OLD | NEW |
| (Empty) |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include "net/base/client_cert_store_impl.h" | |
6 | |
7 #include <string> | |
8 #include <vector> | |
9 | |
10 #include "base/files/file_path.h" | |
11 #include "base/memory/ref_counted.h" | |
12 #include "base/memory/scoped_ptr.h" | |
13 #include "net/base/cert_test_util.h" | |
14 #include "net/base/test_data_directory.h" | |
15 #include "testing/gtest/include/gtest/gtest.h" | |
16 | |
17 namespace net { | |
18 | |
19 namespace { | |
20 | |
21 // "CN=Client Auth Test Root 1" - DER encoded DN of the issuer of client_1.pem. | |
22 const unsigned char kAuthority1DN[] = { | |
23 0x30, 0x22, 0x31, 0x20, 0x30, 0x1e, 0x06, 0x03, 0x55, 0x04, 0x03, 0x0c, | |
24 0x17, 0x43, 0x6c, 0x69, 0x65, 0x6e, 0x74, 0x20, 0x41, 0x75, 0x74, 0x68, | |
25 0x20, 0x54, 0x65, 0x73, 0x74, 0x20, 0x52, 0x6f, 0x6f, 0x74, 0x20, 0x31 | |
26 }; | |
27 | |
28 // "CN=Client Auth Test Root 2" - DER encoded DN of the issuer of client_2.pem. | |
29 unsigned char kAuthority2DN[] = { | |
30 0x30, 0x22, 0x31, 0x20, 0x30, 0x1e, 0x06, 0x03, 0x55, 0x04, 0x03, 0x0c, | |
31 0x17, 0x43, 0x6c, 0x69, 0x65, 0x6e, 0x74, 0x20, 0x41, 0x75, 0x74, 0x68, | |
32 0x20, 0x54, 0x65, 0x73, 0x74, 0x20, 0x52, 0x6f, 0x6f, 0x74, 0x20, 0x32 | |
33 }; | |
34 | |
35 } // namespace | |
36 | |
37 TEST(ClientCertStoreImplTest, EmptyQuery) { | |
38 std::vector<scoped_refptr<X509Certificate> > certs; | |
39 scoped_refptr<SSLCertRequestInfo> request(new SSLCertRequestInfo()); | |
40 | |
41 ClientCertStoreImpl store; | |
42 std::vector<scoped_refptr<X509Certificate> > selected_certs; | |
43 bool rv = store.SelectClientCerts(certs, *request, &selected_certs); | |
44 EXPECT_TRUE(rv); | |
45 EXPECT_EQ(0u, selected_certs.size()); | |
46 } | |
47 | |
48 // Verify that CertRequestInfo with empty |cert_authorities| matches all | |
49 // issuers, rather than no issuers. | |
50 TEST(ClientCertStoreImplTest, AllIssuersAllowed) { | |
51 scoped_refptr<X509Certificate> cert( | |
52 ImportCertFromFile(GetTestCertsDirectory(), "client_1.pem")); | |
53 ASSERT_TRUE(cert); | |
54 | |
55 std::vector<scoped_refptr<X509Certificate> > certs; | |
56 certs.push_back(cert); | |
57 scoped_refptr<SSLCertRequestInfo> request(new SSLCertRequestInfo()); | |
58 | |
59 ClientCertStoreImpl store; | |
60 std::vector<scoped_refptr<X509Certificate> > selected_certs; | |
61 bool rv = store.SelectClientCerts(certs, *request, &selected_certs); | |
62 EXPECT_TRUE(rv); | |
63 ASSERT_EQ(1u, selected_certs.size()); | |
64 EXPECT_TRUE(selected_certs[0]->Equals(cert)); | |
65 } | |
66 | |
67 // Verify that certificates are correctly filtered against CertRequestInfo with | |
68 // |cert_authorities| containing only |authority_1_DN|. | |
69 TEST(ClientCertStoreImplTest, CertAuthorityFiltering) { | |
70 scoped_refptr<X509Certificate> cert_1( | |
71 ImportCertFromFile(GetTestCertsDirectory(), "client_1.pem")); | |
72 ASSERT_TRUE(cert_1); | |
73 scoped_refptr<X509Certificate> cert_2( | |
74 ImportCertFromFile(GetTestCertsDirectory(), "client_2.pem")); | |
75 ASSERT_TRUE(cert_2); | |
76 | |
77 std::vector<std::string> authority_1( | |
78 1, std::string(reinterpret_cast<const char*>(kAuthority1DN), | |
79 sizeof(kAuthority1DN))); | |
80 std::vector<std::string> authority_2( | |
81 1, std::string(reinterpret_cast<const char*>(kAuthority2DN), | |
82 sizeof(kAuthority2DN))); | |
83 EXPECT_TRUE(cert_1->IsIssuedByEncoded(authority_1)); | |
84 EXPECT_FALSE(cert_1->IsIssuedByEncoded(authority_2)); | |
85 EXPECT_TRUE(cert_2->IsIssuedByEncoded(authority_2)); | |
86 EXPECT_FALSE(cert_2->IsIssuedByEncoded(authority_1)); | |
87 | |
88 std::vector<scoped_refptr<X509Certificate> > certs; | |
89 certs.push_back(cert_1); | |
90 certs.push_back(cert_2); | |
91 scoped_refptr<SSLCertRequestInfo> request(new SSLCertRequestInfo()); | |
92 request->cert_authorities = authority_1; | |
93 | |
94 ClientCertStoreImpl store; | |
95 std::vector<scoped_refptr<X509Certificate> > selected_certs; | |
96 bool rv = store.SelectClientCerts(certs, *request, &selected_certs); | |
97 EXPECT_TRUE(rv); | |
98 ASSERT_EQ(1u, selected_certs.size()); | |
99 EXPECT_TRUE(selected_certs[0]->Equals(cert_1)); | |
100 } | |
101 | |
102 #if defined(OS_MACOSX) && !defined(OS_IOS) | |
103 // Verify that the preferred cert gets filtered out when it doesn't match the | |
104 // server criteria. | |
105 TEST(ClientCertStoreImplTest, FilterOutThePreferredCert) { | |
106 scoped_refptr<X509Certificate> cert_1( | |
107 ImportCertFromFile(GetTestCertsDirectory(), "client_1.pem")); | |
108 ASSERT_TRUE(cert_1); | |
109 | |
110 std::vector<std::string> authority_2( | |
111 1, std::string(reinterpret_cast<const char*>(kAuthority2DN), | |
112 sizeof(kAuthority2DN))); | |
113 EXPECT_FALSE(cert_1->IsIssuedByEncoded(authority_2)); | |
114 | |
115 std::vector<scoped_refptr<X509Certificate> > certs; | |
116 scoped_refptr<SSLCertRequestInfo> request(new SSLCertRequestInfo()); | |
117 request->cert_authorities = authority_2; | |
118 | |
119 ClientCertStoreImpl store; | |
120 std::vector<scoped_refptr<X509Certificate> > selected_certs; | |
121 bool rv = store.SelectClientCertsGivenPreferred(cert_1, certs, *request, | |
122 &selected_certs); | |
123 EXPECT_TRUE(rv); | |
124 EXPECT_EQ(0u, selected_certs.size()); | |
125 } | |
126 | |
127 // Verify that the preferred cert takes the first position in the output list, | |
128 // when it does not get filtered out. | |
129 TEST(ClientCertStoreImplTest, PreferredCertGoesFirst) { | |
130 scoped_refptr<X509Certificate> cert_1( | |
131 ImportCertFromFile(GetTestCertsDirectory(), "client_1.pem")); | |
132 ASSERT_TRUE(cert_1); | |
133 scoped_refptr<X509Certificate> cert_2( | |
134 ImportCertFromFile(GetTestCertsDirectory(), "client_2.pem")); | |
135 ASSERT_TRUE(cert_2); | |
136 | |
137 std::vector<scoped_refptr<X509Certificate> > certs; | |
138 certs.push_back(cert_2); | |
139 scoped_refptr<SSLCertRequestInfo> request(new SSLCertRequestInfo()); | |
140 | |
141 ClientCertStoreImpl store; | |
142 std::vector<scoped_refptr<X509Certificate> > selected_certs; | |
143 bool rv = store.SelectClientCertsGivenPreferred(cert_1, certs, *request, | |
144 &selected_certs); | |
145 EXPECT_TRUE(rv); | |
146 ASSERT_EQ(2u, selected_certs.size()); | |
147 EXPECT_TRUE(selected_certs[0]->Equals(cert_1)); | |
148 EXPECT_TRUE(selected_certs[1]->Equals(cert_2)); | |
149 } | |
150 #endif | |
151 | |
152 } // namespace net | |
OLD | NEW |