| OLD | NEW |
| 1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "net/quic/test_tools/crypto_test_utils.h" | 5 #include "net/quic/test_tools/crypto_test_utils.h" |
| 6 | 6 |
| 7 #include <utility> |
| 8 |
| 7 #include "base/callback_helpers.h" | 9 #include "base/callback_helpers.h" |
| 8 #include "base/logging.h" | 10 #include "base/logging.h" |
| 9 #include "base/macros.h" | 11 #include "base/macros.h" |
| 10 #include "base/memory/ref_counted.h" | 12 #include "base/memory/ref_counted.h" |
| 11 #include "base/memory/scoped_ptr.h" | 13 #include "base/memory/scoped_ptr.h" |
| 12 #include "base/stl_util.h" | 14 #include "base/stl_util.h" |
| 13 #include "base/strings/stringprintf.h" | 15 #include "base/strings/stringprintf.h" |
| 14 #include "net/base/net_errors.h" | 16 #include "net/base/net_errors.h" |
| 15 #include "net/base/test_completion_callback.h" | 17 #include "net/base/test_completion_callback.h" |
| 16 #include "net/base/test_data_directory.h" | 18 #include "net/base/test_data_directory.h" |
| (...skipping 29 matching lines...) Expand all Loading... |
| 46 public: | 48 public: |
| 47 TestProofVerifierChromium( | 49 TestProofVerifierChromium( |
| 48 scoped_ptr<CertVerifier> cert_verifier, | 50 scoped_ptr<CertVerifier> cert_verifier, |
| 49 scoped_ptr<TransportSecurityState> transport_security_state, | 51 scoped_ptr<TransportSecurityState> transport_security_state, |
| 50 scoped_ptr<CTVerifier> cert_transparency_verifier, | 52 scoped_ptr<CTVerifier> cert_transparency_verifier, |
| 51 const std::string& cert_file) | 53 const std::string& cert_file) |
| 52 : ProofVerifierChromium(cert_verifier.get(), | 54 : ProofVerifierChromium(cert_verifier.get(), |
| 53 nullptr, | 55 nullptr, |
| 54 transport_security_state.get(), | 56 transport_security_state.get(), |
| 55 cert_transparency_verifier.get()), | 57 cert_transparency_verifier.get()), |
| 56 cert_verifier_(cert_verifier.Pass()), | 58 cert_verifier_(std::move(cert_verifier)), |
| 57 transport_security_state_(transport_security_state.Pass()), | 59 transport_security_state_(std::move(transport_security_state)), |
| 58 cert_transparency_verifier_(cert_transparency_verifier.Pass()) { | 60 cert_transparency_verifier_(std::move(cert_transparency_verifier)) { |
| 59 // Load and install the root for the validated chain. | 61 // Load and install the root for the validated chain. |
| 60 scoped_refptr<X509Certificate> root_cert = | 62 scoped_refptr<X509Certificate> root_cert = |
| 61 ImportCertFromFile(GetTestCertsDirectory(), cert_file); | 63 ImportCertFromFile(GetTestCertsDirectory(), cert_file); |
| 62 scoped_root_.Reset(root_cert.get()); | 64 scoped_root_.Reset(root_cert.get()); |
| 63 } | 65 } |
| 64 | 66 |
| 65 ~TestProofVerifierChromium() override {} | 67 ~TestProofVerifierChromium() override {} |
| 66 | 68 |
| 67 CertVerifier* cert_verifier() { return cert_verifier_.get(); } | 69 CertVerifier* cert_verifier() { return cert_verifier_.get(); } |
| 68 | 70 |
| (...skipping 60 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 129 | 131 |
| 130 DISALLOW_COPY_AND_ASSIGN(FakeProofSource); | 132 DISALLOW_COPY_AND_ASSIGN(FakeProofSource); |
| 131 }; | 133 }; |
| 132 | 134 |
| 133 class FakeProofVerifier : public TestProofVerifierChromium { | 135 class FakeProofVerifier : public TestProofVerifierChromium { |
| 134 public: | 136 public: |
| 135 FakeProofVerifier(scoped_ptr<CertVerifier> cert_verifier, | 137 FakeProofVerifier(scoped_ptr<CertVerifier> cert_verifier, |
| 136 scoped_ptr<TransportSecurityState> transport_security_state, | 138 scoped_ptr<TransportSecurityState> transport_security_state, |
| 137 scoped_ptr<CTVerifier> cert_transparency_verifier, | 139 scoped_ptr<CTVerifier> cert_transparency_verifier, |
| 138 const std::string& cert_file) | 140 const std::string& cert_file) |
| 139 : TestProofVerifierChromium(cert_verifier.Pass(), | 141 : TestProofVerifierChromium(std::move(cert_verifier), |
| 140 transport_security_state.Pass(), | 142 std::move(transport_security_state), |
| 141 cert_transparency_verifier.Pass(), | 143 std::move(cert_transparency_verifier), |
| 142 cert_file) {} | 144 cert_file) {} |
| 143 ~FakeProofVerifier() override {} | 145 ~FakeProofVerifier() override {} |
| 144 | 146 |
| 145 // ProofVerifier interface | 147 // ProofVerifier interface |
| 146 QuicAsyncStatus VerifyProof(const std::string& hostname, | 148 QuicAsyncStatus VerifyProof(const std::string& hostname, |
| 147 const std::string& server_config, | 149 const std::string& server_config, |
| 148 const std::vector<std::string>& certs, | 150 const std::vector<std::string>& certs, |
| 149 const std::string& cert_sct, | 151 const std::string& cert_sct, |
| 150 const std::string& signature, | 152 const std::string& signature, |
| 151 const ProofVerifyContext* verify_context, | 153 const ProofVerifyContext* verify_context, |
| 152 std::string* error_details, | 154 std::string* error_details, |
| 153 scoped_ptr<ProofVerifyDetails>* verify_details, | 155 scoped_ptr<ProofVerifyDetails>* verify_details, |
| 154 ProofVerifierCallback* callback) override { | 156 ProofVerifierCallback* callback) override { |
| 155 error_details->clear(); | 157 error_details->clear(); |
| 156 scoped_ptr<ProofVerifyDetailsChromium> verify_details_chromium( | 158 scoped_ptr<ProofVerifyDetailsChromium> verify_details_chromium( |
| 157 new ProofVerifyDetailsChromium); | 159 new ProofVerifyDetailsChromium); |
| 158 DCHECK(!certs.empty()); | 160 DCHECK(!certs.empty()); |
| 159 // Convert certs to X509Certificate. | 161 // Convert certs to X509Certificate. |
| 160 vector<StringPiece> cert_pieces(certs.size()); | 162 vector<StringPiece> cert_pieces(certs.size()); |
| 161 for (unsigned i = 0; i < certs.size(); i++) { | 163 for (unsigned i = 0; i < certs.size(); i++) { |
| 162 cert_pieces[i] = base::StringPiece(certs[i]); | 164 cert_pieces[i] = base::StringPiece(certs[i]); |
| 163 } | 165 } |
| 164 scoped_refptr<X509Certificate> x509_cert = | 166 scoped_refptr<X509Certificate> x509_cert = |
| 165 X509Certificate::CreateFromDERCertChain(cert_pieces); | 167 X509Certificate::CreateFromDERCertChain(cert_pieces); |
| 166 | 168 |
| 167 if (!x509_cert.get()) { | 169 if (!x509_cert.get()) { |
| 168 *error_details = "Failed to create certificate chain"; | 170 *error_details = "Failed to create certificate chain"; |
| 169 verify_details_chromium->cert_verify_result.cert_status = | 171 verify_details_chromium->cert_verify_result.cert_status = |
| 170 CERT_STATUS_INVALID; | 172 CERT_STATUS_INVALID; |
| 171 *verify_details = verify_details_chromium.Pass(); | 173 *verify_details = std::move(verify_details_chromium); |
| 172 return QUIC_FAILURE; | 174 return QUIC_FAILURE; |
| 173 } | 175 } |
| 174 | 176 |
| 175 const ProofVerifyContextChromium* chromium_context = | 177 const ProofVerifyContextChromium* chromium_context = |
| 176 reinterpret_cast<const ProofVerifyContextChromium*>(verify_context); | 178 reinterpret_cast<const ProofVerifyContextChromium*>(verify_context); |
| 177 scoped_ptr<CertVerifier::Request> cert_verifier_request_; | 179 scoped_ptr<CertVerifier::Request> cert_verifier_request_; |
| 178 TestCompletionCallback test_callback; | 180 TestCompletionCallback test_callback; |
| 179 int result = cert_verifier()->Verify( | 181 int result = cert_verifier()->Verify( |
| 180 x509_cert.get(), hostname, std::string(), | 182 x509_cert.get(), hostname, std::string(), |
| 181 chromium_context->cert_verify_flags, | 183 chromium_context->cert_verify_flags, |
| 182 SSLConfigService::GetCRLSet().get(), | 184 SSLConfigService::GetCRLSet().get(), |
| 183 &verify_details_chromium->cert_verify_result, test_callback.callback(), | 185 &verify_details_chromium->cert_verify_result, test_callback.callback(), |
| 184 &cert_verifier_request_, chromium_context->net_log); | 186 &cert_verifier_request_, chromium_context->net_log); |
| 185 if (result != OK) { | 187 if (result != OK) { |
| 186 std::string error_string = ErrorToString(result); | 188 std::string error_string = ErrorToString(result); |
| 187 *error_details = StringPrintf("Failed to verify certificate chain: %s", | 189 *error_details = StringPrintf("Failed to verify certificate chain: %s", |
| 188 error_string.c_str()); | 190 error_string.c_str()); |
| 189 verify_details_chromium->cert_verify_result.cert_status = | 191 verify_details_chromium->cert_verify_result.cert_status = |
| 190 CERT_STATUS_INVALID; | 192 CERT_STATUS_INVALID; |
| 191 *verify_details = verify_details_chromium.Pass(); | 193 *verify_details = std::move(verify_details_chromium); |
| 192 return QUIC_FAILURE; | 194 return QUIC_FAILURE; |
| 193 } | 195 } |
| 194 if (signature != kSignature) { | 196 if (signature != kSignature) { |
| 195 *error_details = "Invalid proof"; | 197 *error_details = "Invalid proof"; |
| 196 verify_details_chromium->cert_verify_result.cert_status = | 198 verify_details_chromium->cert_verify_result.cert_status = |
| 197 CERT_STATUS_INVALID; | 199 CERT_STATUS_INVALID; |
| 198 *verify_details = verify_details_chromium.Pass(); | 200 *verify_details = std::move(verify_details_chromium); |
| 199 return QUIC_FAILURE; | 201 return QUIC_FAILURE; |
| 200 } | 202 } |
| 201 *verify_details = verify_details_chromium.Pass(); | 203 *verify_details = std::move(verify_details_chromium); |
| 202 return QUIC_SUCCESS; | 204 return QUIC_SUCCESS; |
| 203 } | 205 } |
| 204 | 206 |
| 205 private: | 207 private: |
| 206 DISALLOW_COPY_AND_ASSIGN(FakeProofVerifier); | 208 DISALLOW_COPY_AND_ASSIGN(FakeProofVerifier); |
| 207 }; | 209 }; |
| 208 | 210 |
| 209 } // namespace | 211 } // namespace |
| 210 | 212 |
| 211 // static | 213 // static |
| (...skipping 19 matching lines...) Expand all Loading... |
| 231 verify_result.verified_cert = | 233 verify_result.verified_cert = |
| 232 ImportCertFromFile(GetTestCertsDirectory(), "quic_test.example.com.crt"); | 234 ImportCertFromFile(GetTestCertsDirectory(), "quic_test.example.com.crt"); |
| 233 cert_verifier->AddResultForCertAndHost(verify_result.verified_cert.get(), | 235 cert_verifier->AddResultForCertAndHost(verify_result.verified_cert.get(), |
| 234 "test.example.com", verify_result, OK); | 236 "test.example.com", verify_result, OK); |
| 235 verify_result.verified_cert = ImportCertFromFile( | 237 verify_result.verified_cert = ImportCertFromFile( |
| 236 GetTestCertsDirectory(), "quic_test_ecc.example.com.crt"); | 238 GetTestCertsDirectory(), "quic_test_ecc.example.com.crt"); |
| 237 cert_verifier->AddResultForCertAndHost(verify_result.verified_cert.get(), | 239 cert_verifier->AddResultForCertAndHost(verify_result.verified_cert.get(), |
| 238 "test.example.com", verify_result, OK); | 240 "test.example.com", verify_result, OK); |
| 239 if (use_real_proof_verifier) { | 241 if (use_real_proof_verifier) { |
| 240 return new TestProofVerifierChromium( | 242 return new TestProofVerifierChromium( |
| 241 cert_verifier.Pass(), make_scoped_ptr(new TransportSecurityState), | 243 std::move(cert_verifier), make_scoped_ptr(new TransportSecurityState), |
| 242 make_scoped_ptr(new MultiLogCTVerifier), "quic_root.crt"); | 244 make_scoped_ptr(new MultiLogCTVerifier), "quic_root.crt"); |
| 243 } | 245 } |
| 244 #if defined(USE_OPENSSL) | 246 #if defined(USE_OPENSSL) |
| 245 return new TestProofVerifierChromium( | 247 return new TestProofVerifierChromium( |
| 246 cert_verifier.Pass(), make_scoped_ptr(new TransportSecurityState), | 248 std::move(cert_verifier), make_scoped_ptr(new TransportSecurityState), |
| 247 make_scoped_ptr(new MultiLogCTVerifier), "quic_root.crt"); | 249 make_scoped_ptr(new MultiLogCTVerifier), "quic_root.crt"); |
| 248 #else | 250 #else |
| 249 return new FakeProofVerifier( | 251 return new FakeProofVerifier( |
| 250 cert_verifier.Pass(), make_scoped_ptr(new TransportSecurityState), | 252 cert_verifier.Pass(), make_scoped_ptr(new TransportSecurityState), |
| 251 make_scoped_ptr(new MultiLogCTVerifier), "quic_root.crt"); | 253 make_scoped_ptr(new MultiLogCTVerifier), "quic_root.crt"); |
| 252 #endif | 254 #endif |
| 253 } | 255 } |
| 254 | 256 |
| 255 // static | 257 // static |
| 256 ProofVerifier* CryptoTestUtils::ProofVerifierForTesting() { | 258 ProofVerifier* CryptoTestUtils::ProofVerifierForTesting() { |
| 257 return ProofVerifierForTestingInternal(/*use_real_proof_verifier=*/false); | 259 return ProofVerifierForTestingInternal(/*use_real_proof_verifier=*/false); |
| 258 } | 260 } |
| 259 | 261 |
| 260 // static | 262 // static |
| 261 ProofVerifier* CryptoTestUtils::RealProofVerifierForTesting() { | 263 ProofVerifier* CryptoTestUtils::RealProofVerifierForTesting() { |
| 262 return ProofVerifierForTestingInternal(/*use_real_proof_verifier=*/true); | 264 return ProofVerifierForTestingInternal(/*use_real_proof_verifier=*/true); |
| 263 } | 265 } |
| 264 | 266 |
| 265 // static | 267 // static |
| 266 ProofVerifyContext* CryptoTestUtils::ProofVerifyContextForTesting() { | 268 ProofVerifyContext* CryptoTestUtils::ProofVerifyContextForTesting() { |
| 267 return new ProofVerifyContextChromium(/*cert_verify_flags=*/0, BoundNetLog()); | 269 return new ProofVerifyContextChromium(/*cert_verify_flags=*/0, BoundNetLog()); |
| 268 } | 270 } |
| 269 | 271 |
| 270 } // namespace test | 272 } // namespace test |
| 271 | 273 |
| 272 } // namespace net | 274 } // namespace net |
| OLD | NEW |