // the other slots. | 135 // the other slots. |
141 EXPECT_LT(0U, certs.size()); | 136 EXPECT_LT(0U, certs.size()); |
(...skipping 784 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
926 | 921 |
927 // Server cert should verify. | 922 // Server cert should verify. |
928 CertVerifyResult verify_result2; | 923 CertVerifyResult verify_result2; |
929 error = verify_proc->Verify(certs[0], "127.0.0.1", flags, | 924 error = verify_proc->Verify(certs[0], "127.0.0.1", flags, |
930 NULL, &verify_result2); | 925 NULL, &verify_result2); |
931 EXPECT_EQ(OK, error); | 926 EXPECT_EQ(OK, error); |
932 EXPECT_EQ(0U, verify_result2.cert_status); | 927 EXPECT_EQ(0U, verify_result2.cert_status); |
933 } | 928 } |
934 | 929 |
935 } // namespace net | 930 } // namespace net |
OLD | NEW |