| OLD | NEW |
| 1 // Copyright 2015 The Chromium Authors. All rights reserved. | 1 // Copyright 2015 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "net/quic/crypto/proof_verifier_chromium.h" | 5 #include "net/quic/crypto/proof_verifier_chromium.h" |
| 6 | 6 |
| 7 #include "base/memory/ref_counted.h" | 7 #include "base/memory/ref_counted.h" |
| 8 #include "base/memory/scoped_ptr.h" | 8 #include "base/memory/scoped_ptr.h" |
| 9 #include "net/base/net_errors.h" | 9 #include "net/base/net_errors.h" |
| 10 #include "net/base/test_data_directory.h" | 10 #include "net/base/test_data_directory.h" |
| 11 #include "net/cert/cert_status_flags.h" | 11 #include "net/cert/cert_status_flags.h" |
| 12 #include "net/cert/cert_verifier.h" | 12 #include "net/cert/cert_verifier.h" |
| 13 #include "net/cert/ct_log_verifier.h" | 13 #include "net/cert/ct_log_verifier.h" |
| 14 #include "net/cert/ct_policy_enforcer.h" | 14 #include "net/cert/ct_policy_enforcer.h" |
| 15 #include "net/cert/ct_policy_status.h" |
| 15 #include "net/cert/ct_serialization.h" | 16 #include "net/cert/ct_serialization.h" |
| 16 #include "net/cert/ct_verify_result.h" | 17 #include "net/cert/ct_verify_result.h" |
| 17 #include "net/cert/mock_cert_verifier.h" | 18 #include "net/cert/mock_cert_verifier.h" |
| 18 #include "net/cert/multi_log_ct_verifier.h" | 19 #include "net/cert/multi_log_ct_verifier.h" |
| 19 #include "net/cert/x509_certificate.h" | 20 #include "net/cert/x509_certificate.h" |
| 20 #include "net/http/transport_security_state.h" | 21 #include "net/http/transport_security_state.h" |
| 21 #include "net/log/net_log.h" | 22 #include "net/log/net_log.h" |
| 22 #include "net/quic/crypto/proof_verifier.h" | 23 #include "net/quic/crypto/proof_verifier.h" |
| 23 #include "net/test/cert_test_util.h" | 24 #include "net/test/cert_test_util.h" |
| 24 #include "net/test/ct_test_util.h" | 25 #include "net/test/ct_test_util.h" |
| (...skipping 24 matching lines...) Expand all Loading... |
| 49 return ERR_FAILED; | 50 return ERR_FAILED; |
| 50 } | 51 } |
| 51 }; | 52 }; |
| 52 | 53 |
| 53 // CTPolicyEnforcer that will fail the test if it is ever called. | 54 // CTPolicyEnforcer that will fail the test if it is ever called. |
| 54 class FailsTestCTPolicyEnforcer : public CTPolicyEnforcer { | 55 class FailsTestCTPolicyEnforcer : public CTPolicyEnforcer { |
| 55 public: | 56 public: |
| 56 FailsTestCTPolicyEnforcer() {} | 57 FailsTestCTPolicyEnforcer() {} |
| 57 ~FailsTestCTPolicyEnforcer() override {} | 58 ~FailsTestCTPolicyEnforcer() override {} |
| 58 | 59 |
| 59 bool DoesConformToCTEVPolicy(X509Certificate* cert, | 60 ct::EVPolicyCompliance DoesConformToCTEVPolicy( |
| 60 const ct::EVCertsWhitelist* ev_whitelist, | 61 X509Certificate* cert, |
| 61 const ct::CTVerifyResult& ct_result, | 62 const ct::EVCertsWhitelist* ev_whitelist, |
| 62 const BoundNetLog& net_log) override { | 63 const ct::SCTList& verified_scts, |
| 64 const BoundNetLog& net_log) override { |
| 63 ADD_FAILURE() << "CTPolicyEnforcer::DoesConformToCTEVPolicy() should " | 65 ADD_FAILURE() << "CTPolicyEnforcer::DoesConformToCTEVPolicy() should " |
| 64 << "not be called"; | 66 << "not be called"; |
| 65 return false; | 67 return ct::EVPolicyCompliance::EV_POLICY_DOES_NOT_APPLY; |
| 66 } | 68 } |
| 67 }; | 69 }; |
| 68 | 70 |
| 69 // CTPolicyEnforcer that can simulate whether or not a given certificate | 71 // CTPolicyEnforcer that can simulate whether or not a given certificate |
| 70 // conforms to the CT/EV policy. | 72 // conforms to the CT/EV policy. |
| 71 class MockCTPolicyEnforcer : public CTPolicyEnforcer { | 73 class MockCTPolicyEnforcer : public CTPolicyEnforcer { |
| 72 public: | 74 public: |
| 73 MockCTPolicyEnforcer(bool is_ev) : is_ev_(is_ev) {} | 75 MockCTPolicyEnforcer(bool is_ev) : is_ev_(is_ev) {} |
| 74 ~MockCTPolicyEnforcer() override {} | 76 ~MockCTPolicyEnforcer() override {} |
| 75 | 77 |
| 76 bool DoesConformToCTEVPolicy(X509Certificate* cert, | 78 ct::EVPolicyCompliance DoesConformToCTEVPolicy( |
| 77 const ct::EVCertsWhitelist* ev_whitelist, | 79 X509Certificate* cert, |
| 78 const ct::CTVerifyResult& ct_result, | 80 const ct::EVCertsWhitelist* ev_whitelist, |
| 79 const BoundNetLog& net_log) override { | 81 const ct::SCTList& verified_scts, |
| 80 return is_ev_; | 82 const BoundNetLog& net_log) override { |
| 83 return is_ev_ ? ct::EVPolicyCompliance::EV_POLICY_COMPLIES_VIA_SCTS |
| 84 : ct::EVPolicyCompliance::EV_POLICY_NOT_ENOUGH_SCTS; |
| 81 } | 85 } |
| 82 | 86 |
| 83 private: | 87 private: |
| 84 bool is_ev_; | 88 bool is_ev_; |
| 85 }; | 89 }; |
| 86 | 90 |
| 87 class DummyProofVerifierCallback : public ProofVerifierCallback { | 91 class DummyProofVerifierCallback : public ProofVerifierCallback { |
| 88 public: | 92 public: |
| 89 DummyProofVerifierCallback() {} | 93 DummyProofVerifierCallback() {} |
| 90 ~DummyProofVerifierCallback() override {} | 94 ~DummyProofVerifierCallback() override {} |
| (...skipping 304 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 395 ASSERT_EQ(QUIC_SUCCESS, status); | 399 ASSERT_EQ(QUIC_SUCCESS, status); |
| 396 | 400 |
| 397 ASSERT_TRUE(details_.get()); | 401 ASSERT_TRUE(details_.get()); |
| 398 ProofVerifyDetailsChromium* verify_details = | 402 ProofVerifyDetailsChromium* verify_details = |
| 399 static_cast<ProofVerifyDetailsChromium*>(details_.get()); | 403 static_cast<ProofVerifyDetailsChromium*>(details_.get()); |
| 400 EXPECT_EQ(0u, verify_details->cert_verify_result.cert_status); | 404 EXPECT_EQ(0u, verify_details->cert_verify_result.cert_status); |
| 401 } | 405 } |
| 402 | 406 |
| 403 } // namespace test | 407 } // namespace test |
| 404 } // namespace net | 408 } // namespace net |
| OLD | NEW |