Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(23)

Unified Diff: tests/standalone/io/secure_socket_bad_data_test.dart

Issue 18500006: dart:io | Pass errors from multithreaded encryption back to Dart. (Closed) Base URL: https://dart.googlecode.com/svn/branches/bleeding_edge/dart
Patch Set: Compile libssl_dart without DEBUG defined. Created 7 years, 5 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « sdk/lib/io/socket.dart ('k') | no next file » | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: tests/standalone/io/secure_socket_bad_data_test.dart
diff --git a/tests/standalone/io/secure_socket_bad_data_test.dart b/tests/standalone/io/secure_socket_bad_data_test.dart
new file mode 100644
index 0000000000000000000000000000000000000000..a0f1f4b07bc2769a74773fa3400283ae8a114f7b
--- /dev/null
+++ b/tests/standalone/io/secure_socket_bad_data_test.dart
@@ -0,0 +1,154 @@
+// Copyright (c) 2013, the Dart project authors. Please see the AUTHORS file
+// for details. All rights reserved. Use of this source code is governed by a
+// BSD-style license that can be found in the LICENSE file.
+//
+// VMOptions=
+// VMOptions=--short_socket_read
+// VMOptions=--short_socket_write
+// VMOptions=--short_socket_read --short_socket_write
+
+import "package:expect/expect.dart";
+import "dart:async";
+import "dart:io";
+import "dart:isolate";
+
+const HOST_NAME = "localhost";
+const CERTIFICATE = "localhost_cert";
+
+// This test sends corrupt data in the middle of a secure network connection.
+// This tests the error handling of RawSecureSocket.
+// A RawSocket connection is upgraded to a secure connection, so that we
+// have a reference to the underlying socket. Then we send some
+// unencrypted data on it, in the middle of an encrypted data transfer.
+
+
+// This test creates a server and then connects a client to the server.
+// After connecting, the connection is upgraded to a secure connection.
+// The client writes data to the server, then writes unencrypted data
+// on the underlying socket. When the server gets the unencrypted data,
+// this causes an error in the NSS code. When the NSS code is in debug
+// mode, bad data on the connection can cause an assertion failure, rather
+// than an exception.
+void test(bool hostnameInConnect) {
+ ReceivePort port = new ReceivePort();
+
+ const messageSize = 1000;
+
+ List<int> createTestData() {
+ List<int> data = new List<int>(messageSize);
+ for (int i = 0; i < messageSize; i++) {
+ data[i] = i & 0xff;
+ }
+ return data;
+ }
+
+ void verifyTestData(List<int> data) {
+ Expect.equals(messageSize, data.length);
+ List<int> expected = createTestData();
+ for (int i = 0; i < messageSize; i++) {
+ Expect.equals(expected[i], data[i]);
+ }
+ }
+
+ Future runServer(RawSocket client) {
+ final completer = new Completer();
+ final dataReceived = new List<int>(messageSize);
+ int bytesRead = 0;
+ client.writeEventsEnabled = false;
+ client.listen((event) {
+ switch (event) {
+ case RawSocketEvent.READ:
+ Expect.isTrue(client.available() > 0);
+ var buffer = client.read(200);
+ dataReceived.setRange(bytesRead, bytesRead + buffer.length, buffer);
+ bytesRead += buffer.length;
+ if (bytesRead == dataReceived.length) {
+ verifyTestData(dataReceived);
+ }
+ break;
+ case RawSocketEvent.WRITE:
+ Expect.fail('WRITE event received');
+ break;
+ case RawSocketEvent.READ_CLOSED:
+ Expect.fail('READ_CLOSED event received');
+ client.shutdown(SocketDirection.SEND);
+ completer.complete(null);
+ break;
+ default: throw "Unexpected event $event";
+ }
+ },
+ onError: (e) {
+ Expect.isTrue(e is TlsException);
+ Expect.isTrue(e.toString().contains(
+ 'received a record with an incorrect Message Authentication Code'));
+ completer.complete(null);
+ });
+ return completer.future;
+ }
+
+ Future<RawSocket> runClient(List sockets) {
+ RawSocket baseSocket = sockets[0];
+ RawSecureSocket socket = sockets[1];
+ final completer = new Completer();
+ final data = createTestData();
+ int bytesWritten = 0;
+ socket.listen((event) {
+ switch (event) {
+ case RawSocketEvent.READ:
+ Expect.fail('READ event received');
+ break;
+ case RawSocketEvent.WRITE:
+ if (bytesWritten < data.length) {
+ bytesWritten += socket.write(data, bytesWritten);
+ }
+ if (bytesWritten < data.length) {
+ socket.writeEventsEnabled = true;
+ }
+ if (bytesWritten == data.length) {
+ baseSocket.write(data, 0, 300);
+ socket.shutdown(SocketDirection.SEND);
+ }
+ break;
+ case RawSocketEvent.READ_CLOSED:
+ completer.complete(null);
+ break;
+ default: throw "Unexpected event $event";
+ }
+ });
+ return completer.future;
+ }
+
+
+ Future<List> connectClient(int port) =>
+ RawSocket.connect(HOST_NAME, port)
+ .then((socket) =>
+ (hostnameInConnect ? RawSecureSocket.secure(socket)
+ : RawSecureSocket.secure(socket, host: HOST_NAME))
+ .then((secureSocket) => [socket, secureSocket]));
+
+
+ serverReady(server) {
+ server.listen((client) {
+ RawSecureSocket.secureServer(client, CERTIFICATE).then((secureClient) {
+ Expect.throws(() => client.add([0]));
+ runServer(secureClient).then((_) => server.close());
+ });
+ });
+
+ connectClient(server.port)
+ .then(runClient)
+ .then((_) => port.close());
+ }
+
+ RawServerSocket.bind(HOST_NAME, 0).then(serverReady);
+}
+
+main() {
+ Path scriptDir = new Path(Platform.script).directoryPath;
+ Path certificateDatabase = scriptDir.append('pkcert');
+ SecureSocket.initialize(database: certificateDatabase.toNativePath(),
+ password: 'dartdart',
+ useBuiltinRoots: false);
+ test(false);
+ test(true);
+}
« no previous file with comments | « sdk/lib/io/socket.dart ('k') | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698