Chromium Code Reviews| OLD | NEW |
|---|---|
| (Empty) | |
| 1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #include "chrome/browser/chromeos/policy/policy_cert_verifier.h" | |
| 6 | |
| 7 #include "base/memory/ref_counted.h" | |
| 8 #include "base/memory/scoped_ptr.h" | |
| 9 #include "base/message_loop.h" | |
| 10 #include "base/run_loop.h" | |
| 11 #include "chrome/common/pref_names.h" | |
| 12 #include "chrome/test/base/testing_browser_process.h" | |
| 13 #include "chrome/test/base/testing_profile.h" | |
| 14 #include "chrome/test/base/testing_profile_manager.h" | |
| 15 #include "content/public/browser/browser_thread.h" | |
| 16 #include "content/public/test/test_browser_thread.h" | |
| 17 #include "crypto/nss_util.h" | |
| 18 #include "net/base/net_log.h" | |
| 19 #include "net/base/test_completion_callback.h" | |
| 20 #include "net/base/test_data_directory.h" | |
| 21 #include "net/cert/cert_trust_anchor_provider.h" | |
| 22 #include "net/cert/cert_verify_proc.h" | |
| 23 #include "net/cert/cert_verify_result.h" | |
| 24 #include "net/cert/nss_cert_database.h" | |
| 25 #include "net/cert/x509_certificate.h" | |
| 26 #include "net/test/cert_test_util.h" | |
| 27 #include "testing/gmock/include/gmock/gmock.h" | |
| 28 #include "testing/gtest/include/gtest/gtest.h" | |
| 29 | |
| 30 using testing::Mock; | |
| 31 using testing::ReturnRef; | |
| 32 | |
| 33 namespace policy { | |
| 34 | |
| 35 namespace { | |
| 36 | |
| 37 class MockCertTrustAnchorProvider : public net::CertTrustAnchorProvider { | |
| 38 public: | |
| 39 MockCertTrustAnchorProvider() {} | |
| 40 virtual ~MockCertTrustAnchorProvider() {} | |
| 41 | |
| 42 MOCK_METHOD0(GetAdditionalTrustAnchors, const net::CertificateList&()); | |
| 43 }; | |
| 44 | |
| 45 } // namespace | |
| 46 | |
| 47 // This is actually a unit test, but is linked with browser_tests because | |
| 48 // importing a certificate into the NSS test database persists for the duration | |
| 49 // of a process; since each browser_test runs in a separate process then this | |
| 50 // won't affect subsequent tests. | |
| 51 // This can be moved to the unittests target once the TODO in ~ScopedTestNSSDB | |
| 52 // is fixed. | |
| 53 class PolicyCertVerifierTest : public testing::Test { | |
| 54 public: | |
| 55 PolicyCertVerifierTest() | |
| 56 : cert_db_(NULL), | |
| 57 ui_thread_(content::BrowserThread::UI, &loop_), | |
| 58 io_thread_(content::BrowserThread::IO, &loop_), | |
| 59 profile_manager_(TestingBrowserProcess::GetGlobal()), | |
| 60 profile_(NULL) {} | |
| 61 | |
| 62 virtual ~PolicyCertVerifierTest() {} | |
| 63 | |
| 64 virtual void SetUp() OVERRIDE { | |
| 65 ASSERT_TRUE(test_nssdb_.is_open()); | |
| 66 cert_db_ = net::NSSCertDatabase::GetInstance(); | |
| 67 | |
| 68 ASSERT_TRUE(profile_manager_.SetUp()); | |
| 69 profile_ = profile_manager_.CreateTestingProfile("profile"); | |
| 70 | |
| 71 cert_verifier_.reset(new PolicyCertVerifier(profile_, &trust_provider_)); | |
| 72 } | |
| 73 | |
| 74 bool SupportsAdditionalTrustAnchors() { | |
| 75 scoped_refptr<net::CertVerifyProc> proc = | |
|
pneubeck (no reviews)
2013/04/04 11:22:22
nit: you might drop the local variable.
Joao da Silva
2013/04/04 11:25:35
RefCounted objects have 0 refcounts when they are
| |
| 76 net::CertVerifyProc::CreateDefault(); | |
| 77 return proc->SupportsAdditionalTrustAnchors(); | |
| 78 } | |
| 79 | |
| 80 scoped_refptr<net::X509Certificate> LoadCertificate(const std::string& name, | |
| 81 net::CertType type) { | |
| 82 scoped_refptr<net::X509Certificate> cert = | |
| 83 net::ImportCertFromFile(net::GetTestCertsDirectory(), name); | |
| 84 | |
| 85 // No certificate is trusted right after it's loaded. | |
| 86 net::NSSCertDatabase::TrustBits trust = | |
| 87 cert_db_->GetCertTrust(cert.get(), type); | |
| 88 EXPECT_EQ(net::NSSCertDatabase::TRUST_DEFAULT, trust); | |
| 89 | |
| 90 return cert; | |
| 91 } | |
| 92 | |
| 93 protected: | |
| 94 crypto::ScopedTestNSSDB test_nssdb_; | |
| 95 net::NSSCertDatabase* cert_db_; | |
| 96 MessageLoop loop_; | |
| 97 content::TestBrowserThread ui_thread_; | |
| 98 content::TestBrowserThread io_thread_; | |
| 99 TestingProfileManager profile_manager_; | |
| 100 TestingProfile* profile_; | |
| 101 MockCertTrustAnchorProvider trust_provider_; | |
| 102 scoped_ptr<PolicyCertVerifier> cert_verifier_; | |
| 103 const net::CertificateList empty_cert_list_; | |
| 104 }; | |
| 105 | |
| 106 TEST_F(PolicyCertVerifierTest, VerifyUntrustedCert) { | |
| 107 scoped_refptr<net::X509Certificate> cert = | |
| 108 LoadCertificate("ok_cert.pem", net::SERVER_CERT); | |
| 109 ASSERT_TRUE(cert); | |
| 110 | |
| 111 // |cert| is untrusted, so Verify() fails. | |
| 112 net::CertVerifyResult verify_result; | |
| 113 net::TestCompletionCallback callback; | |
| 114 net::CertVerifier::RequestHandle request_handle; | |
| 115 EXPECT_CALL(trust_provider_, GetAdditionalTrustAnchors()) | |
| 116 .WillOnce(ReturnRef(empty_cert_list_)); | |
| 117 int error = cert_verifier_->Verify(cert, "127.0.0.1", 0, NULL, | |
| 118 &verify_result, callback.callback(), | |
| 119 &request_handle, net::BoundNetLog()); | |
| 120 Mock::VerifyAndClearExpectations(&trust_provider_); | |
| 121 ASSERT_EQ(net::ERR_IO_PENDING, error); | |
| 122 ASSERT_TRUE(request_handle); | |
| 123 error = callback.WaitForResult(); | |
| 124 EXPECT_EQ(net::ERR_CERT_AUTHORITY_INVALID, error); | |
| 125 | |
| 126 // Issuing the same request again hits the cache. This tests the synchronous | |
| 127 // path. | |
| 128 EXPECT_CALL(trust_provider_, GetAdditionalTrustAnchors()) | |
| 129 .WillOnce(ReturnRef(empty_cert_list_)); | |
| 130 error = cert_verifier_->Verify(cert, "127.0.0.1", 0, NULL, | |
| 131 &verify_result, callback.callback(), | |
| 132 &request_handle, net::BoundNetLog()); | |
| 133 Mock::VerifyAndClearExpectations(&trust_provider_); | |
| 134 EXPECT_EQ(net::ERR_CERT_AUTHORITY_INVALID, error); | |
| 135 | |
| 136 // The profile is not tainted. | |
| 137 base::RunLoop().RunUntilIdle(); | |
| 138 EXPECT_FALSE( | |
| 139 profile_->GetPrefs()->GetBoolean(prefs::kUsedPolicyCertificatesOnce)); | |
| 140 } | |
| 141 | |
| 142 TEST_F(PolicyCertVerifierTest, VerifyTrustedCert) { | |
| 143 // |ca_cert| is the issuer of |cert|. | |
| 144 scoped_refptr<net::X509Certificate> ca_cert = | |
| 145 LoadCertificate("root_ca_cert.crt", net::CA_CERT); | |
| 146 ASSERT_TRUE(ca_cert); | |
| 147 scoped_refptr<net::X509Certificate> cert = | |
| 148 LoadCertificate("ok_cert.pem", net::SERVER_CERT); | |
| 149 ASSERT_TRUE(cert); | |
| 150 | |
| 151 // Make the database trust |ca_cert|. | |
| 152 net::CertificateList import_list; | |
| 153 import_list.push_back(ca_cert); | |
| 154 net::NSSCertDatabase::ImportCertFailureList failure_list; | |
| 155 ASSERT_TRUE(cert_db_->ImportCACerts( | |
| 156 import_list, net::NSSCertDatabase::TRUSTED_SSL, &failure_list)); | |
| 157 ASSERT_TRUE(failure_list.empty()); | |
| 158 | |
| 159 // Verify that it is now trusted. | |
| 160 net::NSSCertDatabase::TrustBits trust = | |
| 161 cert_db_->GetCertTrust(ca_cert.get(), net::CA_CERT); | |
| 162 EXPECT_EQ(net::NSSCertDatabase::TRUSTED_SSL, trust); | |
| 163 | |
| 164 // Verify() successfully verifies |cert| after it was imported. | |
| 165 net::CertVerifyResult verify_result; | |
| 166 net::TestCompletionCallback callback; | |
| 167 net::CertVerifier::RequestHandle request_handle; | |
| 168 EXPECT_CALL(trust_provider_, GetAdditionalTrustAnchors()) | |
| 169 .WillOnce(ReturnRef(empty_cert_list_)); | |
| 170 int error = cert_verifier_->Verify(cert, "127.0.0.1", 0, NULL, | |
| 171 &verify_result, callback.callback(), | |
| 172 &request_handle, net::BoundNetLog()); | |
| 173 Mock::VerifyAndClearExpectations(&trust_provider_); | |
| 174 ASSERT_EQ(net::ERR_IO_PENDING, error); | |
| 175 ASSERT_TRUE(request_handle); | |
| 176 error = callback.WaitForResult(); | |
| 177 EXPECT_EQ(net::OK, error); | |
| 178 | |
| 179 // The profile is not tainted, since the certificate is trusted from the | |
| 180 // database. | |
| 181 base::RunLoop().RunUntilIdle(); | |
| 182 EXPECT_FALSE( | |
| 183 profile_->GetPrefs()->GetBoolean(prefs::kUsedPolicyCertificatesOnce)); | |
| 184 } | |
| 185 | |
| 186 TEST_F(PolicyCertVerifierTest, VerifyUsingAdditionalTrustAnchor) { | |
| 187 if (!SupportsAdditionalTrustAnchors()) { | |
| 188 LOG(INFO) << "Test skipped on this platform. NSS >= 3.14.2 required."; | |
| 189 return; | |
| 190 } | |
| 191 | |
| 192 // |ca_cert| is the issuer of |cert|. | |
| 193 scoped_refptr<net::X509Certificate> ca_cert = | |
| 194 LoadCertificate("root_ca_cert.crt", net::CA_CERT); | |
| 195 ASSERT_TRUE(ca_cert); | |
| 196 scoped_refptr<net::X509Certificate> cert = | |
| 197 LoadCertificate("ok_cert.pem", net::SERVER_CERT); | |
| 198 ASSERT_TRUE(cert); | |
| 199 | |
| 200 net::CertificateList additional_trust_anchors; | |
| 201 additional_trust_anchors.push_back(ca_cert); | |
| 202 | |
| 203 // Verify() successfully verifies |cert|, using |ca_cert| from the list of | |
| 204 // |additional_trust_anchors|. | |
| 205 net::CertVerifyResult verify_result; | |
| 206 net::TestCompletionCallback callback; | |
| 207 net::CertVerifier::RequestHandle request_handle; | |
| 208 EXPECT_CALL(trust_provider_, GetAdditionalTrustAnchors()) | |
| 209 .WillOnce(ReturnRef(additional_trust_anchors)); | |
| 210 int error = cert_verifier_->Verify(cert, "127.0.0.1", 0, NULL, | |
| 211 &verify_result, callback.callback(), | |
| 212 &request_handle, net::BoundNetLog()); | |
| 213 Mock::VerifyAndClearExpectations(&trust_provider_); | |
| 214 ASSERT_EQ(net::ERR_IO_PENDING, error); | |
| 215 ASSERT_TRUE(request_handle); | |
| 216 error = callback.WaitForResult(); | |
| 217 EXPECT_EQ(net::OK, error); | |
| 218 | |
| 219 // The profile becomes tainted after using the trust anchors that came from | |
| 220 // the policy configuration. | |
| 221 base::RunLoop().RunUntilIdle(); | |
| 222 EXPECT_TRUE( | |
| 223 profile_->GetPrefs()->GetBoolean(prefs::kUsedPolicyCertificatesOnce)); | |
| 224 } | |
| 225 | |
| 226 TEST_F(PolicyCertVerifierTest, ProfileRemainsTainted) { | |
| 227 if (!SupportsAdditionalTrustAnchors()) { | |
| 228 LOG(INFO) << "Test skipped on this platform. NSS >= 3.14.2 required."; | |
| 229 return; | |
| 230 } | |
| 231 | |
| 232 // |ca_cert| is the issuer of |cert|. | |
| 233 scoped_refptr<net::X509Certificate> ca_cert = | |
| 234 LoadCertificate("root_ca_cert.crt", net::CA_CERT); | |
| 235 ASSERT_TRUE(ca_cert); | |
| 236 scoped_refptr<net::X509Certificate> cert = | |
| 237 LoadCertificate("ok_cert.pem", net::SERVER_CERT); | |
| 238 ASSERT_TRUE(cert); | |
| 239 | |
| 240 net::CertificateList additional_trust_anchors; | |
| 241 additional_trust_anchors.push_back(ca_cert); | |
| 242 | |
| 243 // |cert| is untrusted, so Verify() fails. | |
| 244 net::CertVerifyResult verify_result; | |
| 245 net::TestCompletionCallback callback; | |
| 246 net::CertVerifier::RequestHandle request_handle; | |
| 247 EXPECT_CALL(trust_provider_, GetAdditionalTrustAnchors()) | |
| 248 .WillOnce(ReturnRef(empty_cert_list_)); | |
| 249 int error = cert_verifier_->Verify(cert, "127.0.0.1", 0, NULL, | |
| 250 &verify_result, callback.callback(), | |
| 251 &request_handle, net::BoundNetLog()); | |
| 252 Mock::VerifyAndClearExpectations(&trust_provider_); | |
| 253 ASSERT_EQ(net::ERR_IO_PENDING, error); | |
| 254 ASSERT_TRUE(request_handle); | |
| 255 error = callback.WaitForResult(); | |
| 256 EXPECT_EQ(net::ERR_CERT_AUTHORITY_INVALID, error); | |
| 257 | |
| 258 // The profile is not tainted. | |
| 259 base::RunLoop().RunUntilIdle(); | |
| 260 EXPECT_FALSE( | |
| 261 profile_->GetPrefs()->GetBoolean(prefs::kUsedPolicyCertificatesOnce)); | |
| 262 | |
| 263 // Verify() again with the additional trust anchors. | |
| 264 EXPECT_CALL(trust_provider_, GetAdditionalTrustAnchors()) | |
| 265 .WillOnce(ReturnRef(additional_trust_anchors)); | |
| 266 error = cert_verifier_->Verify(cert, "127.0.0.1", 0, NULL, | |
| 267 &verify_result, callback.callback(), | |
| 268 &request_handle, net::BoundNetLog()); | |
| 269 Mock::VerifyAndClearExpectations(&trust_provider_); | |
| 270 ASSERT_EQ(net::ERR_IO_PENDING, error); | |
| 271 ASSERT_TRUE(request_handle); | |
| 272 error = callback.WaitForResult(); | |
| 273 EXPECT_EQ(net::OK, error); | |
| 274 | |
| 275 // The profile becomes tainted after using the trust anchors that came from | |
| 276 // the policy configuration. | |
| 277 base::RunLoop().RunUntilIdle(); | |
| 278 EXPECT_TRUE( | |
| 279 profile_->GetPrefs()->GetBoolean(prefs::kUsedPolicyCertificatesOnce)); | |
| 280 | |
| 281 // Verifying after removing the trust anchors should now fail. | |
| 282 EXPECT_CALL(trust_provider_, GetAdditionalTrustAnchors()) | |
| 283 .WillOnce(ReturnRef(empty_cert_list_)); | |
| 284 error = cert_verifier_->Verify(cert, "127.0.0.1", 0, NULL, | |
| 285 &verify_result, callback.callback(), | |
| 286 &request_handle, net::BoundNetLog()); | |
| 287 Mock::VerifyAndClearExpectations(&trust_provider_); | |
| 288 // Note: this hits the cached result from the first Verify() in this test. | |
| 289 EXPECT_EQ(net::ERR_CERT_AUTHORITY_INVALID, error); | |
| 290 | |
| 291 // The profile is still tainted. | |
| 292 base::RunLoop().RunUntilIdle(); | |
| 293 EXPECT_TRUE( | |
| 294 profile_->GetPrefs()->GetBoolean(prefs::kUsedPolicyCertificatesOnce)); | |
| 295 } | |
| 296 | |
| 297 } // namespace policy | |
| OLD | NEW |