Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(256)

Side by Side Diff: components/ssl_errors/error_classification_unittest.cc

Issue 1355413003: Move error classification into the ssl_errors component (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: remove size_t / int mixing Created 5 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « components/ssl_errors/error_classification.cc ('k') | no next file » | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
(Empty)
1 // Copyright 2015 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 #include "components/ssl_errors/error_classification.h"
6
7 #include "base/files/file_path.h"
8 #include "base/strings/string_split.h"
9 #include "net/base/net_errors.h"
10 #include "net/base/test_data_directory.h"
11 #include "net/cert/x509_cert_types.h"
12 #include "net/cert/x509_certificate.h"
13 #include "net/test/cert_test_util.h"
14 #include "net/test/test_certificate_data.h"
15 #include "testing/gtest/include/gtest/gtest.h"
16 #include "url/gurl.h"
17
18 class SSLErrorClassificationTest : public testing::Test {};
19
20 TEST_F(SSLErrorClassificationTest, TestNameMismatch) {
21 scoped_refptr<net::X509Certificate> google_cert(
22 net::X509Certificate::CreateFromBytes(
23 reinterpret_cast<const char*>(google_der), sizeof(google_der)));
24 ASSERT_NE(static_cast<net::X509Certificate*>(NULL), google_cert.get());
25 std::vector<std::string> dns_names_google;
26 dns_names_google.push_back("www");
27 dns_names_google.push_back("google");
28 dns_names_google.push_back("com");
29 std::vector<std::vector<std::string>> dns_name_tokens_google;
30 dns_name_tokens_google.push_back(dns_names_google);
31 {
32 GURL origin("https://google.com");
33 std::vector<std::string> host_name_tokens = base::SplitString(
34 origin.host(), ".", base::KEEP_WHITESPACE, base::SPLIT_WANT_ALL);
35 EXPECT_TRUE(ssl_errors::IsWWWSubDomainMatch(origin, *google_cert));
36 EXPECT_FALSE(ssl_errors::NameUnderAnyNames(host_name_tokens,
37 dns_name_tokens_google));
38 EXPECT_FALSE(ssl_errors::AnyNamesUnderName(dns_name_tokens_google,
39 host_name_tokens));
40 EXPECT_FALSE(ssl_errors::IsSubDomainOutsideWildcard(origin, *google_cert));
41 EXPECT_FALSE(
42 ssl_errors::IsCertLikelyFromMultiTenantHosting(origin, *google_cert));
43 EXPECT_TRUE(ssl_errors::IsCertLikelyFromSameDomain(origin, *google_cert));
44 }
45
46 {
47 GURL origin("https://foo.blah.google.com");
48 std::vector<std::string> host_name_tokens = base::SplitString(
49 origin.host(), ".", base::KEEP_WHITESPACE, base::SPLIT_WANT_ALL);
50 EXPECT_FALSE(ssl_errors::IsWWWSubDomainMatch(origin, *google_cert));
51 EXPECT_FALSE(ssl_errors::NameUnderAnyNames(host_name_tokens,
52 dns_name_tokens_google));
53 EXPECT_FALSE(ssl_errors::AnyNamesUnderName(dns_name_tokens_google,
54 host_name_tokens));
55 EXPECT_TRUE(ssl_errors::IsCertLikelyFromSameDomain(origin, *google_cert));
56 }
57
58 {
59 GURL origin("https://foo.www.google.com");
60 std::vector<std::string> host_name_tokens = base::SplitString(
61 origin.host(), ".", base::KEEP_WHITESPACE, base::SPLIT_WANT_ALL);
62 EXPECT_FALSE(ssl_errors::IsWWWSubDomainMatch(origin, *google_cert));
63 EXPECT_TRUE(ssl_errors::NameUnderAnyNames(host_name_tokens,
64 dns_name_tokens_google));
65 EXPECT_FALSE(ssl_errors::AnyNamesUnderName(dns_name_tokens_google,
66 host_name_tokens));
67 EXPECT_TRUE(ssl_errors::IsCertLikelyFromSameDomain(origin, *google_cert));
68 }
69
70 {
71 GURL origin("https://www.google.com.foo");
72 std::vector<std::string> host_name_tokens = base::SplitString(
73 origin.host(), ".", base::KEEP_WHITESPACE, base::SPLIT_WANT_ALL);
74 EXPECT_FALSE(ssl_errors::IsWWWSubDomainMatch(origin, *google_cert));
75 EXPECT_FALSE(ssl_errors::NameUnderAnyNames(host_name_tokens,
76 dns_name_tokens_google));
77 EXPECT_FALSE(ssl_errors::AnyNamesUnderName(dns_name_tokens_google,
78 host_name_tokens));
79 EXPECT_FALSE(ssl_errors::IsCertLikelyFromSameDomain(origin, *google_cert));
80 }
81
82 {
83 GURL origin("https://www.foogoogle.com.");
84 std::vector<std::string> host_name_tokens = base::SplitString(
85 origin.host(), ".", base::KEEP_WHITESPACE, base::SPLIT_WANT_ALL);
86 EXPECT_FALSE(ssl_errors::IsWWWSubDomainMatch(origin, *google_cert));
87 EXPECT_FALSE(ssl_errors::NameUnderAnyNames(host_name_tokens,
88 dns_name_tokens_google));
89 EXPECT_FALSE(ssl_errors::AnyNamesUnderName(dns_name_tokens_google,
90 host_name_tokens));
91 EXPECT_FALSE(ssl_errors::IsCertLikelyFromSameDomain(origin, *google_cert));
92 }
93
94 scoped_refptr<net::X509Certificate> webkit_cert(
95 net::X509Certificate::CreateFromBytes(
96 reinterpret_cast<const char*>(webkit_der), sizeof(webkit_der)));
97 ASSERT_NE(static_cast<net::X509Certificate*>(NULL), webkit_cert.get());
98 std::vector<std::string> dns_names_webkit;
99 dns_names_webkit.push_back("webkit");
100 dns_names_webkit.push_back("org");
101 std::vector<std::vector<std::string>> dns_name_tokens_webkit;
102 dns_name_tokens_webkit.push_back(dns_names_webkit);
103 {
104 GURL origin("https://a.b.webkit.org");
105 std::vector<std::string> host_name_tokens = base::SplitString(
106 origin.host(), ".", base::KEEP_WHITESPACE, base::SPLIT_WANT_ALL);
107 EXPECT_FALSE(ssl_errors::IsWWWSubDomainMatch(origin, *webkit_cert));
108 EXPECT_FALSE(ssl_errors::NameUnderAnyNames(host_name_tokens,
109 dns_name_tokens_webkit));
110 EXPECT_FALSE(ssl_errors::AnyNamesUnderName(dns_name_tokens_webkit,
111 host_name_tokens));
112 EXPECT_TRUE(ssl_errors::IsSubDomainOutsideWildcard(origin, *webkit_cert));
113 EXPECT_FALSE(
114 ssl_errors::IsCertLikelyFromMultiTenantHosting(origin, *webkit_cert));
115 EXPECT_TRUE(ssl_errors::IsCertLikelyFromSameDomain(origin, *webkit_cert));
116 }
117 }
118
119 TEST_F(SSLErrorClassificationTest, TestHostNameHasKnownTLD) {
120 EXPECT_TRUE(ssl_errors::IsHostNameKnownTLD("www.google.com"));
121 EXPECT_TRUE(ssl_errors::IsHostNameKnownTLD("b.appspot.com"));
122 EXPECT_FALSE(ssl_errors::IsHostNameKnownTLD("a.private"));
123 }
124
125 TEST_F(SSLErrorClassificationTest, TestPrivateURL) {
126 EXPECT_FALSE(ssl_errors::IsHostnameNonUniqueOrDotless("www.foogoogle.com."));
127 EXPECT_TRUE(ssl_errors::IsHostnameNonUniqueOrDotless("go"));
128 EXPECT_TRUE(ssl_errors::IsHostnameNonUniqueOrDotless("172.17.108.108"));
129 EXPECT_TRUE(ssl_errors::IsHostnameNonUniqueOrDotless("foo.blah"));
130 }
OLDNEW
« no previous file with comments | « components/ssl_errors/error_classification.cc ('k') | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698