Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(220)

Side by Side Diff: net/socket/ssl_client_socket_unittest.cc

Issue 1639463003: Use SSLPrivateKey for testing client authentication (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Adding header. Created 4 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "net/socket/ssl_client_socket.h" 5 #include "net/socket/ssl_client_socket.h"
6 6
7 #include <utility> 7 #include <utility>
8 8
9 #include "base/callback_helpers.h" 9 #include "base/callback_helpers.h"
10 #include "base/files/file_util.h"
10 #include "base/location.h" 11 #include "base/location.h"
11 #include "base/macros.h" 12 #include "base/macros.h"
12 #include "base/memory/ref_counted.h" 13 #include "base/memory/ref_counted.h"
13 #include "base/run_loop.h" 14 #include "base/run_loop.h"
14 #include "base/single_thread_task_runner.h" 15 #include "base/single_thread_task_runner.h"
15 #include "base/thread_task_runner_handle.h" 16 #include "base/thread_task_runner_handle.h"
16 #include "base/time/time.h" 17 #include "base/time/time.h"
17 #include "net/base/address_list.h" 18 #include "net/base/address_list.h"
18 #include "net/base/io_buffer.h" 19 #include "net/base/io_buffer.h"
19 #include "net/base/net_errors.h" 20 #include "net/base/net_errors.h"
(...skipping 22 matching lines...) Expand all
42 #include "net/ssl/ssl_cert_request_info.h" 43 #include "net/ssl/ssl_cert_request_info.h"
43 #include "net/ssl/ssl_config_service.h" 44 #include "net/ssl/ssl_config_service.h"
44 #include "net/ssl/ssl_connection_status_flags.h" 45 #include "net/ssl/ssl_connection_status_flags.h"
45 #include "net/ssl/ssl_info.h" 46 #include "net/ssl/ssl_info.h"
46 #include "net/test/cert_test_util.h" 47 #include "net/test/cert_test_util.h"
47 #include "net/test/spawned_test_server/spawned_test_server.h" 48 #include "net/test/spawned_test_server/spawned_test_server.h"
48 #include "testing/gmock/include/gmock/gmock.h" 49 #include "testing/gmock/include/gmock/gmock.h"
49 #include "testing/gtest/include/gtest/gtest.h" 50 #include "testing/gtest/include/gtest/gtest.h"
50 #include "testing/platform_test.h" 51 #include "testing/platform_test.h"
51 52
53 #if defined(USE_OPENSSL)
54 #include <errno.h>
55 #include <openssl/bio.h>
56 #include <openssl/bn.h>
davidben 2016/01/28 22:24:10 Unused?
svaldez 2016/01/29 17:19:29 Done.
57 #include <openssl/evp.h>
58 #include <openssl/pem.h>
59 #include <openssl/rsa.h>
davidben 2016/01/28 22:24:09 Unused?
svaldez 2016/01/29 17:19:29 Done.
60 #include <string.h>
61 #include <utility>
davidben 2016/01/28 22:24:10 Already included up top.
svaldez 2016/01/29 17:19:30 Done.
62
63 #include "crypto/openssl_util.h"
davidben 2016/01/28 22:24:10 Unused?
svaldez 2016/01/29 17:19:29 Done.
64 #include "crypto/scoped_openssl_types.h"
65 #include "net/ssl/ssl_platform_key_test.h"
66 #endif
67
52 using testing::_; 68 using testing::_;
53 using testing::Return; 69 using testing::Return;
54 using testing::Truly; 70 using testing::Truly;
55 71
56 namespace net { 72 namespace net {
57 73
58 namespace { 74 namespace {
59 75
60 // WrappedStreamSocket is a base class that wraps an existing StreamSocket, 76 // WrappedStreamSocket is a base class that wraps an existing StreamSocket,
61 // forwarding the Socket and StreamSocket interfaces to the underlying 77 // forwarding the Socket and StreamSocket interfaces to the underlying
(...skipping 3171 matching lines...) Expand 10 before | Expand all | Expand 10 after
3233 3249
3234 int rv; 3250 int rv;
3235 ASSERT_TRUE(CreateAndConnectSSLClientSocket(client_config, &rv)); 3251 ASSERT_TRUE(CreateAndConnectSSLClientSocket(client_config, &rv));
3236 EXPECT_EQ(OK, rv); 3252 EXPECT_EQ(OK, rv);
3237 3253
3238 std::string proto; 3254 std::string proto;
3239 EXPECT_EQ(SSLClientSocket::kNextProtoUnsupported, 3255 EXPECT_EQ(SSLClientSocket::kNextProtoUnsupported,
3240 sock_->GetNextProto(&proto)); 3256 sock_->GetNextProto(&proto));
3241 } 3257 }
3242 3258
3259 // These client auth tests are currently dependent on OpenSSL's struct X509.
davidben 2016/01/28 22:24:09 // Client auth is not supported in NSS ports. or
svaldez 2016/01/29 17:19:30 Done.
3260 #if defined(USE_OPENSSL)
3261
3262 namespace {
3263
3264 // Loads a PEM-encoded private key file into a SSLPrivateKey object.
3265 // |filepath| is the private key file path.
3266 // |*pkey| is reset to the new SSLPrivateKey on success, untouched otherwise.
3267 // Returns true on success, false on failure.
3268 bool LoadPrivateKeyOpenSSL(const base::FilePath& filepath,
3269 scoped_refptr<SSLPrivateKey>* pkey) {
davidben 2016/01/28 22:24:09 Why not just return a scoped_refptr<Thingy>?
svaldez 2016/01/29 17:19:30 Done.
3270 std::string data;
3271 if (!base::ReadFileToString(filepath, &data)) {
3272 LOG(ERROR) << "Could not read private key file: "
3273 << filepath.value() << ": " << strerror(errno);
davidben 2016/01/28 22:24:10 I'd drop the errno bit. I'm not sure that works on
svaldez 2016/01/29 17:19:29 Done.
3274 return false;
3275 }
3276 crypto::ScopedBIO bio(BIO_new_mem_buf(
3277 const_cast<char*>(reinterpret_cast<const char*>(data.data())),
davidben 2016/01/28 22:24:10 I think you only need the const_cast.
svaldez 2016/01/29 17:19:29 Done.
3278 static_cast<int>(data.size())));
3279 if (!bio.get()) {
davidben 2016/01/28 22:24:10 !bio also works.
svaldez 2016/01/29 17:19:30 Done.
3280 LOG(ERROR) << "Could not allocate BIO for buffer?";
3281 return false;
3282 }
3283 EVP_PKEY* result = PEM_read_bio_PrivateKey(bio.get(), NULL, NULL, NULL);
davidben 2016/01/28 22:24:09 crypto::ScopedEVP_PKEY result(PEM_read_bio_Private
svaldez 2016/01/29 17:19:30 Done.
3284 if (result == NULL) {
3285 LOG(ERROR) << "Could not decode private key file: "
3286 << filepath.value();
3287 return false;
3288 }
3289 *pkey = WrapOpenSSLPrivateKey(crypto::ScopedEVP_PKEY(result));
3290 return true;
3291 }
3292
3293 class SSLClientSocketOpenSSLClientAuthTest : public PlatformTest {
davidben 2016/01/28 22:24:09 I think this class is more-or-less a subset of SSL
svaldez 2016/01/29 17:19:29 Done.
3294 public:
3295 SSLClientSocketOpenSSLClientAuthTest()
3296 : socket_factory_(ClientSocketFactory::GetDefaultFactory()),
3297 cert_verifier_(new MockCertVerifier),
3298 transport_security_state_(new TransportSecurityState) {
3299 cert_verifier_->set_default_result(OK);
3300 context_.cert_verifier = cert_verifier_.get();
3301 context_.transport_security_state = transport_security_state_.get();
3302 }
3303
3304 ~SSLClientSocketOpenSSLClientAuthTest() override {}
3305
3306 protected:
3307 scoped_ptr<SSLClientSocket> CreateSSLClientSocket(
3308 scoped_ptr<StreamSocket> transport_socket,
3309 const HostPortPair& host_and_port,
3310 const SSLConfig& ssl_config) {
3311 scoped_ptr<ClientSocketHandle> connection(new ClientSocketHandle);
3312 connection->SetSocket(std::move(transport_socket));
3313 return socket_factory_->CreateSSLClientSocket(
3314 std::move(connection), host_and_port, ssl_config, context_);
3315 }
3316
3317 // Connect to a HTTPS test server.
3318 bool ConnectToTestServer(SpawnedTestServer::SSLOptions& ssl_options) {
3319 test_server_.reset(new SpawnedTestServer(SpawnedTestServer::TYPE_HTTPS,
3320 ssl_options,
3321 base::FilePath()));
3322 if (!test_server_->Start()) {
3323 LOG(ERROR) << "Could not start SpawnedTestServer";
3324 return false;
3325 }
3326
3327 if (!test_server_->GetAddressList(&addr_)) {
3328 LOG(ERROR) << "Could not get SpawnedTestServer address list";
3329 return false;
3330 }
3331
3332 transport_.reset(new TCPClientSocket(
3333 addr_, &log_, NetLog::Source()));
3334 int rv = callback_.GetResult(
3335 transport_->Connect(callback_.callback()));
3336 if (rv != OK) {
3337 LOG(ERROR) << "Could not connect to SpawnedTestServer";
3338 return false;
3339 }
3340 return true;
3341 }
3342
3343 // Create an SSLClientSocket object and use it to connect to a test
3344 // server, then wait for connection results. This must be called after
3345 // a succesful ConnectToTestServer() call.
3346 // |ssl_config| the SSL configuration to use.
3347 // |result| will retrieve the ::Connect() result value.
3348 // Returns true on succes, false otherwise. Success means that the socket
3349 // could be created and its Connect() was called, not that the connection
3350 // itself was a success.
3351 bool CreateAndConnectSSLClientSocket(const SSLConfig& ssl_config,
3352 int* result) {
3353 sock_ = CreateSSLClientSocket(std::move(transport_),
3354 test_server_->host_port_pair(), ssl_config);
3355
3356 if (sock_->IsConnected()) {
3357 LOG(ERROR) << "SSL Socket prematurely connected";
3358 return false;
3359 }
3360
3361 *result = callback_.GetResult(sock_->Connect(callback_.callback()));
3362 return true;
3363 }
3364
3365
3366 // Check that the client certificate was sent.
3367 // Returns true on success.
3368 bool CheckSSLClientSocketSentCert() {
3369 SSLInfo ssl_info;
3370 sock_->GetSSLInfo(&ssl_info);
3371 return ssl_info.client_cert_sent;
3372 }
3373
3374 ClientSocketFactory* socket_factory_;
3375 scoped_ptr<MockCertVerifier> cert_verifier_;
3376 scoped_ptr<TransportSecurityState> transport_security_state_;
3377 SSLClientSocketContext context_;
3378 scoped_ptr<SpawnedTestServer> test_server_;
3379 AddressList addr_;
3380 TestCompletionCallback callback_;
3381 NetLog log_;
3382 scoped_ptr<StreamSocket> transport_;
3383 scoped_ptr<SSLClientSocket> sock_;
3384 };
3385
3386 // Connect to a server requesting client authentication, do not send
3387 // any client certificates. It should refuse the connection.
3388 TEST_F(SSLClientSocketOpenSSLClientAuthTest, NoCert) {
davidben 2016/01/28 22:24:10 Why is this test in the anonymous namespace and no
svaldez 2016/01/29 17:19:30 Done.
3389 SpawnedTestServer::SSLOptions ssl_options;
3390 ssl_options.request_client_certificate = true;
3391
3392 ASSERT_TRUE(ConnectToTestServer(ssl_options));
3393
3394 base::FilePath certs_dir = GetTestCertsDirectory();
3395
3396 int rv;
3397 ASSERT_TRUE(CreateAndConnectSSLClientSocket(SSLConfig(), &rv));
3398
3399 EXPECT_EQ(ERR_SSL_CLIENT_AUTH_CERT_NEEDED, rv);
3400 EXPECT_FALSE(sock_->IsConnected());
3401 }
3402
3403 } // namespace
3404
3405 // Connect to a server requesting client authentication, and send it
3406 // an empty certificate. It should refuse the connection.
davidben 2016/01/28 22:24:09 It doesn't seem to actually refuse the connection.
davidben 2016/01/28 22:24:10 an empty -> no
svaldez 2016/01/29 17:19:30 This sends an empty cert (send_client_cert is true
3407 TEST_F(SSLClientSocketOpenSSLClientAuthTest, SendEmptyCert) {
3408 SpawnedTestServer::SSLOptions ssl_options;
3409 ssl_options.request_client_certificate = true;
3410 ssl_options.client_authorities.push_back(
3411 GetTestClientCertsDirectory().AppendASCII("client_1_ca.pem"));
3412
3413 ASSERT_TRUE(ConnectToTestServer(ssl_options));
3414
3415 base::FilePath certs_dir = GetTestCertsDirectory();
davidben 2016/01/28 22:24:09 This looks unused.
svaldez 2016/01/29 17:19:29 Done.
3416 SSLConfig ssl_config;
3417 ssl_config.send_client_cert = true;
3418 ssl_config.client_cert = NULL;
davidben 2016/01/28 22:24:09 nullptr
svaldez 2016/01/29 17:19:29 Done.
3419 ssl_config.client_private_key = NULL;
3420
3421 int rv;
3422 ASSERT_TRUE(CreateAndConnectSSLClientSocket(ssl_config, &rv));
3423
3424 EXPECT_EQ(OK, rv);
3425 EXPECT_TRUE(sock_->IsConnected());
3426 }
3427
3428 // Connect to a server requesting client authentication. Send it a
3429 // matching certificate. It should allow the connection.
3430 TEST_F(SSLClientSocketOpenSSLClientAuthTest, SendGoodCert) {
3431 SpawnedTestServer::SSLOptions ssl_options;
3432 ssl_options.request_client_certificate = true;
3433 ssl_options.client_authorities.push_back(
3434 GetTestClientCertsDirectory().AppendASCII("client_1_ca.pem"));
3435
3436 ASSERT_TRUE(ConnectToTestServer(ssl_options));
3437
3438 base::FilePath certs_dir = GetTestCertsDirectory();
3439 SSLConfig ssl_config;
3440 ssl_config.send_client_cert = true;
3441 ssl_config.client_cert = ImportCertFromFile(certs_dir, "client_1.pem");
3442
3443 // This is required to ensure that signing works with the client
3444 // certificate's private key.
3445 ASSERT_TRUE(LoadPrivateKeyOpenSSL(certs_dir.AppendASCII("client_1.key"),
3446 &(ssl_config.client_private_key)));
3447
3448 int rv;
3449 ASSERT_TRUE(CreateAndConnectSSLClientSocket(ssl_config, &rv));
3450
3451 EXPECT_EQ(OK, rv);
3452 EXPECT_TRUE(sock_->IsConnected());
3453
3454 EXPECT_TRUE(CheckSSLClientSocketSentCert());
3455
3456 sock_->Disconnect();
3457 EXPECT_FALSE(sock_->IsConnected());
3458 }
3459 #endif // defined(USE_OPENSSL)
3460
3243 } // namespace net 3461 } // namespace net
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698