Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(168)

Unified Diff: components/cronet/android/test/javatests/src/org/chromium/net/PkpTest.java

Issue 1407263010: [Cronet] Public key pinning for Java API (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Small changes and rebase Created 5 years ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: components/cronet/android/test/javatests/src/org/chromium/net/PkpTest.java
diff --git a/components/cronet/android/test/javatests/src/org/chromium/net/PkpTest.java b/components/cronet/android/test/javatests/src/org/chromium/net/PkpTest.java
new file mode 100644
index 0000000000000000000000000000000000000000..b810c65660f5534ec51b18555914086fc32a672e
--- /dev/null
+++ b/components/cronet/android/test/javatests/src/org/chromium/net/PkpTest.java
@@ -0,0 +1,429 @@
+// Copyright 2015 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+package org.chromium.net;
+
+import android.test.suitebuilder.annotation.SmallTest;
+
+import org.chromium.base.test.util.Feature;
+import org.chromium.net.test.util.CertTestUtil;
+
+import java.io.ByteArrayInputStream;
+import java.security.cert.CertificateFactory;
+import java.security.cert.X509Certificate;
+import java.util.Arrays;
+import java.util.Calendar;
+import java.util.Date;
+import java.util.HashSet;
+import java.util.Set;
+
+/**
+ * Public-Key-Pinning tests of Cronet Java API.
+ */
+public class PkpTest extends CronetTestBase {
+ private static final String CERT_USED = "quic_test.example.com.crt";
+ private static final String[] CERTS_USED = {CERT_USED};
+ private static final int DISTANT_FUTURE = Integer.MAX_VALUE;
+ private static final boolean INCLUDE_SUBDOMAINS = true;
+ private static final boolean EXCLUDE_SUBDOMAINS = false;
+
+ private CronetTestFramework mTestFramework;
+ private CronetEngine.Builder mBuilder;
+ private TestUrlRequestCallback mListener;
+ private String mServerUrl; // https://test.example.com:6121
+ private String mServerHost; // test.example.com
+ private String mDomain; // example.com
+
+ @Override
+ protected void setUp() throws Exception {
+ super.setUp();
+ // Start QUIC Test Server
+ System.loadLibrary("cronet_tests");
+ QuicTestServer.startQuicTestServer(getContext());
+ mServerUrl = QuicTestServer.getServerURL();
+ mServerHost = QuicTestServer.getServerHost();
+ mDomain = mServerHost.substring(mServerHost.indexOf('.') + 1, mServerHost.length());
+ createCronetEngineBuilder();
+ }
+
+ @Override
+ protected void tearDown() throws Exception {
+ QuicTestServer.shutdownQuicTestServer();
+ shutdownCronetEngine();
+ super.tearDown();
+ }
+
+ /**
+ * Tests the case when the pin hash does not match. The client is expected to
+ * receive the error response.
+ *
+ * @throws Exception
+ */
+ @SmallTest
+ @Feature({"Cronet"})
+ public void testErrorCodeIfPinDoesNotMatch() throws Exception {
+ byte[] nonMatchingHash = generateSomeSha256();
+ addPkpSha256(mServerHost, nonMatchingHash, EXCLUDE_SUBDOMAINS, DISTANT_FUTURE);
+ startCronetFramework();
+ registerHostResolver();
+ sendRequestAndWaitForResult();
+
+ assertErrorResponse();
+ }
+
+ /**
+ * Tests the case when the pin hash matches. The client is expected to
+ * receive the successful response with the response code 200.
+ *
+ * @throws Exception
+ */
+ @SmallTest
+ @Feature({"Cronet"})
+ public void testSuccessIfPinMatches() throws Exception {
+ // Get PKP hash of the real certificate
+ X509Certificate cert = readCertFromFileInPemFormat(CERT_USED);
+ byte[] matchingHash = CertTestUtil.getPublicKeySha256(cert);
+
+ addPkpSha256(mServerHost, matchingHash, EXCLUDE_SUBDOMAINS, DISTANT_FUTURE);
+ startCronetFramework();
+ registerHostResolver();
+ sendRequestAndWaitForResult();
+
+ assertSuccessfulResponse();
+ }
+
+ /**
+ * Tests the case when the pin hash does not match and the client accesses the subdomain of
+ * the configured PKP host with includeSubdomains flag set to true. The client is
+ * expected to receive the error response.
+ *
+ * @throws Exception
+ */
+ @SmallTest
+ @Feature({"Cronet"})
+ public void testIncludeSubdomainsFlagEqualTrue() throws Exception {
+ byte[] nonMatchingHash = generateSomeSha256();
+ addPkpSha256(mDomain, nonMatchingHash, INCLUDE_SUBDOMAINS, DISTANT_FUTURE);
+ startCronetFramework();
+ registerHostResolver();
+ sendRequestAndWaitForResult();
+
+ assertErrorResponse();
+ }
+
+ /**
+ * Tests the case when the pin hash does not match and the client accesses the subdomain of
+ * the configured PKP host with includeSubdomains flag set to false. The client is expected to
+ * receive the successful response with the response code 200.
+ *
+ * @throws Exception
+ */
+ @SmallTest
+ @Feature({"Cronet"})
+ public void testIncludeSubdomainsFlagEqualFalse() throws Exception {
+ byte[] nonMatchingHash = generateSomeSha256();
+ addPkpSha256(mDomain, nonMatchingHash, EXCLUDE_SUBDOMAINS, DISTANT_FUTURE);
+ startCronetFramework();
+ registerHostResolver();
+ sendRequestAndWaitForResult();
+
+ assertSuccessfulResponse();
+ }
+
+ /**
+ * Tests the case when the mismatching pin is set for some host that is different from the one
+ * the client wants to access. In that case the other host pinning policy should not be applied
+ * and the client is expected to receive the successful response with the response code 200.
+ *
+ * @throws Exception
+ */
+ @SmallTest
+ @Feature({"Cronet"})
+ public void testSuccessIfNoPinSpecified() throws Exception {
+ byte[] nonMatchingHash = generateSomeSha256();
+ addPkpSha256("otherhost.com", nonMatchingHash, INCLUDE_SUBDOMAINS, DISTANT_FUTURE);
+ startCronetFramework();
+ registerHostResolver();
+ sendRequestAndWaitForResult();
+
+ assertSuccessfulResponse();
+ }
+
+ /**
+ * Tests mismatching pins that will expire in 10 seconds. The pins should be still valid and
+ * enforced during the request; thus returning PIN mismatch error.
+ *
+ * @throws Exception
+ */
+ @SmallTest
+ @Feature({"Cronet"})
+ public void testSoonExpiringPin() throws Exception {
+ final int tenSecondsAhead = 10;
+ byte[] nonMatchingHash = generateSomeSha256();
+ addPkpSha256(mServerHost, nonMatchingHash, EXCLUDE_SUBDOMAINS, tenSecondsAhead);
+ startCronetFramework();
+ registerHostResolver();
+ sendRequestAndWaitForResult();
+
+ assertErrorResponse();
+ }
+
+ /**
+ * Tests mismatching pins that expired 1 second ago. Since the pins have expired, they
+ * should not be enforced during the request; thus a successful response is expected.
+ *
+ * @throws Exception
+ */
+ @SmallTest
+ @Feature({"Cronet"})
+ public void testRecentlyExpiredPin() throws Exception {
+ final int oneSecondAgo = -1;
+ byte[] nonMatchingHash = generateSomeSha256();
+ addPkpSha256(mServerHost, nonMatchingHash, EXCLUDE_SUBDOMAINS, oneSecondAgo);
+ startCronetFramework();
+ registerHostResolver();
+ sendRequestAndWaitForResult();
+
+ assertSuccessfulResponse();
+ }
+
+ /**
+ * Tests that host pinning is not persisted between multiple CronetEngine instances.
+ *
+ * @throws Exception
+ */
+ @SmallTest
+ @Feature({"Cronet"})
+ public void testPinsAreNotPersisted() throws Exception {
+ byte[] nonMatchingHash = generateSomeSha256();
+ addPkpSha256(mServerHost, nonMatchingHash, EXCLUDE_SUBDOMAINS, DISTANT_FUTURE);
+ startCronetFramework();
+ registerHostResolver();
+ sendRequestAndWaitForResult();
+ assertErrorResponse();
+ shutdownCronetEngine();
+
+ // Restart Cronet engine and try the same request again. Since the pins are not persisted,
+ // a successful response is expected.
+ createCronetEngineBuilder();
+ startCronetFramework();
+ registerHostResolver();
+ sendRequestAndWaitForResult();
+ assertSuccessfulResponse();
+ }
+
+ /**
+ * Tests that the client receives {@code InvalidArgumentException} when the pinned host name
+ * is invalid.
+ *
+ * @throws Exception
+ */
+ @SmallTest
+ @Feature({"Cronet"})
+ public void testHostNameArgumentValidation() throws Exception {
+ final String label63 = "123456789-123456789-123456789-123456789-123456789-123456789-123";
+ final String host255 = label63 + "." + label63 + "." + label63 + "." + label63;
+ // Valid host names.
+ assertNoExceptionWhenHostNameIsValid("domain.com");
+ assertNoExceptionWhenHostNameIsValid("my-domain.com");
+ assertNoExceptionWhenHostNameIsValid("section4.domain.info");
+ assertNoExceptionWhenHostNameIsValid("44.domain44.info");
+ assertNoExceptionWhenHostNameIsValid("very.long.long.long.long.long.long.long.domain.com");
+ assertNoExceptionWhenHostNameIsValid("host");
+ assertNoExceptionWhenHostNameIsValid("новости.ру");
+ assertNoExceptionWhenHostNameIsValid("самые-последние.новости.рус");
+ assertNoExceptionWhenHostNameIsValid("最新消息.中国");
+ // Checks max size of the host label (63 characters)
+ assertNoExceptionWhenHostNameIsValid(label63 + ".com");
+ // Checks max size of the host name (255 characters)
+ assertNoExceptionWhenHostNameIsValid(host255);
+ assertNoExceptionWhenHostNameIsValid("127.0.0.z");
+
+ // Invalid host names.
+ assertExceptionWhenHostNameIsInvalid("domain.com:300");
+ assertExceptionWhenHostNameIsInvalid("-domain.com");
+ assertExceptionWhenHostNameIsInvalid("domain-.com");
+ assertExceptionWhenHostNameIsInvalid("http://domain.com");
+ assertExceptionWhenHostNameIsInvalid("domain.com:");
+ assertExceptionWhenHostNameIsInvalid("domain.com/");
+ assertExceptionWhenHostNameIsInvalid("новости.ру:");
+ assertExceptionWhenHostNameIsInvalid("новости.ру/");
+ assertExceptionWhenHostNameIsInvalid("_http.sctp.www.example.com");
+ assertExceptionWhenHostNameIsInvalid("http.sctp._www.example.com");
+ // Checks a host that exceeds max allowed length of the host label (63 characters)
+ assertExceptionWhenHostNameIsInvalid(label63 + "4.com");
+ // Checks a host that exceeds max allowed length of hostname (255 characters)
+ assertExceptionWhenHostNameIsInvalid(host255.substring(3) + ".com");
+ assertExceptionWhenHostNameIsInvalid("FE80:0000:0000:0000:0202:B3FF:FE1E:8329");
+ assertExceptionWhenHostNameIsInvalid("[2001:db8:0:1]:80");
+
+ // Invalid host names for PKP that contain IPv4 addresses
+ // or names with digits and dots only.
+ assertExceptionWhenHostNameIsInvalid("127.0.0.1");
+ assertExceptionWhenHostNameIsInvalid("68.44.222.12");
+ assertExceptionWhenHostNameIsInvalid("256.0.0.1");
+ assertExceptionWhenHostNameIsInvalid("127.0.0.1.1");
+ assertExceptionWhenHostNameIsInvalid("127.0.0");
+ assertExceptionWhenHostNameIsInvalid("127.0.0.");
+ assertExceptionWhenHostNameIsInvalid("127.0.0.299");
+ }
+
+ /**
+ * Tests that NullPointerException is thrown if the host name or the collection of pins or
+ * the expiration date is null.
+ */
+ @SmallTest
+ @Feature({"Cronet"})
+ public void testNullArguments() {
+ verifyExceptionWhenAddPkpArgumentIsNull(true, false, false);
+ verifyExceptionWhenAddPkpArgumentIsNull(false, true, false);
+ verifyExceptionWhenAddPkpArgumentIsNull(false, false, true);
+ verifyExceptionWhenAddPkpArgumentIsNull(false, false, false);
+ }
+
+ /**
+ * Tests that IllegalArgumentException is thrown if SHA1 is passed as the value of a pin.
+ */
+ @SmallTest
+ @Feature({"Cronet"})
+ public void testIllegalArgumentExceptionWhenPinValueIsSHA1() {
+ byte[] sha1 = new byte[20];
+ try {
+ addPkpSha256(mServerHost, sha1, EXCLUDE_SUBDOMAINS, DISTANT_FUTURE);
+ } catch (IllegalArgumentException ex) {
+ // Expected exception
+ return;
+ }
+ fail("Expected IllegalArgumentException with pin value: " + Arrays.toString(sha1));
+ }
+
+ /**
+ * Asserts that the response from the server contains an PKP error.
+ * TODO(kapishnikov): currently QUIC returns ERR_QUIC_PROTOCOL_ERROR instead of expected
+ * ERR_SSL_PINNED_KEY_NOT_IN_CERT_CHAIN error code when the pin doesn't match.
+ * This method should be changed when the bug is resolved. See http://crbug.com/548378
+ */
+ private void assertErrorResponse() {
+ assertNotNull("Expected an error", mListener.mError);
+ int errorCode = mListener.mError.netError();
+ boolean correctErrorCode = errorCode == NetError.ERR_SSL_PINNED_KEY_NOT_IN_CERT_CHAIN
+ || errorCode == NetError.ERR_QUIC_PROTOCOL_ERROR;
+ assertTrue(String.format("Incorrect error code. Expected %s or %s but received %s",
+ NetError.ERR_SSL_PINNED_KEY_NOT_IN_CERT_CHAIN,
+ NetError.ERR_QUIC_PROTOCOL_ERROR, errorCode),
+ correctErrorCode);
+ }
+
+ /**
+ * Asserts a successful response with response code 200.
+ */
+ private void assertSuccessfulResponse() {
+ if (mListener.mError != null) {
+ fail("Did not expect an error but got error code " + mListener.mError.mNetError);
+ }
+ assertNotNull("Expected non-null response from the server", mListener.mResponseInfo);
+ assertEquals(200, mListener.mResponseInfo.getHttpStatusCode());
+ }
+
+ private void createCronetEngineBuilder() {
+ // Set common CronetEngine parameters
+ mBuilder = new CronetEngine.Builder(getContext());
+ mBuilder.enableQUIC(true);
+ mBuilder.addQuicHint(QuicTestServer.getServerHost(), QuicTestServer.getServerPort(),
+ QuicTestServer.getServerPort());
+ mBuilder.setStoragePath(CronetTestFramework.getTestStorage(getContext()));
+ mBuilder.enableHttpCache(CronetEngine.Builder.HTTP_CACHE_DISK_NO_HTTP, 1000 * 1024);
+ mBuilder.setMockCertVerifierForTesting(MockCertVerifier.createMockCertVerifier(CERTS_USED));
+ }
+
+ private void startCronetFramework() {
+ mTestFramework = startCronetTestFrameworkWithUrlAndCronetEngineBuilder(null, mBuilder);
+ }
+
+ private void shutdownCronetEngine() {
+ if (mTestFramework != null && mTestFramework.mCronetEngine != null) {
+ mTestFramework.mCronetEngine.shutdown();
+ }
+ }
+
+ private void registerHostResolver() {
+ long urlRequestContextAdapter = ((CronetUrlRequestContext) mTestFramework.mCronetEngine)
+ .getUrlRequestContextAdapter();
+ NativeTestServer.registerHostResolverProc(urlRequestContextAdapter, false);
+ }
+
+ private byte[] generateSomeSha256() {
+ byte[] sha256 = new byte[32];
+ Arrays.fill(sha256, (byte) 58);
+ return sha256;
+ }
+
+ private void addPkpSha256(
+ String host, byte[] pinHashValue, boolean includeSubdomain, int maxAgeInSec) {
+ Set<byte[]> hashes = new HashSet<>();
+ hashes.add(pinHashValue);
+ mBuilder.addPublicKeyPins(host, hashes, includeSubdomain, dateInFuture(maxAgeInSec));
+ }
+
+ private void sendRequestAndWaitForResult() {
+ mListener = new TestUrlRequestCallback();
+
+ String quicURL = mServerUrl + "/simple.txt";
+ UrlRequest.Builder requestBuilder = new UrlRequest.Builder(
+ quicURL, mListener, mListener.getExecutor(), mTestFramework.mCronetEngine);
+ requestBuilder.build().start();
+ mListener.blockForDone();
+ }
+
+ private X509Certificate readCertFromFileInPemFormat(String certFileName) throws Exception {
+ byte[] certDer = CertTestUtil.pemToDer(CertTestUtil.CERTS_DIRECTORY + certFileName);
+ CertificateFactory certFactory = CertificateFactory.getInstance("X.509");
+ return (X509Certificate) certFactory.generateCertificate(new ByteArrayInputStream(certDer));
+ }
+
+ private Date dateInFuture(int secondsIntoFuture) {
+ Calendar cal = Calendar.getInstance();
+ cal.add(Calendar.SECOND, secondsIntoFuture);
+ return cal.getTime();
+ }
+
+ private void assertNoExceptionWhenHostNameIsValid(String hostName) {
+ try {
+ addPkpSha256(hostName, generateSomeSha256(), INCLUDE_SUBDOMAINS, DISTANT_FUTURE);
+ } catch (IllegalArgumentException ex) {
+ fail("Host name " + hostName + " should be valid but the exception was thrown: "
+ + ex.toString());
+ }
+ }
+
+ private void assertExceptionWhenHostNameIsInvalid(String hostName) {
+ try {
+ addPkpSha256(hostName, generateSomeSha256(), INCLUDE_SUBDOMAINS, DISTANT_FUTURE);
+ } catch (IllegalArgumentException ex) {
+ // Expected exception.
+ return;
+ }
+ fail("Expected IllegalArgumentException when passing " + hostName + " host name");
+ }
+
+ private void verifyExceptionWhenAddPkpArgumentIsNull(
+ boolean hostNameIsNull, boolean pinsAreNull, boolean expirationDataIsNull) {
+ String hostName = hostNameIsNull ? null : "some-host.com";
+ Set<byte[]> pins = pinsAreNull ? null : new HashSet<byte[]>();
+ Date expirationDate = expirationDataIsNull ? null : new Date();
+
+ boolean shouldThrowNpe = hostNameIsNull || pinsAreNull || expirationDataIsNull;
+ try {
+ mBuilder.addPublicKeyPins(hostName, pins, INCLUDE_SUBDOMAINS, expirationDate);
+ } catch (NullPointerException ex) {
+ if (!shouldThrowNpe) {
+ fail("Null pointer exception was not expected: " + ex.toString());
+ }
+ return;
+ }
+ if (shouldThrowNpe) {
+ fail("NullPointerException was expected");
+ }
+ }
+}
« no previous file with comments | « components/cronet/android/cronet_url_request_context_adapter.cc ('k') | components/cronet/android/test/mock_cert_verifier.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698