| OLD | NEW |
| 1 // Copyright (c) 2009 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2009 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "net/ssl/ssl_client_auth_cache.h" | 5 #include "net/ssl/ssl_client_auth_cache.h" |
| 6 | 6 |
| 7 #include "base/time/time.h" | 7 #include "base/time/time.h" |
| 8 #include "net/cert/x509_certificate.h" | 8 #include "net/cert/x509_certificate.h" |
| 9 #include "net/ssl/ssl_private_key.h" |
| 9 #include "testing/gtest/include/gtest/gtest.h" | 10 #include "testing/gtest/include/gtest/gtest.h" |
| 10 | 11 |
| 11 namespace net { | 12 namespace net { |
| 12 | 13 |
| 14 class MockSSLPrivateKey : public SSLPrivateKey { |
| 15 public: |
| 16 MockSSLPrivateKey() {} |
| 17 |
| 18 Type GetType() override { return Type::RSA; } |
| 19 |
| 20 std::vector<SSLPrivateKey::Hash> GetDigestPreferences() override { |
| 21 NOTIMPLEMENTED(); |
| 22 return std::vector<SSLPrivateKey::Hash>(); |
| 23 } |
| 24 |
| 25 size_t GetMaxSignatureLengthInBytes() override { |
| 26 NOTIMPLEMENTED(); |
| 27 return 0; |
| 28 } |
| 29 |
| 30 void SignDigest(Hash hash, |
| 31 const base::StringPiece& input, |
| 32 const SignCallback& callback) override { |
| 33 NOTIMPLEMENTED(); |
| 34 } |
| 35 |
| 36 private: |
| 37 ~MockSSLPrivateKey() override {} |
| 38 |
| 39 DISALLOW_COPY_AND_ASSIGN(MockSSLPrivateKey); |
| 40 }; |
| 41 |
| 13 TEST(SSLClientAuthCacheTest, LookupAddRemove) { | 42 TEST(SSLClientAuthCacheTest, LookupAddRemove) { |
| 14 SSLClientAuthCache cache; | 43 SSLClientAuthCache cache; |
| 15 | 44 |
| 16 base::Time start_date = base::Time::Now(); | 45 base::Time start_date = base::Time::Now(); |
| 17 base::Time expiration_date = start_date + base::TimeDelta::FromDays(1); | 46 base::Time expiration_date = start_date + base::TimeDelta::FromDays(1); |
| 18 | 47 |
| 19 HostPortPair server1("foo1", 443); | 48 HostPortPair server1("foo1", 443); |
| 20 scoped_refptr<X509Certificate> cert1( | 49 scoped_refptr<X509Certificate> cert1( |
| 21 new X509Certificate("foo1", "CA", start_date, expiration_date)); | 50 new X509Certificate("foo1", "CA", start_date, expiration_date)); |
| 22 | 51 |
| 23 HostPortPair server2("foo2", 443); | 52 HostPortPair server2("foo2", 443); |
| 24 scoped_refptr<X509Certificate> cert2( | 53 scoped_refptr<X509Certificate> cert2( |
| 25 new X509Certificate("foo2", "CA", start_date, expiration_date)); | 54 new X509Certificate("foo2", "CA", start_date, expiration_date)); |
| 26 | 55 |
| 27 HostPortPair server3("foo3", 443); | 56 HostPortPair server3("foo3", 443); |
| 28 scoped_refptr<X509Certificate> cert3( | 57 scoped_refptr<X509Certificate> cert3( |
| 29 new X509Certificate("foo3", "CA", start_date, expiration_date)); | 58 new X509Certificate("foo3", "CA", start_date, expiration_date)); |
| 30 | 59 |
| 31 scoped_refptr<X509Certificate> cached_cert; | 60 scoped_refptr<X509Certificate> cached_cert; |
| 61 scoped_refptr<SSLPrivateKey> cached_pkey; |
| 32 // Lookup non-existent client certificate. | 62 // Lookup non-existent client certificate. |
| 33 cached_cert = NULL; | 63 cached_cert = NULL; |
| 34 EXPECT_FALSE(cache.Lookup(server1, &cached_cert)); | 64 EXPECT_FALSE(cache.Lookup(server1, &cached_cert, &cached_pkey)); |
| 35 | 65 |
| 36 // Add client certificate for server1. | 66 // Add client certificate for server1. |
| 37 cache.Add(server1, cert1.get()); | 67 cache.Add(server1, cert1.get(), new MockSSLPrivateKey); |
| 38 cached_cert = NULL; | 68 cached_cert = NULL; |
| 39 EXPECT_TRUE(cache.Lookup(server1, &cached_cert)); | 69 EXPECT_TRUE(cache.Lookup(server1, &cached_cert, &cached_pkey)); |
| 40 EXPECT_EQ(cert1, cached_cert); | 70 EXPECT_EQ(cert1, cached_cert); |
| 41 | 71 |
| 42 // Add client certificate for server2. | 72 // Add client certificate for server2. |
| 43 cache.Add(server2, cert2.get()); | 73 cache.Add(server2, cert2.get(), new MockSSLPrivateKey); |
| 44 cached_cert = NULL; | 74 cached_cert = NULL; |
| 45 EXPECT_TRUE(cache.Lookup(server1, &cached_cert)); | 75 EXPECT_TRUE(cache.Lookup(server1, &cached_cert, &cached_pkey)); |
| 46 EXPECT_EQ(cert1.get(), cached_cert.get()); | 76 EXPECT_EQ(cert1.get(), cached_cert.get()); |
| 47 cached_cert = NULL; | 77 cached_cert = NULL; |
| 48 EXPECT_TRUE(cache.Lookup(server2, &cached_cert)); | 78 EXPECT_TRUE(cache.Lookup(server2, &cached_cert, &cached_pkey)); |
| 49 EXPECT_EQ(cert2, cached_cert); | 79 EXPECT_EQ(cert2, cached_cert); |
| 50 | 80 |
| 51 // Overwrite the client certificate for server1. | 81 // Overwrite the client certificate for server1. |
| 52 cache.Add(server1, cert3.get()); | 82 cache.Add(server1, cert3.get(), new MockSSLPrivateKey); |
| 53 cached_cert = NULL; | 83 cached_cert = NULL; |
| 54 EXPECT_TRUE(cache.Lookup(server1, &cached_cert)); | 84 EXPECT_TRUE(cache.Lookup(server1, &cached_cert, &cached_pkey)); |
| 55 EXPECT_EQ(cert3, cached_cert); | 85 EXPECT_EQ(cert3, cached_cert); |
| 56 cached_cert = NULL; | 86 cached_cert = NULL; |
| 57 EXPECT_TRUE(cache.Lookup(server2, &cached_cert)); | 87 EXPECT_TRUE(cache.Lookup(server2, &cached_cert, &cached_pkey)); |
| 58 EXPECT_EQ(cert2, cached_cert); | 88 EXPECT_EQ(cert2, cached_cert); |
| 59 | 89 |
| 60 // Remove client certificate of server1. | 90 // Remove client certificate of server1. |
| 61 cache.Remove(server1); | 91 cache.Remove(server1); |
| 62 cached_cert = NULL; | 92 cached_cert = NULL; |
| 63 EXPECT_FALSE(cache.Lookup(server1, &cached_cert)); | 93 EXPECT_FALSE(cache.Lookup(server1, &cached_cert, &cached_pkey)); |
| 64 cached_cert = NULL; | 94 cached_cert = NULL; |
| 65 EXPECT_TRUE(cache.Lookup(server2, &cached_cert)); | 95 EXPECT_TRUE(cache.Lookup(server2, &cached_cert, &cached_pkey)); |
| 66 EXPECT_EQ(cert2, cached_cert); | 96 EXPECT_EQ(cert2, cached_cert); |
| 67 | 97 |
| 68 // Remove non-existent client certificate. | 98 // Remove non-existent client certificate. |
| 69 cache.Remove(server1); | 99 cache.Remove(server1); |
| 70 cached_cert = NULL; | 100 cached_cert = NULL; |
| 71 EXPECT_FALSE(cache.Lookup(server1, &cached_cert)); | 101 EXPECT_FALSE(cache.Lookup(server1, &cached_cert, &cached_pkey)); |
| 72 cached_cert = NULL; | 102 cached_cert = NULL; |
| 73 EXPECT_TRUE(cache.Lookup(server2, &cached_cert)); | 103 EXPECT_TRUE(cache.Lookup(server2, &cached_cert, &cached_pkey)); |
| 74 EXPECT_EQ(cert2, cached_cert); | 104 EXPECT_EQ(cert2, cached_cert); |
| 75 } | 105 } |
| 76 | 106 |
| 77 // Check that if the server differs only by port number, it is considered | 107 // Check that if the server differs only by port number, it is considered |
| 78 // a separate server. | 108 // a separate server. |
| 79 TEST(SSLClientAuthCacheTest, LookupWithPort) { | 109 TEST(SSLClientAuthCacheTest, LookupWithPort) { |
| 80 SSLClientAuthCache cache; | 110 SSLClientAuthCache cache; |
| 81 | 111 |
| 82 base::Time start_date = base::Time::Now(); | 112 base::Time start_date = base::Time::Now(); |
| 83 base::Time expiration_date = start_date + base::TimeDelta::FromDays(1); | 113 base::Time expiration_date = start_date + base::TimeDelta::FromDays(1); |
| 84 | 114 |
| 85 HostPortPair server1("foo", 443); | 115 HostPortPair server1("foo", 443); |
| 86 scoped_refptr<X509Certificate> cert1( | 116 scoped_refptr<X509Certificate> cert1( |
| 87 new X509Certificate("foo", "CA", start_date, expiration_date)); | 117 new X509Certificate("foo", "CA", start_date, expiration_date)); |
| 88 | 118 |
| 89 HostPortPair server2("foo", 8443); | 119 HostPortPair server2("foo", 8443); |
| 90 scoped_refptr<X509Certificate> cert2( | 120 scoped_refptr<X509Certificate> cert2( |
| 91 new X509Certificate("foo", "CA", start_date, expiration_date)); | 121 new X509Certificate("foo", "CA", start_date, expiration_date)); |
| 92 | 122 |
| 93 cache.Add(server1, cert1.get()); | 123 cache.Add(server1, cert1.get(), new MockSSLPrivateKey); |
| 94 cache.Add(server2, cert2.get()); | 124 cache.Add(server2, cert2.get(), new MockSSLPrivateKey); |
| 95 | 125 |
| 96 scoped_refptr<X509Certificate> cached_cert; | 126 scoped_refptr<X509Certificate> cached_cert; |
| 97 EXPECT_TRUE(cache.Lookup(server1, &cached_cert)); | 127 scoped_refptr<SSLPrivateKey> cached_pkey; |
| 128 EXPECT_TRUE(cache.Lookup(server1, &cached_cert, &cached_pkey)); |
| 98 EXPECT_EQ(cert1.get(), cached_cert.get()); | 129 EXPECT_EQ(cert1.get(), cached_cert.get()); |
| 99 EXPECT_TRUE(cache.Lookup(server2, &cached_cert)); | 130 EXPECT_TRUE(cache.Lookup(server2, &cached_cert, &cached_pkey)); |
| 100 EXPECT_EQ(cert2.get(), cached_cert.get()); | 131 EXPECT_EQ(cert2.get(), cached_cert.get()); |
| 101 } | 132 } |
| 102 | 133 |
| 103 // Check that the a NULL certificate, indicating the user has declined to send | 134 // Check that the a NULL certificate, indicating the user has declined to send |
| 104 // a certificate, is properly cached. | 135 // a certificate, is properly cached. |
| 105 TEST(SSLClientAuthCacheTest, LookupNullPreference) { | 136 TEST(SSLClientAuthCacheTest, LookupNullPreference) { |
| 106 SSLClientAuthCache cache; | 137 SSLClientAuthCache cache; |
| 107 base::Time start_date = base::Time::Now(); | 138 base::Time start_date = base::Time::Now(); |
| 108 base::Time expiration_date = start_date + base::TimeDelta::FromDays(1); | 139 base::Time expiration_date = start_date + base::TimeDelta::FromDays(1); |
| 109 | 140 |
| 110 HostPortPair server1("foo", 443); | 141 HostPortPair server1("foo", 443); |
| 111 scoped_refptr<X509Certificate> cert1( | 142 scoped_refptr<X509Certificate> cert1( |
| 112 new X509Certificate("foo", "CA", start_date, expiration_date)); | 143 new X509Certificate("foo", "CA", start_date, expiration_date)); |
| 113 | 144 |
| 114 cache.Add(server1, NULL); | 145 cache.Add(server1, NULL, new MockSSLPrivateKey); |
| 115 | 146 |
| 116 scoped_refptr<X509Certificate> cached_cert(cert1); | 147 scoped_refptr<X509Certificate> cached_cert(cert1); |
| 148 scoped_refptr<SSLPrivateKey> cached_pkey; |
| 117 // Make sure that |cached_cert| is updated to NULL, indicating the user | 149 // Make sure that |cached_cert| is updated to NULL, indicating the user |
| 118 // declined to send a certificate to |server1|. | 150 // declined to send a certificate to |server1|. |
| 119 EXPECT_TRUE(cache.Lookup(server1, &cached_cert)); | 151 EXPECT_TRUE(cache.Lookup(server1, &cached_cert, &cached_pkey)); |
| 120 EXPECT_EQ(NULL, cached_cert.get()); | 152 EXPECT_EQ(NULL, cached_cert.get()); |
| 121 | 153 |
| 122 // Remove the existing cached certificate. | 154 // Remove the existing cached certificate. |
| 123 cache.Remove(server1); | 155 cache.Remove(server1); |
| 124 cached_cert = NULL; | 156 cached_cert = NULL; |
| 125 EXPECT_FALSE(cache.Lookup(server1, &cached_cert)); | 157 EXPECT_FALSE(cache.Lookup(server1, &cached_cert, &cached_pkey)); |
| 126 | 158 |
| 127 // Add a new preference for a specific certificate. | 159 // Add a new preference for a specific certificate. |
| 128 cache.Add(server1, cert1.get()); | 160 cache.Add(server1, cert1.get(), new MockSSLPrivateKey); |
| 129 cached_cert = NULL; | 161 cached_cert = NULL; |
| 130 EXPECT_TRUE(cache.Lookup(server1, &cached_cert)); | 162 EXPECT_TRUE(cache.Lookup(server1, &cached_cert, &cached_pkey)); |
| 131 EXPECT_EQ(cert1, cached_cert); | 163 EXPECT_EQ(cert1, cached_cert); |
| 132 | 164 |
| 133 // Replace the specific preference with a NULL certificate. | 165 // Replace the specific preference with a NULL certificate. |
| 134 cache.Add(server1, NULL); | 166 cache.Add(server1, NULL, new MockSSLPrivateKey); |
| 135 cached_cert = NULL; | 167 cached_cert = NULL; |
| 136 EXPECT_TRUE(cache.Lookup(server1, &cached_cert)); | 168 EXPECT_TRUE(cache.Lookup(server1, &cached_cert, &cached_pkey)); |
| 137 EXPECT_EQ(NULL, cached_cert.get()); | 169 EXPECT_EQ(NULL, cached_cert.get()); |
| 138 } | 170 } |
| 139 | 171 |
| 140 // Check that the OnCertAdded() method removes all cache entries. | 172 // Check that the OnCertAdded() method removes all cache entries. |
| 141 TEST(SSLClientAuthCacheTest, OnCertAdded) { | 173 TEST(SSLClientAuthCacheTest, OnCertAdded) { |
| 142 SSLClientAuthCache cache; | 174 SSLClientAuthCache cache; |
| 143 base::Time start_date = base::Time::Now(); | 175 base::Time start_date = base::Time::Now(); |
| 144 base::Time expiration_date = start_date + base::TimeDelta::FromDays(1); | 176 base::Time expiration_date = start_date + base::TimeDelta::FromDays(1); |
| 145 | 177 |
| 146 HostPortPair server1("foo", 443); | 178 HostPortPair server1("foo", 443); |
| 147 scoped_refptr<X509Certificate> cert1( | 179 scoped_refptr<X509Certificate> cert1( |
| 148 new X509Certificate("foo", "CA", start_date, expiration_date)); | 180 new X509Certificate("foo", "CA", start_date, expiration_date)); |
| 149 | 181 |
| 150 cache.Add(server1, cert1.get()); | 182 cache.Add(server1, cert1.get(), new MockSSLPrivateKey); |
| 151 | 183 |
| 152 HostPortPair server2("foo2", 443); | 184 HostPortPair server2("foo2", 443); |
| 153 cache.Add(server2, NULL); | 185 cache.Add(server2, NULL, new MockSSLPrivateKey); |
| 154 | 186 |
| 155 scoped_refptr<X509Certificate> cached_cert; | 187 scoped_refptr<X509Certificate> cached_cert; |
| 188 scoped_refptr<SSLPrivateKey> cached_pkey; |
| 156 | 189 |
| 157 // Demonstrate the set up is correct. | 190 // Demonstrate the set up is correct. |
| 158 EXPECT_TRUE(cache.Lookup(server1, &cached_cert)); | 191 EXPECT_TRUE(cache.Lookup(server1, &cached_cert, &cached_pkey)); |
| 159 EXPECT_EQ(cert1, cached_cert); | 192 EXPECT_EQ(cert1, cached_cert); |
| 160 | 193 |
| 161 EXPECT_TRUE(cache.Lookup(server2, &cached_cert)); | 194 EXPECT_TRUE(cache.Lookup(server2, &cached_cert, &cached_pkey)); |
| 162 EXPECT_EQ(NULL, cached_cert.get()); | 195 EXPECT_EQ(NULL, cached_cert.get()); |
| 163 | 196 |
| 164 cache.OnCertAdded(NULL); | 197 cache.OnCertAdded(NULL); |
| 165 | 198 |
| 166 // Check that we no longer have entries for either server. | 199 // Check that we no longer have entries for either server. |
| 167 EXPECT_FALSE(cache.Lookup(server1, &cached_cert)); | 200 EXPECT_FALSE(cache.Lookup(server1, &cached_cert, &cached_pkey)); |
| 168 EXPECT_FALSE(cache.Lookup(server2, &cached_cert)); | 201 EXPECT_FALSE(cache.Lookup(server2, &cached_cert, &cached_pkey)); |
| 169 } | 202 } |
| 170 | 203 |
| 171 } // namespace net | 204 } // namespace net |
| OLD | NEW |