| OLD | NEW |
| 1 // Copyright 2015 The Chromium Authors. All rights reserved. | 1 // Copyright 2015 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "chrome/browser/ssl/security_state_model.h" | 5 #include "chrome/browser/ssl/security_state_model.h" |
| 6 | 6 |
| 7 #include "chrome/test/base/chrome_render_view_host_test_harness.h" | 7 #include "chrome/test/base/chrome_render_view_host_test_harness.h" |
| 8 #include "chrome/test/base/testing_profile.h" | 8 #include "chrome/test/base/testing_profile.h" |
| 9 #include "content/public/browser/cert_store.h" | 9 #include "content/public/browser/cert_store.h" |
| 10 #include "content/public/test/mock_render_process_host.h" | 10 #include "content/public/test/mock_render_process_host.h" |
| (...skipping 26 matching lines...) Expand all Loading... |
| 37 | 37 |
| 38 // Tests that SHA1-signed certificates expiring in 2016 downgrade the | 38 // Tests that SHA1-signed certificates expiring in 2016 downgrade the |
| 39 // security state of the page. | 39 // security state of the page. |
| 40 TEST_F(SecurityStateModelTest, SHA1Warning) { | 40 TEST_F(SecurityStateModelTest, SHA1Warning) { |
| 41 GURL url(kUrl); | 41 GURL url(kUrl); |
| 42 Profile* test_profile = profile(); | 42 Profile* test_profile = profile(); |
| 43 SecurityStateModel::SecurityInfo security_info; | 43 SecurityStateModel::SecurityInfo security_info; |
| 44 content::SSLStatus ssl_status; | 44 content::SSLStatus ssl_status; |
| 45 ASSERT_NO_FATAL_FAILURE(GetTestSSLStatus(process()->GetID(), &ssl_status)); | 45 ASSERT_NO_FATAL_FAILURE(GetTestSSLStatus(process()->GetID(), &ssl_status)); |
| 46 SecurityStateModel::SecurityInfoForRequest(url, ssl_status, test_profile, | 46 SecurityStateModel::SecurityInfoForRequest(url, ssl_status, test_profile, |
| 47 &security_info); | 47 false, &security_info); |
| 48 EXPECT_EQ(SecurityStateModel::DEPRECATED_SHA1_MINOR, | 48 EXPECT_EQ(SecurityStateModel::DEPRECATED_SHA1_MINOR, |
| 49 security_info.sha1_deprecation_status); | 49 security_info.sha1_deprecation_status); |
| 50 EXPECT_EQ(SecurityStateModel::NONE, security_info.security_level); | 50 EXPECT_EQ(SecurityStateModel::NONE, security_info.security_level); |
| 51 } | 51 } |
| 52 | 52 |
| 53 // Tests that SHA1 warnings don't interfere with the handling of mixed | 53 // Tests that SHA1 warnings don't interfere with the handling of mixed |
| 54 // content. | 54 // content. |
| 55 TEST_F(SecurityStateModelTest, SHA1WarningMixedContent) { | 55 TEST_F(SecurityStateModelTest, SHA1WarningMixedContent) { |
| 56 GURL url(kUrl); | 56 GURL url(kUrl); |
| 57 Profile* test_profile = profile(); | 57 Profile* test_profile = profile(); |
| 58 SecurityStateModel::SecurityInfo security_info; | 58 SecurityStateModel::SecurityInfo security_info; |
| 59 content::SSLStatus ssl_status; | 59 content::SSLStatus ssl_status; |
| 60 ASSERT_NO_FATAL_FAILURE(GetTestSSLStatus(process()->GetID(), &ssl_status)); | 60 ASSERT_NO_FATAL_FAILURE(GetTestSSLStatus(process()->GetID(), &ssl_status)); |
| 61 ssl_status.content_status = content::SSLStatus::DISPLAYED_INSECURE_CONTENT; | 61 ssl_status.content_status = content::SSLStatus::DISPLAYED_INSECURE_CONTENT; |
| 62 SecurityStateModel::SecurityInfoForRequest(url, ssl_status, test_profile, | 62 SecurityStateModel::SecurityInfoForRequest(url, ssl_status, test_profile, |
| 63 &security_info); | 63 false, &security_info); |
| 64 EXPECT_EQ(SecurityStateModel::DEPRECATED_SHA1_MINOR, | 64 EXPECT_EQ(SecurityStateModel::DEPRECATED_SHA1_MINOR, |
| 65 security_info.sha1_deprecation_status); | 65 security_info.sha1_deprecation_status); |
| 66 EXPECT_EQ(SecurityStateModel::DISPLAYED_MIXED_CONTENT, | 66 EXPECT_EQ(SecurityStateModel::DISPLAYED_MIXED_CONTENT, |
| 67 security_info.mixed_content_status); | 67 security_info.mixed_content_status); |
| 68 EXPECT_EQ(SecurityStateModel::NONE, security_info.security_level); | 68 EXPECT_EQ(SecurityStateModel::NONE, security_info.security_level); |
| 69 | 69 |
| 70 ssl_status.security_style = content::SECURITY_STYLE_AUTHENTICATION_BROKEN; | 70 ssl_status.security_style = content::SECURITY_STYLE_AUTHENTICATION_BROKEN; |
| 71 ssl_status.content_status = content::SSLStatus::RAN_INSECURE_CONTENT; | 71 ssl_status.content_status = content::SSLStatus::RAN_INSECURE_CONTENT; |
| 72 SecurityStateModel::SecurityInfoForRequest(url, ssl_status, test_profile, | 72 SecurityStateModel::SecurityInfoForRequest(url, ssl_status, test_profile, |
| 73 &security_info); | 73 false, &security_info); |
| 74 EXPECT_EQ(SecurityStateModel::DEPRECATED_SHA1_MINOR, | 74 EXPECT_EQ(SecurityStateModel::DEPRECATED_SHA1_MINOR, |
| 75 security_info.sha1_deprecation_status); | 75 security_info.sha1_deprecation_status); |
| 76 EXPECT_EQ(SecurityStateModel::RAN_MIXED_CONTENT, | 76 EXPECT_EQ(SecurityStateModel::RAN_MIXED_CONTENT, |
| 77 security_info.mixed_content_status); | 77 security_info.mixed_content_status); |
| 78 EXPECT_EQ(SecurityStateModel::SECURITY_ERROR, security_info.security_level); | 78 EXPECT_EQ(SecurityStateModel::SECURITY_ERROR, security_info.security_level); |
| 79 } | 79 } |
| 80 | 80 |
| 81 // Tests that SHA1 warnings don't interfere with the handling of major | 81 // Tests that SHA1 warnings don't interfere with the handling of major |
| 82 // cert errors. | 82 // cert errors. |
| 83 TEST_F(SecurityStateModelTest, SHA1WarningBrokenHTTPS) { | 83 TEST_F(SecurityStateModelTest, SHA1WarningBrokenHTTPS) { |
| 84 GURL url(kUrl); | 84 GURL url(kUrl); |
| 85 Profile* test_profile = profile(); | 85 Profile* test_profile = profile(); |
| 86 SecurityStateModel::SecurityInfo security_info; | 86 SecurityStateModel::SecurityInfo security_info; |
| 87 content::SSLStatus ssl_status; | 87 content::SSLStatus ssl_status; |
| 88 ASSERT_NO_FATAL_FAILURE(GetTestSSLStatus(process()->GetID(), &ssl_status)); | 88 ASSERT_NO_FATAL_FAILURE(GetTestSSLStatus(process()->GetID(), &ssl_status)); |
| 89 ssl_status.security_style = content::SECURITY_STYLE_AUTHENTICATION_BROKEN; | 89 ssl_status.security_style = content::SECURITY_STYLE_AUTHENTICATION_BROKEN; |
| 90 ssl_status.cert_status |= net::CERT_STATUS_DATE_INVALID; | 90 ssl_status.cert_status |= net::CERT_STATUS_DATE_INVALID; |
| 91 SecurityStateModel::SecurityInfoForRequest(url, ssl_status, test_profile, | 91 SecurityStateModel::SecurityInfoForRequest(url, ssl_status, test_profile, |
| 92 &security_info); | 92 false, &security_info); |
| 93 EXPECT_EQ(SecurityStateModel::DEPRECATED_SHA1_MINOR, | 93 EXPECT_EQ(SecurityStateModel::DEPRECATED_SHA1_MINOR, |
| 94 security_info.sha1_deprecation_status); | 94 security_info.sha1_deprecation_status); |
| 95 EXPECT_EQ(SecurityStateModel::SECURITY_ERROR, security_info.security_level); | 95 EXPECT_EQ(SecurityStateModel::SECURITY_ERROR, security_info.security_level); |
| 96 } | 96 } |
| 97 | 97 |
| 98 // Tests that |security_info.is_secure_protocol_and_ciphersuite| is | 98 // Tests that |security_info.is_secure_protocol_and_ciphersuite| is |
| 99 // computed correctly. | 99 // computed correctly. |
| 100 TEST_F(SecurityStateModelTest, SecureProtocolAndCiphersuite) { | 100 TEST_F(SecurityStateModelTest, SecureProtocolAndCiphersuite) { |
| 101 GURL url(kUrl); | 101 GURL url(kUrl); |
| 102 Profile* test_profile = profile(); | 102 Profile* test_profile = profile(); |
| 103 SecurityStateModel::SecurityInfo security_info; | 103 SecurityStateModel::SecurityInfo security_info; |
| 104 content::SSLStatus ssl_status; | 104 content::SSLStatus ssl_status; |
| 105 ASSERT_NO_FATAL_FAILURE(GetTestSSLStatus(process()->GetID(), &ssl_status)); | 105 ASSERT_NO_FATAL_FAILURE(GetTestSSLStatus(process()->GetID(), &ssl_status)); |
| 106 // TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 from | 106 // TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 from |
| 107 // http://www.iana.org/assignments/tls-parameters/tls-parameters.xml#tls-param
eters-4 | 107 // http://www.iana.org/assignments/tls-parameters/tls-parameters.xml#tls-param
eters-4 |
| 108 const uint16 ciphersuite = 0xc02f; | 108 const uint16 ciphersuite = 0xc02f; |
| 109 ssl_status.connection_status = | 109 ssl_status.connection_status = |
| 110 (net::SSL_CONNECTION_VERSION_TLS1_2 << net::SSL_CONNECTION_VERSION_SHIFT); | 110 (net::SSL_CONNECTION_VERSION_TLS1_2 << net::SSL_CONNECTION_VERSION_SHIFT); |
| 111 net::SSLConnectionStatusSetCipherSuite(ciphersuite, | 111 net::SSLConnectionStatusSetCipherSuite(ciphersuite, |
| 112 &ssl_status.connection_status); | 112 &ssl_status.connection_status); |
| 113 SecurityStateModel::SecurityInfoForRequest(url, ssl_status, test_profile, | 113 SecurityStateModel::SecurityInfoForRequest(url, ssl_status, test_profile, |
| 114 &security_info); | 114 false, &security_info); |
| 115 EXPECT_TRUE(security_info.is_secure_protocol_and_ciphersuite); | 115 EXPECT_TRUE(security_info.is_secure_protocol_and_ciphersuite); |
| 116 } | 116 } |
| 117 | 117 |
| 118 TEST_F(SecurityStateModelTest, NonsecureProtocol) { | 118 TEST_F(SecurityStateModelTest, NonsecureProtocol) { |
| 119 GURL url(kUrl); | 119 GURL url(kUrl); |
| 120 Profile* test_profile = profile(); | 120 Profile* test_profile = profile(); |
| 121 SecurityStateModel::SecurityInfo security_info; | 121 SecurityStateModel::SecurityInfo security_info; |
| 122 content::SSLStatus ssl_status; | 122 content::SSLStatus ssl_status; |
| 123 ASSERT_NO_FATAL_FAILURE(GetTestSSLStatus(process()->GetID(), &ssl_status)); | 123 ASSERT_NO_FATAL_FAILURE(GetTestSSLStatus(process()->GetID(), &ssl_status)); |
| 124 // TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 from | 124 // TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 from |
| 125 // http://www.iana.org/assignments/tls-parameters/tls-parameters.xml#tls-param
eters-4 | 125 // http://www.iana.org/assignments/tls-parameters/tls-parameters.xml#tls-param
eters-4 |
| 126 const uint16 ciphersuite = 0xc02f; | 126 const uint16 ciphersuite = 0xc02f; |
| 127 ssl_status.connection_status = | 127 ssl_status.connection_status = |
| 128 (net::SSL_CONNECTION_VERSION_TLS1_1 << net::SSL_CONNECTION_VERSION_SHIFT); | 128 (net::SSL_CONNECTION_VERSION_TLS1_1 << net::SSL_CONNECTION_VERSION_SHIFT); |
| 129 net::SSLConnectionStatusSetCipherSuite(ciphersuite, | 129 net::SSLConnectionStatusSetCipherSuite(ciphersuite, |
| 130 &ssl_status.connection_status); | 130 &ssl_status.connection_status); |
| 131 SecurityStateModel::SecurityInfoForRequest(url, ssl_status, test_profile, | 131 SecurityStateModel::SecurityInfoForRequest(url, ssl_status, test_profile, |
| 132 &security_info); | 132 false, &security_info); |
| 133 EXPECT_FALSE(security_info.is_secure_protocol_and_ciphersuite); | 133 EXPECT_FALSE(security_info.is_secure_protocol_and_ciphersuite); |
| 134 } | 134 } |
| 135 | 135 |
| 136 TEST_F(SecurityStateModelTest, NonsecureCiphersuite) { | 136 TEST_F(SecurityStateModelTest, NonsecureCiphersuite) { |
| 137 GURL url(kUrl); | 137 GURL url(kUrl); |
| 138 Profile* test_profile = profile(); | 138 Profile* test_profile = profile(); |
| 139 SecurityStateModel::SecurityInfo security_info; | 139 SecurityStateModel::SecurityInfo security_info; |
| 140 content::SSLStatus ssl_status; | 140 content::SSLStatus ssl_status; |
| 141 ASSERT_NO_FATAL_FAILURE(GetTestSSLStatus(process()->GetID(), &ssl_status)); | 141 ASSERT_NO_FATAL_FAILURE(GetTestSSLStatus(process()->GetID(), &ssl_status)); |
| 142 // TLS_RSA_WITH_AES_128_CCM_8 from | 142 // TLS_RSA_WITH_AES_128_CCM_8 from |
| 143 // http://www.iana.org/assignments/tls-parameters/tls-parameters.xml#tls-param
eters-4 | 143 // http://www.iana.org/assignments/tls-parameters/tls-parameters.xml#tls-param
eters-4 |
| 144 const uint16 ciphersuite = 0xc0a0; | 144 const uint16 ciphersuite = 0xc0a0; |
| 145 ssl_status.connection_status = | 145 ssl_status.connection_status = |
| 146 (net::SSL_CONNECTION_VERSION_TLS1_2 << net::SSL_CONNECTION_VERSION_SHIFT); | 146 (net::SSL_CONNECTION_VERSION_TLS1_2 << net::SSL_CONNECTION_VERSION_SHIFT); |
| 147 net::SSLConnectionStatusSetCipherSuite(ciphersuite, | 147 net::SSLConnectionStatusSetCipherSuite(ciphersuite, |
| 148 &ssl_status.connection_status); | 148 &ssl_status.connection_status); |
| 149 SecurityStateModel::SecurityInfoForRequest(url, ssl_status, test_profile, | 149 SecurityStateModel::SecurityInfoForRequest(url, ssl_status, test_profile, |
| 150 &security_info); | 150 false, &security_info); |
| 151 EXPECT_FALSE(security_info.is_secure_protocol_and_ciphersuite); | 151 EXPECT_FALSE(security_info.is_secure_protocol_and_ciphersuite); |
| 152 } | 152 } |
| 153 | 153 |
| 154 } // namespace | 154 } // namespace |
| OLD | NEW |