OLD | NEW |
1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "net/quic/test_tools/crypto_test_utils.h" | 5 #include "net/quic/test_tools/crypto_test_utils.h" |
6 | 6 |
| 7 #include <utility> |
| 8 |
7 #include "base/callback_helpers.h" | 9 #include "base/callback_helpers.h" |
8 #include "base/logging.h" | 10 #include "base/logging.h" |
9 #include "base/macros.h" | 11 #include "base/macros.h" |
10 #include "base/memory/ref_counted.h" | 12 #include "base/memory/ref_counted.h" |
11 #include "base/memory/scoped_ptr.h" | 13 #include "base/memory/scoped_ptr.h" |
12 #include "base/stl_util.h" | 14 #include "base/stl_util.h" |
13 #include "base/strings/stringprintf.h" | 15 #include "base/strings/stringprintf.h" |
14 #include "net/base/net_errors.h" | 16 #include "net/base/net_errors.h" |
15 #include "net/base/test_completion_callback.h" | 17 #include "net/base/test_completion_callback.h" |
16 #include "net/base/test_data_directory.h" | 18 #include "net/base/test_data_directory.h" |
(...skipping 29 matching lines...) Expand all Loading... |
46 public: | 48 public: |
47 TestProofVerifierChromium( | 49 TestProofVerifierChromium( |
48 scoped_ptr<CertVerifier> cert_verifier, | 50 scoped_ptr<CertVerifier> cert_verifier, |
49 scoped_ptr<TransportSecurityState> transport_security_state, | 51 scoped_ptr<TransportSecurityState> transport_security_state, |
50 scoped_ptr<CTVerifier> cert_transparency_verifier, | 52 scoped_ptr<CTVerifier> cert_transparency_verifier, |
51 const std::string& cert_file) | 53 const std::string& cert_file) |
52 : ProofVerifierChromium(cert_verifier.get(), | 54 : ProofVerifierChromium(cert_verifier.get(), |
53 nullptr, | 55 nullptr, |
54 transport_security_state.get(), | 56 transport_security_state.get(), |
55 cert_transparency_verifier.get()), | 57 cert_transparency_verifier.get()), |
56 cert_verifier_(cert_verifier.Pass()), | 58 cert_verifier_(std::move(cert_verifier)), |
57 transport_security_state_(transport_security_state.Pass()), | 59 transport_security_state_(std::move(transport_security_state)), |
58 cert_transparency_verifier_(cert_transparency_verifier.Pass()) { | 60 cert_transparency_verifier_(std::move(cert_transparency_verifier)) { |
59 // Load and install the root for the validated chain. | 61 // Load and install the root for the validated chain. |
60 scoped_refptr<X509Certificate> root_cert = | 62 scoped_refptr<X509Certificate> root_cert = |
61 ImportCertFromFile(GetTestCertsDirectory(), cert_file); | 63 ImportCertFromFile(GetTestCertsDirectory(), cert_file); |
62 scoped_root_.Reset(root_cert.get()); | 64 scoped_root_.Reset(root_cert.get()); |
63 } | 65 } |
64 | 66 |
65 ~TestProofVerifierChromium() override {} | 67 ~TestProofVerifierChromium() override {} |
66 | 68 |
67 CertVerifier* cert_verifier() { return cert_verifier_.get(); } | 69 CertVerifier* cert_verifier() { return cert_verifier_.get(); } |
68 | 70 |
(...skipping 60 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
129 | 131 |
130 DISALLOW_COPY_AND_ASSIGN(FakeProofSource); | 132 DISALLOW_COPY_AND_ASSIGN(FakeProofSource); |
131 }; | 133 }; |
132 | 134 |
133 class FakeProofVerifier : public TestProofVerifierChromium { | 135 class FakeProofVerifier : public TestProofVerifierChromium { |
134 public: | 136 public: |
135 FakeProofVerifier(scoped_ptr<CertVerifier> cert_verifier, | 137 FakeProofVerifier(scoped_ptr<CertVerifier> cert_verifier, |
136 scoped_ptr<TransportSecurityState> transport_security_state, | 138 scoped_ptr<TransportSecurityState> transport_security_state, |
137 scoped_ptr<CTVerifier> cert_transparency_verifier, | 139 scoped_ptr<CTVerifier> cert_transparency_verifier, |
138 const std::string& cert_file) | 140 const std::string& cert_file) |
139 : TestProofVerifierChromium(cert_verifier.Pass(), | 141 : TestProofVerifierChromium(std::move(cert_verifier), |
140 transport_security_state.Pass(), | 142 std::move(transport_security_state), |
141 cert_transparency_verifier.Pass(), | 143 std::move(cert_transparency_verifier), |
142 cert_file) {} | 144 cert_file) {} |
143 ~FakeProofVerifier() override {} | 145 ~FakeProofVerifier() override {} |
144 | 146 |
145 // ProofVerifier interface | 147 // ProofVerifier interface |
146 QuicAsyncStatus VerifyProof(const std::string& hostname, | 148 QuicAsyncStatus VerifyProof(const std::string& hostname, |
147 const std::string& server_config, | 149 const std::string& server_config, |
148 const std::vector<std::string>& certs, | 150 const std::vector<std::string>& certs, |
149 const std::string& cert_sct, | 151 const std::string& cert_sct, |
150 const std::string& signature, | 152 const std::string& signature, |
151 const ProofVerifyContext* verify_context, | 153 const ProofVerifyContext* verify_context, |
152 std::string* error_details, | 154 std::string* error_details, |
153 scoped_ptr<ProofVerifyDetails>* verify_details, | 155 scoped_ptr<ProofVerifyDetails>* verify_details, |
154 ProofVerifierCallback* callback) override { | 156 ProofVerifierCallback* callback) override { |
155 error_details->clear(); | 157 error_details->clear(); |
156 scoped_ptr<ProofVerifyDetailsChromium> verify_details_chromium( | 158 scoped_ptr<ProofVerifyDetailsChromium> verify_details_chromium( |
157 new ProofVerifyDetailsChromium); | 159 new ProofVerifyDetailsChromium); |
158 DCHECK(!certs.empty()); | 160 DCHECK(!certs.empty()); |
159 // Convert certs to X509Certificate. | 161 // Convert certs to X509Certificate. |
160 vector<StringPiece> cert_pieces(certs.size()); | 162 vector<StringPiece> cert_pieces(certs.size()); |
161 for (unsigned i = 0; i < certs.size(); i++) { | 163 for (unsigned i = 0; i < certs.size(); i++) { |
162 cert_pieces[i] = base::StringPiece(certs[i]); | 164 cert_pieces[i] = base::StringPiece(certs[i]); |
163 } | 165 } |
164 scoped_refptr<X509Certificate> x509_cert = | 166 scoped_refptr<X509Certificate> x509_cert = |
165 X509Certificate::CreateFromDERCertChain(cert_pieces); | 167 X509Certificate::CreateFromDERCertChain(cert_pieces); |
166 | 168 |
167 if (!x509_cert.get()) { | 169 if (!x509_cert.get()) { |
168 *error_details = "Failed to create certificate chain"; | 170 *error_details = "Failed to create certificate chain"; |
169 verify_details_chromium->cert_verify_result.cert_status = | 171 verify_details_chromium->cert_verify_result.cert_status = |
170 CERT_STATUS_INVALID; | 172 CERT_STATUS_INVALID; |
171 *verify_details = verify_details_chromium.Pass(); | 173 *verify_details = std::move(verify_details_chromium); |
172 return QUIC_FAILURE; | 174 return QUIC_FAILURE; |
173 } | 175 } |
174 | 176 |
175 const ProofVerifyContextChromium* chromium_context = | 177 const ProofVerifyContextChromium* chromium_context = |
176 reinterpret_cast<const ProofVerifyContextChromium*>(verify_context); | 178 reinterpret_cast<const ProofVerifyContextChromium*>(verify_context); |
177 scoped_ptr<CertVerifier::Request> cert_verifier_request_; | 179 scoped_ptr<CertVerifier::Request> cert_verifier_request_; |
178 TestCompletionCallback test_callback; | 180 TestCompletionCallback test_callback; |
179 int result = cert_verifier()->Verify( | 181 int result = cert_verifier()->Verify( |
180 x509_cert.get(), hostname, std::string(), | 182 x509_cert.get(), hostname, std::string(), |
181 chromium_context->cert_verify_flags, | 183 chromium_context->cert_verify_flags, |
182 SSLConfigService::GetCRLSet().get(), | 184 SSLConfigService::GetCRLSet().get(), |
183 &verify_details_chromium->cert_verify_result, test_callback.callback(), | 185 &verify_details_chromium->cert_verify_result, test_callback.callback(), |
184 &cert_verifier_request_, chromium_context->net_log); | 186 &cert_verifier_request_, chromium_context->net_log); |
185 if (result != OK) { | 187 if (result != OK) { |
186 std::string error_string = ErrorToString(result); | 188 std::string error_string = ErrorToString(result); |
187 *error_details = StringPrintf("Failed to verify certificate chain: %s", | 189 *error_details = StringPrintf("Failed to verify certificate chain: %s", |
188 error_string.c_str()); | 190 error_string.c_str()); |
189 verify_details_chromium->cert_verify_result.cert_status = | 191 verify_details_chromium->cert_verify_result.cert_status = |
190 CERT_STATUS_INVALID; | 192 CERT_STATUS_INVALID; |
191 *verify_details = verify_details_chromium.Pass(); | 193 *verify_details = std::move(verify_details_chromium); |
192 return QUIC_FAILURE; | 194 return QUIC_FAILURE; |
193 } | 195 } |
194 if (signature != kSignature) { | 196 if (signature != kSignature) { |
195 *error_details = "Invalid proof"; | 197 *error_details = "Invalid proof"; |
196 verify_details_chromium->cert_verify_result.cert_status = | 198 verify_details_chromium->cert_verify_result.cert_status = |
197 CERT_STATUS_INVALID; | 199 CERT_STATUS_INVALID; |
198 *verify_details = verify_details_chromium.Pass(); | 200 *verify_details = std::move(verify_details_chromium); |
199 return QUIC_FAILURE; | 201 return QUIC_FAILURE; |
200 } | 202 } |
201 *verify_details = verify_details_chromium.Pass(); | 203 *verify_details = std::move(verify_details_chromium); |
202 return QUIC_SUCCESS; | 204 return QUIC_SUCCESS; |
203 } | 205 } |
204 | 206 |
205 private: | 207 private: |
206 DISALLOW_COPY_AND_ASSIGN(FakeProofVerifier); | 208 DISALLOW_COPY_AND_ASSIGN(FakeProofVerifier); |
207 }; | 209 }; |
208 | 210 |
209 } // namespace | 211 } // namespace |
210 | 212 |
211 // static | 213 // static |
(...skipping 19 matching lines...) Expand all Loading... |
231 verify_result.verified_cert = | 233 verify_result.verified_cert = |
232 ImportCertFromFile(GetTestCertsDirectory(), "quic_test.example.com.crt"); | 234 ImportCertFromFile(GetTestCertsDirectory(), "quic_test.example.com.crt"); |
233 cert_verifier->AddResultForCertAndHost(verify_result.verified_cert.get(), | 235 cert_verifier->AddResultForCertAndHost(verify_result.verified_cert.get(), |
234 "test.example.com", verify_result, OK); | 236 "test.example.com", verify_result, OK); |
235 verify_result.verified_cert = ImportCertFromFile( | 237 verify_result.verified_cert = ImportCertFromFile( |
236 GetTestCertsDirectory(), "quic_test_ecc.example.com.crt"); | 238 GetTestCertsDirectory(), "quic_test_ecc.example.com.crt"); |
237 cert_verifier->AddResultForCertAndHost(verify_result.verified_cert.get(), | 239 cert_verifier->AddResultForCertAndHost(verify_result.verified_cert.get(), |
238 "test.example.com", verify_result, OK); | 240 "test.example.com", verify_result, OK); |
239 if (use_real_proof_verifier) { | 241 if (use_real_proof_verifier) { |
240 return new TestProofVerifierChromium( | 242 return new TestProofVerifierChromium( |
241 cert_verifier.Pass(), make_scoped_ptr(new TransportSecurityState), | 243 std::move(cert_verifier), make_scoped_ptr(new TransportSecurityState), |
242 make_scoped_ptr(new MultiLogCTVerifier), "quic_root.crt"); | 244 make_scoped_ptr(new MultiLogCTVerifier), "quic_root.crt"); |
243 } | 245 } |
244 #if defined(USE_OPENSSL) | 246 #if defined(USE_OPENSSL) |
245 return new TestProofVerifierChromium( | 247 return new TestProofVerifierChromium( |
246 cert_verifier.Pass(), make_scoped_ptr(new TransportSecurityState), | 248 std::move(cert_verifier), make_scoped_ptr(new TransportSecurityState), |
247 make_scoped_ptr(new MultiLogCTVerifier), "quic_root.crt"); | 249 make_scoped_ptr(new MultiLogCTVerifier), "quic_root.crt"); |
248 #else | 250 #else |
249 return new FakeProofVerifier( | 251 return new FakeProofVerifier( |
250 cert_verifier.Pass(), make_scoped_ptr(new TransportSecurityState), | 252 cert_verifier.Pass(), make_scoped_ptr(new TransportSecurityState), |
251 make_scoped_ptr(new MultiLogCTVerifier), "quic_root.crt"); | 253 make_scoped_ptr(new MultiLogCTVerifier), "quic_root.crt"); |
252 #endif | 254 #endif |
253 } | 255 } |
254 | 256 |
255 // static | 257 // static |
256 ProofVerifier* CryptoTestUtils::ProofVerifierForTesting() { | 258 ProofVerifier* CryptoTestUtils::ProofVerifierForTesting() { |
257 return ProofVerifierForTestingInternal(/*use_real_proof_verifier=*/false); | 259 return ProofVerifierForTestingInternal(/*use_real_proof_verifier=*/false); |
258 } | 260 } |
259 | 261 |
260 // static | 262 // static |
261 ProofVerifier* CryptoTestUtils::RealProofVerifierForTesting() { | 263 ProofVerifier* CryptoTestUtils::RealProofVerifierForTesting() { |
262 return ProofVerifierForTestingInternal(/*use_real_proof_verifier=*/true); | 264 return ProofVerifierForTestingInternal(/*use_real_proof_verifier=*/true); |
263 } | 265 } |
264 | 266 |
265 // static | 267 // static |
266 ProofVerifyContext* CryptoTestUtils::ProofVerifyContextForTesting() { | 268 ProofVerifyContext* CryptoTestUtils::ProofVerifyContextForTesting() { |
267 return new ProofVerifyContextChromium(/*cert_verify_flags=*/0, BoundNetLog()); | 269 return new ProofVerifyContextChromium(/*cert_verify_flags=*/0, BoundNetLog()); |
268 } | 270 } |
269 | 271 |
270 } // namespace test | 272 } // namespace test |
271 | 273 |
272 } // namespace net | 274 } // namespace net |
OLD | NEW |