| OLD | NEW |
| 1 // Copyright 2015 The Chromium Authors. All rights reserved. | 1 // Copyright 2015 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "components/gcm_driver/crypto/gcm_key_store.h" | 5 #include "components/gcm_driver/crypto/gcm_key_store.h" |
| 6 | 6 |
| 7 #include <string> |
| 8 |
| 7 #include "base/bind.h" | 9 #include "base/bind.h" |
| 8 #include "base/bind_helpers.h" | 10 #include "base/bind_helpers.h" |
| 9 #include "base/files/scoped_temp_dir.h" | 11 #include "base/files/scoped_temp_dir.h" |
| 10 #include "base/message_loop/message_loop.h" | 12 #include "base/message_loop/message_loop.h" |
| 11 #include "base/run_loop.h" | 13 #include "base/run_loop.h" |
| 12 #include "base/test/histogram_tester.h" | 14 #include "base/test/histogram_tester.h" |
| 13 #include "base/thread_task_runner_handle.h" | 15 #include "base/thread_task_runner_handle.h" |
| 14 #include "components/gcm_driver/crypto/p256_key_util.h" | 16 #include "components/gcm_driver/crypto/p256_key_util.h" |
| 17 #include "net/test/gtest_util.h" |
| 15 #include "testing/gtest/include/gtest/gtest.h" | 18 #include "testing/gtest/include/gtest/gtest.h" |
| 16 | 19 |
| 17 namespace gcm { | 20 namespace gcm { |
| 18 | 21 |
| 19 namespace { | 22 namespace { |
| 20 | 23 |
| 21 const char kFakeAppId[] = "my_app_id"; | 24 const char kFakeAppId[] = "my_app_id"; |
| 22 const char kSecondFakeAppId[] = "my_other_app_id"; | 25 const char kSecondFakeAppId[] = "my_other_app_id"; |
| 26 const char kFakeAuthorizedEntity[] = "my_sender_id"; |
| 27 const char kSecondFakeAuthorizedEntity[] = "my_other_sender_id"; |
| 23 | 28 |
| 24 class GCMKeyStoreTest : public ::testing::Test { | 29 class GCMKeyStoreTest : public ::testing::Test { |
| 25 public: | 30 public: |
| 26 GCMKeyStoreTest() {} | 31 GCMKeyStoreTest() {} |
| 27 ~GCMKeyStoreTest() override {} | 32 ~GCMKeyStoreTest() override {} |
| 28 | 33 |
| 29 void SetUp() override { | 34 void SetUp() override { |
| 30 ASSERT_TRUE(scoped_temp_dir_.CreateUniqueTempDir()); | 35 ASSERT_TRUE(scoped_temp_dir_.CreateUniqueTempDir()); |
| 31 CreateKeyStore(); | 36 CreateKeyStore(); |
| 32 } | 37 } |
| 33 | 38 |
| 34 void TearDown() override { | 39 void TearDown() override { |
| 35 gcm_key_store_.reset(); | 40 gcm_key_store_.reset(); |
| 36 | 41 |
| 37 // |gcm_key_store_| owns a ProtoDatabaseImpl whose destructor deletes the | 42 // |gcm_key_store_| owns a ProtoDatabaseImpl whose destructor deletes the |
| 38 // underlying LevelDB database on the task runner. | 43 // underlying LevelDB database on the task runner. |
| 39 base::RunLoop().RunUntilIdle(); | 44 base::RunLoop().RunUntilIdle(); |
| 40 } | 45 } |
| 41 | 46 |
| 42 // Creates the GCM Key Store instance. May be called from within a test's body | 47 // Creates the GCM Key Store instance. May be called from within a test's body |
| 43 // to re-create the key store, causing the database to re-open. | 48 // to re-create the key store, causing the database to re-open. |
| 44 void CreateKeyStore() { | 49 void CreateKeyStore() { |
| 45 gcm_key_store_.reset( | 50 gcm_key_store_.reset( |
| 46 new GCMKeyStore(scoped_temp_dir_.path(), message_loop_.task_runner())); | 51 new GCMKeyStore(scoped_temp_dir_.path(), message_loop_.task_runner())); |
| 47 } | 52 } |
| 48 | 53 |
| 49 // Callback to use with GCMKeyStore::{GetKeys, CreateKeys} calls. | 54 // Callback to use with GCMKeyStore::{GetKeys, CreateKeys} calls. |
| 50 void GotKeys(KeyPair* pair_out, std::string* auth_secret_out, | 55 void GotKeys(KeyPair* pair_out, std::string* auth_secret_out, |
| 51 const KeyPair& pair, const std::string& auth_secret) { | 56 const KeyPair& pair, const std::string& auth_secret) { |
| 52 *pair_out = pair; | 57 if (pair_out) |
| 53 *auth_secret_out = auth_secret; | 58 *pair_out = pair; |
| 59 if (auth_secret_out) |
| 60 *auth_secret_out = auth_secret; |
| 54 } | 61 } |
| 55 | 62 |
| 56 protected: | 63 protected: |
| 57 GCMKeyStore* gcm_key_store() { return gcm_key_store_.get(); } | 64 GCMKeyStore* gcm_key_store() { return gcm_key_store_.get(); } |
| 58 base::HistogramTester* histogram_tester() { return &histogram_tester_; } | 65 base::HistogramTester* histogram_tester() { return &histogram_tester_; } |
| 59 | 66 |
| 60 private: | 67 private: |
| 61 base::MessageLoop message_loop_; | 68 base::MessageLoop message_loop_; |
| 62 base::ScopedTempDir scoped_temp_dir_; | 69 base::ScopedTempDir scoped_temp_dir_; |
| 63 base::HistogramTester histogram_tester_; | 70 base::HistogramTester histogram_tester_; |
| 64 | 71 |
| 65 std::unique_ptr<GCMKeyStore> gcm_key_store_; | 72 std::unique_ptr<GCMKeyStore> gcm_key_store_; |
| 66 }; | 73 }; |
| 67 | 74 |
| 68 TEST_F(GCMKeyStoreTest, EmptyByDefault) { | 75 TEST_F(GCMKeyStoreTest, EmptyByDefault) { |
| 69 // The key store is initialized lazily, so this histogram confirms that | 76 // The key store is initialized lazily, so this histogram confirms that |
| 70 // calling the constructor does not in fact cause initialization. | 77 // calling the constructor does not in fact cause initialization. |
| 71 histogram_tester()->ExpectTotalCount( | 78 histogram_tester()->ExpectTotalCount( |
| 72 "GCM.Crypto.InitKeyStoreSuccessRate", 0); | 79 "GCM.Crypto.InitKeyStoreSuccessRate", 0); |
| 73 | 80 |
| 74 KeyPair pair; | 81 KeyPair pair; |
| 75 std::string auth_secret; | 82 std::string auth_secret; |
| 76 gcm_key_store()->GetKeys(kFakeAppId, | 83 gcm_key_store()->GetKeys( |
| 77 base::Bind(&GCMKeyStoreTest::GotKeys, | 84 kFakeAppId, kFakeAuthorizedEntity, |
| 78 base::Unretained(this), &pair, | 85 false /* fallback_to_empty_authorized_entity */, |
| 79 &auth_secret)); | 86 base::Bind(&GCMKeyStoreTest::GotKeys, base::Unretained(this), &pair, |
| 87 &auth_secret)); |
| 80 | 88 |
| 81 base::RunLoop().RunUntilIdle(); | 89 base::RunLoop().RunUntilIdle(); |
| 82 | 90 |
| 83 ASSERT_FALSE(pair.IsInitialized()); | 91 ASSERT_FALSE(pair.IsInitialized()); |
| 84 EXPECT_FALSE(pair.has_type()); | 92 EXPECT_FALSE(pair.has_type()); |
| 85 EXPECT_EQ(0u, auth_secret.size()); | 93 EXPECT_EQ(0u, auth_secret.size()); |
| 86 | 94 |
| 87 histogram_tester()->ExpectBucketCount( | 95 histogram_tester()->ExpectBucketCount( |
| 88 "GCM.Crypto.GetKeySuccessRate", 0, 1); // failure | 96 "GCM.Crypto.GetKeySuccessRate", 0, 1); // failure |
| 89 } | 97 } |
| 90 | 98 |
| 91 TEST_F(GCMKeyStoreTest, CreateAndGetKeys) { | 99 TEST_F(GCMKeyStoreTest, CreateAndGetKeys) { |
| 92 KeyPair pair; | 100 KeyPair pair; |
| 93 std::string auth_secret; | 101 std::string auth_secret; |
| 94 gcm_key_store()->CreateKeys(kFakeAppId, | 102 gcm_key_store()->CreateKeys( |
| 95 base::Bind(&GCMKeyStoreTest::GotKeys, | 103 kFakeAppId, kFakeAuthorizedEntity, |
| 96 base::Unretained(this), &pair, | 104 base::Bind(&GCMKeyStoreTest::GotKeys, base::Unretained(this), &pair, |
| 97 &auth_secret)); | 105 &auth_secret)); |
| 98 | 106 |
| 99 base::RunLoop().RunUntilIdle(); | 107 base::RunLoop().RunUntilIdle(); |
| 100 | 108 |
| 101 ASSERT_TRUE(pair.IsInitialized()); | 109 ASSERT_TRUE(pair.IsInitialized()); |
| 102 ASSERT_TRUE(pair.has_private_key()); | 110 ASSERT_TRUE(pair.has_private_key()); |
| 103 ASSERT_TRUE(pair.has_public_key()); | 111 ASSERT_TRUE(pair.has_public_key()); |
| 104 | 112 |
| 105 EXPECT_GT(pair.public_key().size(), 0u); | 113 EXPECT_GT(pair.public_key().size(), 0u); |
| 106 EXPECT_GT(pair.private_key().size(), 0u); | 114 EXPECT_GT(pair.private_key().size(), 0u); |
| 107 | 115 |
| 108 ASSERT_GT(auth_secret.size(), 0u); | 116 ASSERT_GT(auth_secret.size(), 0u); |
| 109 | 117 |
| 110 histogram_tester()->ExpectBucketCount( | 118 histogram_tester()->ExpectBucketCount( |
| 111 "GCM.Crypto.CreateKeySuccessRate", 1, 1); // success | 119 "GCM.Crypto.CreateKeySuccessRate", 1, 1); // success |
| 112 | 120 |
| 113 KeyPair read_pair; | 121 KeyPair read_pair; |
| 114 std::string read_auth_secret; | 122 std::string read_auth_secret; |
| 115 gcm_key_store()->GetKeys(kFakeAppId, | 123 gcm_key_store()->GetKeys( |
| 116 base::Bind(&GCMKeyStoreTest::GotKeys, | 124 kFakeAppId, kFakeAuthorizedEntity, |
| 117 base::Unretained(this), &read_pair, | 125 false /* fallback_to_empty_authorized_entity */, |
| 118 &read_auth_secret)); | 126 base::Bind(&GCMKeyStoreTest::GotKeys, base::Unretained(this), &read_pair, |
| 127 &read_auth_secret)); |
| 119 | 128 |
| 120 base::RunLoop().RunUntilIdle(); | 129 base::RunLoop().RunUntilIdle(); |
| 121 | 130 |
| 122 ASSERT_TRUE(read_pair.IsInitialized()); | 131 ASSERT_TRUE(read_pair.IsInitialized()); |
| 123 | 132 |
| 124 EXPECT_EQ(pair.type(), read_pair.type()); | 133 EXPECT_EQ(pair.type(), read_pair.type()); |
| 125 EXPECT_EQ(pair.private_key(), read_pair.private_key()); | 134 EXPECT_EQ(pair.private_key(), read_pair.private_key()); |
| 126 EXPECT_EQ(pair.public_key(), read_pair.public_key()); | 135 EXPECT_EQ(pair.public_key(), read_pair.public_key()); |
| 127 | 136 |
| 128 EXPECT_EQ(auth_secret, read_auth_secret); | 137 EXPECT_EQ(auth_secret, read_auth_secret); |
| 129 | 138 |
| 130 histogram_tester()->ExpectBucketCount( | 139 histogram_tester()->ExpectBucketCount("GCM.Crypto.GetKeySuccessRate", 1, |
| 131 "GCM.Crypto.GetKeySuccessRate", 1, 1); // failure | 140 1); // success |
| 141 |
| 142 // GetKey should also succeed if fallback_to_empty_authorized_entity is true |
| 143 // (fallback should not occur, since an exact match is found). |
| 144 gcm_key_store()->GetKeys( |
| 145 kFakeAppId, kFakeAuthorizedEntity, |
| 146 true /* fallback_to_empty_authorized_entity */, |
| 147 base::Bind(&GCMKeyStoreTest::GotKeys, base::Unretained(this), &read_pair, |
| 148 &read_auth_secret)); |
| 149 |
| 150 base::RunLoop().RunUntilIdle(); |
| 151 |
| 152 ASSERT_TRUE(read_pair.IsInitialized()); |
| 153 |
| 154 EXPECT_EQ(pair.type(), read_pair.type()); |
| 155 EXPECT_EQ(pair.private_key(), read_pair.private_key()); |
| 156 EXPECT_EQ(pair.public_key(), read_pair.public_key()); |
| 157 |
| 158 EXPECT_EQ(auth_secret, read_auth_secret); |
| 159 |
| 160 histogram_tester()->ExpectBucketCount("GCM.Crypto.GetKeySuccessRate", 1, |
| 161 2); // another success |
| 162 } |
| 163 |
| 164 TEST_F(GCMKeyStoreTest, GetKeysFallback) { |
| 165 KeyPair pair; |
| 166 std::string auth_secret; |
| 167 gcm_key_store()->CreateKeys( |
| 168 kFakeAppId, "" /* empty authorized entity for non-InstanceID */, |
| 169 base::Bind(&GCMKeyStoreTest::GotKeys, base::Unretained(this), &pair, |
| 170 &auth_secret)); |
| 171 |
| 172 base::RunLoop().RunUntilIdle(); |
| 173 |
| 174 ASSERT_TRUE(pair.IsInitialized()); |
| 175 ASSERT_TRUE(pair.has_private_key()); |
| 176 ASSERT_TRUE(pair.has_public_key()); |
| 177 |
| 178 EXPECT_GT(pair.public_key().size(), 0u); |
| 179 EXPECT_GT(pair.private_key().size(), 0u); |
| 180 |
| 181 ASSERT_GT(auth_secret.size(), 0u); |
| 182 |
| 183 histogram_tester()->ExpectBucketCount("GCM.Crypto.CreateKeySuccessRate", 1, |
| 184 1); // success |
| 185 |
| 186 // GetKeys should fail when fallback_to_empty_authorized_entity is false, as |
| 187 // there is not an exact match for kFakeAuthorizedEntity. |
| 188 KeyPair read_pair; |
| 189 std::string read_auth_secret; |
| 190 gcm_key_store()->GetKeys( |
| 191 kFakeAppId, kFakeAuthorizedEntity, |
| 192 false /* fallback_to_empty_authorized_entity */, |
| 193 base::Bind(&GCMKeyStoreTest::GotKeys, base::Unretained(this), &read_pair, |
| 194 &read_auth_secret)); |
| 195 |
| 196 base::RunLoop().RunUntilIdle(); |
| 197 |
| 198 ASSERT_FALSE(read_pair.IsInitialized()); |
| 199 EXPECT_FALSE(read_pair.has_type()); |
| 200 EXPECT_EQ(0u, read_auth_secret.size()); |
| 201 |
| 202 histogram_tester()->ExpectBucketCount("GCM.Crypto.GetKeySuccessRate", 0, |
| 203 1); // failure |
| 204 |
| 205 // GetKey should succeed when fallback_to_empty_authorized_entity is true, as |
| 206 // falling back to empty authorized entity will match the created key. |
| 207 gcm_key_store()->GetKeys( |
| 208 kFakeAppId, kFakeAuthorizedEntity, |
| 209 true /* fallback_to_empty_authorized_entity */, |
| 210 base::Bind(&GCMKeyStoreTest::GotKeys, base::Unretained(this), &read_pair, |
| 211 &read_auth_secret)); |
| 212 |
| 213 base::RunLoop().RunUntilIdle(); |
| 214 |
| 215 ASSERT_TRUE(read_pair.IsInitialized()); |
| 216 |
| 217 EXPECT_EQ(pair.type(), read_pair.type()); |
| 218 EXPECT_EQ(pair.private_key(), read_pair.private_key()); |
| 219 EXPECT_EQ(pair.public_key(), read_pair.public_key()); |
| 220 |
| 221 EXPECT_EQ(auth_secret, read_auth_secret); |
| 222 |
| 223 histogram_tester()->ExpectBucketCount("GCM.Crypto.GetKeySuccessRate", 1, |
| 224 1); // success |
| 132 } | 225 } |
| 133 | 226 |
| 134 TEST_F(GCMKeyStoreTest, KeysPersistenceBetweenInstances) { | 227 TEST_F(GCMKeyStoreTest, KeysPersistenceBetweenInstances) { |
| 135 KeyPair pair; | 228 KeyPair pair; |
| 136 std::string auth_secret; | 229 std::string auth_secret; |
| 137 gcm_key_store()->CreateKeys(kFakeAppId, | 230 gcm_key_store()->CreateKeys( |
| 138 base::Bind(&GCMKeyStoreTest::GotKeys, | 231 kFakeAppId, kFakeAuthorizedEntity, |
| 139 base::Unretained(this), &pair, | 232 base::Bind(&GCMKeyStoreTest::GotKeys, base::Unretained(this), &pair, |
| 140 &auth_secret)); | 233 &auth_secret)); |
| 141 | 234 |
| 142 base::RunLoop().RunUntilIdle(); | 235 base::RunLoop().RunUntilIdle(); |
| 143 | 236 |
| 144 ASSERT_TRUE(pair.IsInitialized()); | 237 ASSERT_TRUE(pair.IsInitialized()); |
| 145 | 238 |
| 146 histogram_tester()->ExpectBucketCount( | 239 histogram_tester()->ExpectBucketCount( |
| 147 "GCM.Crypto.InitKeyStoreSuccessRate", 1, 1); // success | 240 "GCM.Crypto.InitKeyStoreSuccessRate", 1, 1); // success |
| 148 histogram_tester()->ExpectBucketCount( | 241 histogram_tester()->ExpectBucketCount( |
| 149 "GCM.Crypto.LoadKeyStoreSuccessRate", 1, 1); // success | 242 "GCM.Crypto.LoadKeyStoreSuccessRate", 1, 1); // success |
| 150 | 243 |
| 151 // Create a new GCM Key Store instance. | 244 // Create a new GCM Key Store instance. |
| 152 CreateKeyStore(); | 245 CreateKeyStore(); |
| 153 | 246 |
| 154 KeyPair read_pair; | 247 KeyPair read_pair; |
| 155 std::string read_auth_secret; | 248 std::string read_auth_secret; |
| 156 gcm_key_store()->GetKeys(kFakeAppId, | 249 gcm_key_store()->GetKeys( |
| 157 base::Bind(&GCMKeyStoreTest::GotKeys, | 250 kFakeAppId, kFakeAuthorizedEntity, |
| 158 base::Unretained(this), &read_pair, | 251 false /* fallback_to_empty_authorized_entity */, |
| 159 &read_auth_secret)); | 252 base::Bind(&GCMKeyStoreTest::GotKeys, base::Unretained(this), &read_pair, |
| 253 &read_auth_secret)); |
| 160 | 254 |
| 161 base::RunLoop().RunUntilIdle(); | 255 base::RunLoop().RunUntilIdle(); |
| 162 | 256 |
| 163 ASSERT_TRUE(read_pair.IsInitialized()); | 257 ASSERT_TRUE(read_pair.IsInitialized()); |
| 164 EXPECT_TRUE(read_pair.has_type()); | 258 EXPECT_TRUE(read_pair.has_type()); |
| 165 EXPECT_GT(read_auth_secret.size(), 0u); | 259 EXPECT_GT(read_auth_secret.size(), 0u); |
| 166 | 260 |
| 167 histogram_tester()->ExpectBucketCount( | 261 histogram_tester()->ExpectBucketCount( |
| 168 "GCM.Crypto.InitKeyStoreSuccessRate", 1, 2); // success | 262 "GCM.Crypto.InitKeyStoreSuccessRate", 1, 2); // success |
| 169 histogram_tester()->ExpectBucketCount( | 263 histogram_tester()->ExpectBucketCount( |
| 170 "GCM.Crypto.LoadKeyStoreSuccessRate", 1, 2); // success | 264 "GCM.Crypto.LoadKeyStoreSuccessRate", 1, 2); // success |
| 171 } | 265 } |
| 172 | 266 |
| 173 TEST_F(GCMKeyStoreTest, CreateAndRemoveKeys) { | 267 TEST_F(GCMKeyStoreTest, CreateAndRemoveKeys) { |
| 174 KeyPair pair; | 268 KeyPair pair; |
| 175 std::string auth_secret; | 269 std::string auth_secret; |
| 176 gcm_key_store()->CreateKeys(kFakeAppId, | 270 gcm_key_store()->CreateKeys( |
| 177 base::Bind(&GCMKeyStoreTest::GotKeys, | 271 kFakeAppId, kFakeAuthorizedEntity, |
| 178 base::Unretained(this), &pair, | 272 base::Bind(&GCMKeyStoreTest::GotKeys, base::Unretained(this), &pair, |
| 179 &auth_secret)); | 273 &auth_secret)); |
| 180 | 274 |
| 181 base::RunLoop().RunUntilIdle(); | 275 base::RunLoop().RunUntilIdle(); |
| 182 | 276 |
| 183 ASSERT_TRUE(pair.IsInitialized()); | 277 ASSERT_TRUE(pair.IsInitialized()); |
| 184 | 278 |
| 185 KeyPair read_pair; | 279 KeyPair read_pair; |
| 186 std::string read_auth_secret; | 280 std::string read_auth_secret; |
| 187 gcm_key_store()->GetKeys(kFakeAppId, | 281 gcm_key_store()->GetKeys( |
| 188 base::Bind(&GCMKeyStoreTest::GotKeys, | 282 kFakeAppId, kFakeAuthorizedEntity, |
| 189 base::Unretained(this), &read_pair, | 283 false /* fallback_to_empty_authorized_entity */, |
| 190 &read_auth_secret)); | 284 base::Bind(&GCMKeyStoreTest::GotKeys, base::Unretained(this), &read_pair, |
| 285 &read_auth_secret)); |
| 191 | 286 |
| 192 base::RunLoop().RunUntilIdle(); | 287 base::RunLoop().RunUntilIdle(); |
| 193 | 288 |
| 194 ASSERT_TRUE(read_pair.IsInitialized()); | 289 ASSERT_TRUE(read_pair.IsInitialized()); |
| 195 EXPECT_TRUE(read_pair.has_type()); | 290 EXPECT_TRUE(read_pair.has_type()); |
| 196 | 291 |
| 197 gcm_key_store()->RemoveKeys(kFakeAppId, base::Bind(&base::DoNothing)); | 292 gcm_key_store()->RemoveKeys(kFakeAppId, kFakeAuthorizedEntity, |
| 293 base::Bind(&base::DoNothing)); |
| 198 | 294 |
| 199 base::RunLoop().RunUntilIdle(); | 295 base::RunLoop().RunUntilIdle(); |
| 200 | 296 |
| 201 histogram_tester()->ExpectBucketCount( | 297 histogram_tester()->ExpectBucketCount( |
| 202 "GCM.Crypto.RemoveKeySuccessRate", 1, 1); // success | 298 "GCM.Crypto.RemoveKeySuccessRate", 1, 1); // success |
| 203 | 299 |
| 204 gcm_key_store()->GetKeys(kFakeAppId, | 300 gcm_key_store()->GetKeys( |
| 205 base::Bind(&GCMKeyStoreTest::GotKeys, | 301 kFakeAppId, kFakeAuthorizedEntity, |
| 206 base::Unretained(this), &read_pair, | 302 false /* fallback_to_empty_authorized_entity */, |
| 207 &read_auth_secret)); | 303 base::Bind(&GCMKeyStoreTest::GotKeys, base::Unretained(this), &read_pair, |
| 304 &read_auth_secret)); |
| 208 | 305 |
| 209 base::RunLoop().RunUntilIdle(); | 306 base::RunLoop().RunUntilIdle(); |
| 210 | 307 |
| 211 ASSERT_FALSE(read_pair.IsInitialized()); | 308 ASSERT_FALSE(read_pair.IsInitialized()); |
| 212 } | 309 } |
| 213 | 310 |
| 214 TEST_F(GCMKeyStoreTest, CreateAndRemoveKeysSynchronously) { | 311 TEST_F(GCMKeyStoreTest, CreateGetAndRemoveKeysSynchronously) { |
| 215 KeyPair pair; | 312 KeyPair pair; |
| 216 std::string auth_secret; | 313 std::string auth_secret; |
| 217 gcm_key_store()->CreateKeys(kFakeAppId, | 314 gcm_key_store()->CreateKeys( |
| 218 base::Bind(&GCMKeyStoreTest::GotKeys, | 315 kFakeAppId, kFakeAuthorizedEntity, |
| 219 base::Unretained(this), &pair, | 316 base::Bind(&GCMKeyStoreTest::GotKeys, base::Unretained(this), &pair, |
| 220 &auth_secret)); | 317 &auth_secret)); |
| 221 | 318 |
| 222 // Continue synchronously, without running RunUntilIdle first. | 319 // Continue synchronously, without running RunUntilIdle first. |
| 223 gcm_key_store()->RemoveKeys(kFakeAppId, base::Bind(&base::DoNothing)); | 320 KeyPair pair_after_create; |
| 321 std::string auth_secret_after_create; |
| 322 gcm_key_store()->GetKeys( |
| 323 kFakeAppId, kFakeAuthorizedEntity, |
| 324 false /* fallback_to_empty_authorized_entity */, |
| 325 base::Bind(&GCMKeyStoreTest::GotKeys, base::Unretained(this), |
| 326 &pair_after_create, &auth_secret_after_create)); |
| 327 |
| 328 // Continue synchronously, without running RunUntilIdle first. |
| 329 gcm_key_store()->RemoveKeys(kFakeAppId, kFakeAuthorizedEntity, |
| 330 base::Bind(&base::DoNothing)); |
| 331 |
| 332 // Continue synchronously, without running RunUntilIdle first. |
| 333 KeyPair pair_after_remove; |
| 334 std::string auth_secret_after_remove; |
| 335 gcm_key_store()->GetKeys( |
| 336 kFakeAppId, kFakeAuthorizedEntity, |
| 337 false /* fallback_to_empty_authorized_entity */, |
| 338 base::Bind(&GCMKeyStoreTest::GotKeys, base::Unretained(this), |
| 339 &pair_after_remove, &auth_secret_after_remove)); |
| 340 |
| 341 base::RunLoop().RunUntilIdle(); |
| 342 |
| 343 histogram_tester()->ExpectBucketCount("GCM.Crypto.RemoveKeySuccessRate", 1, |
| 344 1); // success |
| 345 |
| 346 KeyPair pair_after_idle; |
| 347 std::string auth_secret_after_idle; |
| 348 gcm_key_store()->GetKeys( |
| 349 kFakeAppId, kFakeAuthorizedEntity, |
| 350 false /* fallback_to_empty_authorized_entity */, |
| 351 base::Bind(&GCMKeyStoreTest::GotKeys, base::Unretained(this), |
| 352 &pair_after_idle, &auth_secret_after_idle)); |
| 224 | 353 |
| 225 base::RunLoop().RunUntilIdle(); | 354 base::RunLoop().RunUntilIdle(); |
| 226 | 355 |
| 227 ASSERT_TRUE(pair.IsInitialized()); | 356 ASSERT_TRUE(pair.IsInitialized()); |
| 357 ASSERT_TRUE(pair_after_create.IsInitialized()); |
| 358 EXPECT_FALSE(pair_after_remove.IsInitialized()); |
| 359 EXPECT_FALSE(pair_after_idle.IsInitialized()); |
| 360 |
| 228 EXPECT_TRUE(pair.has_type()); | 361 EXPECT_TRUE(pair.has_type()); |
| 362 EXPECT_EQ(pair.type(), pair_after_create.type()); |
| 363 EXPECT_EQ(pair.private_key(), pair_after_create.private_key()); |
| 364 EXPECT_EQ(pair.public_key(), pair_after_create.public_key()); |
| 229 | 365 |
| 230 histogram_tester()->ExpectBucketCount( | 366 EXPECT_GT(auth_secret.size(), 0u); |
| 231 "GCM.Crypto.RemoveKeySuccessRate", 1, 1); // success | 367 EXPECT_EQ(auth_secret, auth_secret_after_create); |
| 368 EXPECT_EQ("", auth_secret_after_remove); |
| 369 EXPECT_EQ("", auth_secret_after_idle); |
| 370 } |
| 232 | 371 |
| 233 KeyPair read_pair; | 372 TEST_F(GCMKeyStoreTest, RemoveKeysWildcardAuthorizedEntity) { |
| 234 std::string read_auth_secret; | 373 KeyPair pair1, pair2, pair3; |
| 235 gcm_key_store()->GetKeys(kFakeAppId, | 374 std::string auth_secret1, auth_secret2, auth_secret3; |
| 236 base::Bind(&GCMKeyStoreTest::GotKeys, | 375 gcm_key_store()->CreateKeys( |
| 237 base::Unretained(this), &read_pair, | 376 kFakeAppId, kFakeAuthorizedEntity, |
| 238 &read_auth_secret)); | 377 base::Bind(&GCMKeyStoreTest::GotKeys, base::Unretained(this), &pair1, |
| 378 &auth_secret1)); |
| 379 gcm_key_store()->CreateKeys( |
| 380 kFakeAppId, kSecondFakeAuthorizedEntity, |
| 381 base::Bind(&GCMKeyStoreTest::GotKeys, base::Unretained(this), &pair2, |
| 382 &auth_secret2)); |
| 383 gcm_key_store()->CreateKeys( |
| 384 kSecondFakeAppId, kFakeAuthorizedEntity, |
| 385 base::Bind(&GCMKeyStoreTest::GotKeys, base::Unretained(this), &pair3, |
| 386 &auth_secret3)); |
| 239 | 387 |
| 240 base::RunLoop().RunUntilIdle(); | 388 base::RunLoop().RunUntilIdle(); |
| 241 | 389 |
| 242 ASSERT_FALSE(read_pair.IsInitialized()); | 390 ASSERT_TRUE(pair1.IsInitialized()); |
| 391 ASSERT_TRUE(pair2.IsInitialized()); |
| 392 ASSERT_TRUE(pair3.IsInitialized()); |
| 393 |
| 394 KeyPair read_pair1, read_pair2, read_pair3; |
| 395 std::string read_auth_secret1, read_auth_secret2, read_auth_secret3; |
| 396 gcm_key_store()->GetKeys( |
| 397 kFakeAppId, kFakeAuthorizedEntity, |
| 398 false /* fallback_to_empty_authorized_entity */, |
| 399 base::Bind(&GCMKeyStoreTest::GotKeys, base::Unretained(this), &read_pair1, |
| 400 &read_auth_secret1)); |
| 401 gcm_key_store()->GetKeys( |
| 402 kFakeAppId, kSecondFakeAuthorizedEntity, |
| 403 false /* fallback_to_empty_authorized_entity */, |
| 404 base::Bind(&GCMKeyStoreTest::GotKeys, base::Unretained(this), &read_pair2, |
| 405 &read_auth_secret2)); |
| 406 gcm_key_store()->GetKeys( |
| 407 kSecondFakeAppId, kFakeAuthorizedEntity, |
| 408 false /* fallback_to_empty_authorized_entity */, |
| 409 base::Bind(&GCMKeyStoreTest::GotKeys, base::Unretained(this), &read_pair3, |
| 410 &read_auth_secret3)); |
| 411 |
| 412 base::RunLoop().RunUntilIdle(); |
| 413 |
| 414 ASSERT_TRUE(read_pair1.IsInitialized()); |
| 415 EXPECT_TRUE(read_pair1.has_type()); |
| 416 ASSERT_TRUE(read_pair2.IsInitialized()); |
| 417 EXPECT_TRUE(read_pair2.has_type()); |
| 418 ASSERT_TRUE(read_pair3.IsInitialized()); |
| 419 EXPECT_TRUE(read_pair3.has_type()); |
| 420 |
| 421 gcm_key_store()->RemoveKeys(kFakeAppId, "*" /* authorized_entity */, |
| 422 base::Bind(&base::DoNothing)); |
| 423 |
| 424 base::RunLoop().RunUntilIdle(); |
| 425 |
| 426 histogram_tester()->ExpectBucketCount("GCM.Crypto.RemoveKeySuccessRate", 1, |
| 427 1); // success |
| 428 |
| 429 gcm_key_store()->GetKeys( |
| 430 kFakeAppId, kFakeAuthorizedEntity, |
| 431 false /* fallback_to_empty_authorized_entity */, |
| 432 base::Bind(&GCMKeyStoreTest::GotKeys, base::Unretained(this), &read_pair1, |
| 433 &read_auth_secret1)); |
| 434 gcm_key_store()->GetKeys( |
| 435 kFakeAppId, kSecondFakeAuthorizedEntity, |
| 436 false /* fallback_to_empty_authorized_entity */, |
| 437 base::Bind(&GCMKeyStoreTest::GotKeys, base::Unretained(this), &read_pair2, |
| 438 &read_auth_secret2)); |
| 439 gcm_key_store()->GetKeys( |
| 440 kSecondFakeAppId, kFakeAuthorizedEntity, |
| 441 false /* fallback_to_empty_authorized_entity */, |
| 442 base::Bind(&GCMKeyStoreTest::GotKeys, base::Unretained(this), &read_pair3, |
| 443 &read_auth_secret3)); |
| 444 |
| 445 base::RunLoop().RunUntilIdle(); |
| 446 |
| 447 EXPECT_FALSE(read_pair1.IsInitialized()); |
| 448 EXPECT_FALSE(read_pair2.IsInitialized()); |
| 449 ASSERT_TRUE(read_pair3.IsInitialized()); |
| 450 EXPECT_TRUE(read_pair3.has_type()); |
| 243 } | 451 } |
| 244 | 452 |
| 245 TEST_F(GCMKeyStoreTest, GetKeysMultipleAppIds) { | 453 TEST_F(GCMKeyStoreTest, GetKeysMultipleAppIds) { |
| 246 KeyPair pair; | 454 KeyPair pair; |
| 247 std::string auth_secret; | 455 std::string auth_secret; |
| 248 gcm_key_store()->CreateKeys(kFakeAppId, | 456 gcm_key_store()->CreateKeys( |
| 249 base::Bind(&GCMKeyStoreTest::GotKeys, | 457 kFakeAppId, kFakeAuthorizedEntity, |
| 250 base::Unretained(this), &pair, | 458 base::Bind(&GCMKeyStoreTest::GotKeys, base::Unretained(this), &pair, |
| 251 &auth_secret)); | 459 &auth_secret)); |
| 252 | 460 |
| 253 base::RunLoop().RunUntilIdle(); | 461 base::RunLoop().RunUntilIdle(); |
| 254 | 462 |
| 255 ASSERT_TRUE(pair.IsInitialized()); | 463 ASSERT_TRUE(pair.IsInitialized()); |
| 256 | 464 |
| 257 gcm_key_store()->CreateKeys(kSecondFakeAppId, | 465 gcm_key_store()->CreateKeys( |
| 258 base::Bind(&GCMKeyStoreTest::GotKeys, | 466 kSecondFakeAppId, kSecondFakeAuthorizedEntity, |
| 259 base::Unretained(this), &pair, | 467 base::Bind(&GCMKeyStoreTest::GotKeys, base::Unretained(this), &pair, |
| 260 &auth_secret)); | 468 &auth_secret)); |
| 261 | 469 |
| 262 base::RunLoop().RunUntilIdle(); | 470 base::RunLoop().RunUntilIdle(); |
| 263 | 471 |
| 264 ASSERT_TRUE(pair.IsInitialized()); | 472 ASSERT_TRUE(pair.IsInitialized()); |
| 265 | 473 |
| 266 KeyPair read_pair; | 474 KeyPair read_pair; |
| 267 std::string read_auth_secret; | 475 std::string read_auth_secret; |
| 268 gcm_key_store()->GetKeys(kFakeAppId, | 476 gcm_key_store()->GetKeys( |
| 269 base::Bind(&GCMKeyStoreTest::GotKeys, | 477 kFakeAppId, kFakeAuthorizedEntity, |
| 270 base::Unretained(this), &read_pair, | 478 false /* fallback_to_empty_authorized_entity */, |
| 271 &read_auth_secret)); | 479 base::Bind(&GCMKeyStoreTest::GotKeys, base::Unretained(this), &read_pair, |
| 480 &read_auth_secret)); |
| 272 | 481 |
| 273 base::RunLoop().RunUntilIdle(); | 482 base::RunLoop().RunUntilIdle(); |
| 274 | 483 |
| 275 ASSERT_TRUE(read_pair.IsInitialized()); | 484 ASSERT_TRUE(read_pair.IsInitialized()); |
| 276 EXPECT_TRUE(read_pair.has_type()); | 485 EXPECT_TRUE(read_pair.has_type()); |
| 277 } | 486 } |
| 278 | 487 |
| 279 TEST_F(GCMKeyStoreTest, SuccessiveCallsBeforeInitialization) { | 488 TEST_F(GCMKeyStoreTest, SuccessiveCallsBeforeInitialization) { |
| 280 KeyPair pair; | 489 KeyPair pair; |
| 281 std::string auth_secret; | 490 std::string auth_secret; |
| 282 gcm_key_store()->CreateKeys(kFakeAppId, | 491 gcm_key_store()->CreateKeys( |
| 283 base::Bind(&GCMKeyStoreTest::GotKeys, | 492 kFakeAppId, kFakeAuthorizedEntity, |
| 284 base::Unretained(this), &pair, | 493 base::Bind(&GCMKeyStoreTest::GotKeys, base::Unretained(this), &pair, |
| 285 &auth_secret)); | 494 &auth_secret)); |
| 286 | 495 |
| 287 // Deliberately do not run the message loop, so that the callback has not | 496 // Deliberately do not run the message loop, so that the callback has not |
| 288 // been resolved yet. The following EXPECT() ensures this. | 497 // been resolved yet. The following EXPECT() ensures this. |
| 289 EXPECT_FALSE(pair.IsInitialized()); | 498 EXPECT_FALSE(pair.IsInitialized()); |
| 290 | 499 |
| 291 KeyPair read_pair; | 500 KeyPair read_pair; |
| 292 std::string read_auth_secret; | 501 std::string read_auth_secret; |
| 293 gcm_key_store()->GetKeys(kFakeAppId, | 502 gcm_key_store()->GetKeys( |
| 294 base::Bind(&GCMKeyStoreTest::GotKeys, | 503 kFakeAppId, kFakeAuthorizedEntity, |
| 295 base::Unretained(this), &read_pair, | 504 false /* fallback_to_empty_authorized_entity */, |
| 296 &read_auth_secret)); | 505 base::Bind(&GCMKeyStoreTest::GotKeys, base::Unretained(this), &read_pair, |
| 506 &read_auth_secret)); |
| 297 | 507 |
| 298 EXPECT_FALSE(read_pair.IsInitialized()); | 508 EXPECT_FALSE(read_pair.IsInitialized()); |
| 299 | 509 |
| 300 // Now run the message loop. Both tasks should have finished executing. Due | 510 // Now run the message loop. Both tasks should have finished executing. Due |
| 301 // to the asynchronous nature of operations, however, we can't rely on the | 511 // to the asynchronous nature of operations, however, we can't rely on the |
| 302 // write to have finished before the read begins. | 512 // write to have finished before the read begins. |
| 303 base::RunLoop().RunUntilIdle(); | 513 base::RunLoop().RunUntilIdle(); |
| 304 | 514 |
| 305 EXPECT_TRUE(pair.IsInitialized()); | 515 EXPECT_TRUE(pair.IsInitialized()); |
| 306 } | 516 } |
| 307 | 517 |
| 518 TEST_F(GCMKeyStoreTest, CannotShareAppIdFromGCMToInstanceID) { |
| 519 gcm_key_store()->CreateKeys( |
| 520 kFakeAppId, "" /* empty authorized entity for non-InstanceID */, |
| 521 base::Bind(&GCMKeyStoreTest::GotKeys, base::Unretained(this), nullptr, |
| 522 nullptr)); |
| 523 |
| 524 base::RunLoop().RunUntilIdle(); |
| 525 |
| 526 EXPECT_DEBUG_DFATAL( |
| 527 { |
| 528 gcm_key_store()->CreateKeys( |
| 529 kFakeAppId, kFakeAuthorizedEntity, |
| 530 base::Bind(&GCMKeyStoreTest::GotKeys, base::Unretained(this), |
| 531 nullptr, nullptr)); |
| 532 |
| 533 base::RunLoop().RunUntilIdle(); |
| 534 }, |
| 535 "Instance ID tokens cannot share an app_id with a non-InstanceID GCM " |
| 536 "registration"); |
| 537 } |
| 538 |
| 539 TEST_F(GCMKeyStoreTest, CannotShareAppIdFromInstanceIDToGCM) { |
| 540 KeyPair pair_unused; |
| 541 std::string auth_secret_unused; |
| 542 gcm_key_store()->CreateKeys( |
| 543 kFakeAppId, kFakeAuthorizedEntity, |
| 544 base::Bind(&GCMKeyStoreTest::GotKeys, base::Unretained(this), |
| 545 &pair_unused, &auth_secret_unused)); |
| 546 |
| 547 base::RunLoop().RunUntilIdle(); |
| 548 |
| 549 gcm_key_store()->CreateKeys( |
| 550 kFakeAppId, kSecondFakeAuthorizedEntity, |
| 551 base::Bind(&GCMKeyStoreTest::GotKeys, base::Unretained(this), |
| 552 &pair_unused, &auth_secret_unused)); |
| 553 |
| 554 base::RunLoop().RunUntilIdle(); |
| 555 |
| 556 EXPECT_DEBUG_DFATAL( |
| 557 { |
| 558 gcm_key_store()->CreateKeys( |
| 559 kFakeAppId, "" /* empty authorized entity for non-InstanceID */, |
| 560 base::Bind(&GCMKeyStoreTest::GotKeys, base::Unretained(this), |
| 561 &pair_unused, &auth_secret_unused)); |
| 562 |
| 563 base::RunLoop().RunUntilIdle(); |
| 564 }, |
| 565 "Instance ID tokens cannot share an app_id with a non-InstanceID GCM " |
| 566 "registration"); |
| 567 } |
| 568 |
| 308 } // namespace | 569 } // namespace |
| 309 | 570 |
| 310 } // namespace gcm | 571 } // namespace gcm |
| OLD | NEW |