Index: net/cert/nss_cert_database_chromeos_unittest.cc |
diff --git a/net/cert/nss_cert_database_chromeos_unittest.cc b/net/cert/nss_cert_database_chromeos_unittest.cc |
index 465d25dde47d4a3c5bab3665e883eb7ebf13826d..69a970fa5e5afb7ac979045ff49fce0619a7dc04 100644 |
--- a/net/cert/nss_cert_database_chromeos_unittest.cc |
+++ b/net/cert/nss_cert_database_chromeos_unittest.cc |
@@ -9,8 +9,12 @@ |
#include "base/run_loop.h" |
#include "crypto/nss_util.h" |
#include "crypto/nss_util_internal.h" |
+#include "net/base/net_errors.h" |
#include "net/base/test_data_directory.h" |
#include "net/cert/cert_database.h" |
+#include "net/cert/cert_verify_proc.h" |
+#include "net/cert/cert_verify_proc_chromeos.h" |
+#include "net/cert/cert_verify_result.h" |
#include "net/test/cert_test_util.h" |
#include "testing/gtest/include/gtest/gtest.h" |
@@ -57,6 +61,18 @@ class NSSCertDatabaseChromeOSTest : public testing::Test, |
user_2_.username_hash(), |
base::Callback<void(crypto::ScopedPK11Slot)>()))); |
+ verify_proc_default_ = CertVerifyProc::CreateDefault(); |
+ verify_proc_1_ = new CertVerifyProcChromeOS( |
+ crypto::GetPublicSlotForChromeOSUser(user_1_.username_hash()), |
+ crypto::GetPrivateSlotForChromeOSUser( |
+ user_1_.username_hash(), |
+ base::Callback<void(crypto::ScopedPK11Slot)>())); |
+ verify_proc_2_ = new CertVerifyProcChromeOS( |
+ crypto::GetPublicSlotForChromeOSUser(user_2_.username_hash()), |
+ crypto::GetPrivateSlotForChromeOSUser( |
+ user_2_.username_hash(), |
+ base::Callback<void(crypto::ScopedPK11Slot)>())); |
+ |
// Add observer to CertDatabase for checking that notifications from |
// NSSCertDatabaseChromeOS are proxied to the CertDatabase. |
CertDatabase::GetInstance()->AddObserver(this); |
@@ -79,6 +95,21 @@ class NSSCertDatabaseChromeOSTest : public testing::Test, |
added_ca_.push_back(cert ? cert->os_cert_handle() : NULL); |
} |
+ int Verify(CertVerifyProc* verify_proc, |
+ X509Certificate* cert, |
+ const std::string& hostname) { |
+ int flags = 0; |
+ CertVerifyResult verify_result; |
+ CertificateList additional_trust_anchors; |
+ int error = verify_proc->Verify(cert, |
+ hostname, |
+ flags, |
+ NULL, |
+ additional_trust_anchors, |
+ &verify_result); |
+ return error; |
+ } |
+ |
protected: |
bool observer_added_; |
// Certificates that were passed to the CertDatabase observers. |
@@ -89,6 +120,9 @@ class NSSCertDatabaseChromeOSTest : public testing::Test, |
crypto::ScopedTestNSSChromeOSUser user_2_; |
scoped_ptr<NSSCertDatabaseChromeOS> db_1_; |
scoped_ptr<NSSCertDatabaseChromeOS> db_2_; |
+ scoped_refptr<CertVerifyProc> verify_proc_default_; |
+ scoped_refptr<CertVerifyProc> verify_proc_1_; |
+ scoped_refptr<CertVerifyProc> verify_proc_2_; |
}; |
// Test that ListModules() on each user includes that user's NSS software slot, |
@@ -133,7 +167,7 @@ TEST_F(NSSCertDatabaseChromeOSTest, ImportCACerts) { |
CertificateList certs_2 = |
CreateCertificateListFromFile(GetTestCertsDirectory(), |
- "2048-rsa-root.pem", |
+ "2048-rsa-intermediate.pem", |
X509Certificate::FORMAT_AUTO); |
ASSERT_EQ(1U, certs_2.size()); |
@@ -161,6 +195,35 @@ TEST_F(NSSCertDatabaseChromeOSTest, ImportCACerts) { |
EXPECT_TRUE(IsCertInCertificateList(certs_2[0], user_2_certlist)); |
EXPECT_FALSE(IsCertInCertificateList(certs_2[0], user_1_certlist)); |
+ // Load matching server certs for testing trust. |
+ CertificateList server_cert_1 = CreateCertificateListFromFile( |
+ GetTestCertsDirectory(), "ok_cert.pem", |
+ X509Certificate::FORMAT_AUTO); |
+ ASSERT_EQ(1U, server_cert_1.size()); |
+ CertificateList server_cert_2 = CreateCertificateListFromFile( |
+ GetTestCertsDirectory(), "2048-rsa-ee-by-2048-rsa-intermediate.pem", |
+ X509Certificate::FORMAT_AUTO); |
+ ASSERT_EQ(1U, server_cert_1.size()); |
+ |
+ // Imported CA certs are not trusted by default verifier. |
+ EXPECT_EQ( |
+ ERR_CERT_REVOKED, |
+ Verify(verify_proc_default_.get(), server_cert_1[0].get(), "127.0.0.1")); |
+ EXPECT_EQ( |
+ ERR_CERT_REVOKED, |
+ Verify(verify_proc_default_.get(), server_cert_2[0].get(), "127.0.0.1")); |
+ |
+ // Trust applies only to the user that imported the CA. |
+ EXPECT_EQ(OK, |
+ Verify(verify_proc_1_.get(), server_cert_1[0].get(), "127.0.0.1")); |
+ EXPECT_EQ(ERR_CERT_REVOKED, |
+ Verify(verify_proc_1_.get(), server_cert_2[0].get(), "127.0.0.1")); |
+ |
+ EXPECT_EQ(ERR_CERT_REVOKED, |
+ Verify(verify_proc_2_.get(), server_cert_1[0].get(), "127.0.0.1")); |
+ EXPECT_EQ(OK, |
+ Verify(verify_proc_2_.get(), server_cert_2[0].get(), "127.0.0.1")); |
+ |
// Run the message loop so the observer notifications get processed. |
base::RunLoop().RunUntilIdle(); |
// Should have gotten two OnCACertChanged notifications. |