Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(155)

Side by Side Diff: net/cert/caching_cert_verifier_unittest.cc

Issue 1991653002: Move caching out of MultiThreadedCertVerifier (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@request_params
Patch Set: Rebased Created 4 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
(Empty)
1 // Copyright 2016 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 #include "net/cert/caching_cert_verifier.h"
6
7 #include <memory>
8
9 #include "base/files/file_path.h"
10 #include "base/memory/ptr_util.h"
11 #include "base/memory/ref_counted.h"
12 #include "net/base/net_errors.h"
13 #include "net/base/test_completion_callback.h"
14 #include "net/base/test_data_directory.h"
15 #include "net/cert/cert_trust_anchor_provider.h"
16 #include "net/cert/cert_verifier.h"
17 #include "net/cert/cert_verify_result.h"
18 #include "net/cert/mock_cert_verifier.h"
19 #include "net/cert/x509_certificate.h"
20 #include "net/log/net_log.h"
21 #include "net/test/cert_test_util.h"
22 #include "testing/gmock/include/gmock/gmock.h"
23 #include "testing/gtest/include/gtest/gtest.h"
24
25 using testing::Mock;
26 using testing::ReturnRef;
27
28 namespace net {
29
30 namespace {
31
32 class MockCertTrustAnchorProvider : public CertTrustAnchorProvider {
33 public:
34 MockCertTrustAnchorProvider() {}
35 virtual ~MockCertTrustAnchorProvider() {}
36
37 MOCK_METHOD0(GetAdditionalTrustAnchors, const CertificateList&());
38 };
39
40 } // namespace
41
42 class CachingCertVerifierTest : public ::testing::Test {
43 public:
44 CachingCertVerifierTest() : verifier_(base::MakeUnique<MockCertVerifier>()) {}
45 ~CachingCertVerifierTest() override {}
46
47 protected:
48 CachingCertVerifier verifier_;
49 };
50
51 TEST_F(CachingCertVerifierTest, CacheHit) {
52 base::FilePath certs_dir = GetTestCertsDirectory();
53 scoped_refptr<X509Certificate> test_cert(
54 ImportCertFromFile(certs_dir, "ok_cert.pem"));
55 ASSERT_TRUE(test_cert.get());
56
57 int error;
58 CertVerifyResult verify_result;
59 TestCompletionCallback callback;
60 std::unique_ptr<CertVerifier::Request> request;
61
62 error = callback.GetResult(verifier_.Verify(
63 CertVerifier::RequestParams(test_cert, "www.example.com", 0,
64 std::string(), CertificateList()),
65 nullptr, &verify_result, callback.callback(), &request, BoundNetLog()));
66 ASSERT_TRUE(IsCertificateError(error));
67 ASSERT_EQ(1u, verifier_.requests());
68 ASSERT_EQ(0u, verifier_.cache_hits());
69 ASSERT_EQ(1u, verifier_.GetCacheSize());
70
71 error = verifier_.Verify(
72 CertVerifier::RequestParams(test_cert, "www.example.com", 0,
73 std::string(), CertificateList()),
74 nullptr, &verify_result, callback.callback(), &request, BoundNetLog());
75 // Synchronous completion.
76 ASSERT_NE(ERR_IO_PENDING, error);
77 ASSERT_TRUE(IsCertificateError(error));
78 ASSERT_FALSE(request);
79 ASSERT_EQ(2u, verifier_.requests());
80 ASSERT_EQ(1u, verifier_.cache_hits());
81 ASSERT_EQ(1u, verifier_.GetCacheSize());
82 }
83
84 // Tests the same server certificate with different intermediate CA
85 // certificates. These should be treated as different certificate chains even
86 // though the two X509Certificate objects contain the same server certificate.
87 TEST_F(CachingCertVerifierTest, DifferentCACerts) {
88 base::FilePath certs_dir = GetTestCertsDirectory();
89
90 scoped_refptr<X509Certificate> server_cert =
91 ImportCertFromFile(certs_dir, "salesforce_com_test.pem");
92 ASSERT_TRUE(server_cert);
93
94 scoped_refptr<X509Certificate> intermediate_cert1 =
95 ImportCertFromFile(certs_dir, "verisign_intermediate_ca_2011.pem");
96 ASSERT_TRUE(intermediate_cert1);
97
98 scoped_refptr<X509Certificate> intermediate_cert2 =
99 ImportCertFromFile(certs_dir, "verisign_intermediate_ca_2016.pem");
100 ASSERT_TRUE(intermediate_cert2);
101
102 X509Certificate::OSCertHandles intermediates;
103 intermediates.push_back(intermediate_cert1->os_cert_handle());
104 scoped_refptr<X509Certificate> cert_chain1 =
105 X509Certificate::CreateFromHandle(server_cert->os_cert_handle(),
106 intermediates);
107 ASSERT_TRUE(cert_chain1);
108
109 intermediates.clear();
110 intermediates.push_back(intermediate_cert2->os_cert_handle());
111 scoped_refptr<X509Certificate> cert_chain2 =
112 X509Certificate::CreateFromHandle(server_cert->os_cert_handle(),
113 intermediates);
114 ASSERT_TRUE(cert_chain2);
115
116 int error;
117 CertVerifyResult verify_result;
118 TestCompletionCallback callback;
119 std::unique_ptr<CertVerifier::Request> request;
120
121 error = callback.GetResult(verifier_.Verify(
122 CertVerifier::RequestParams(cert_chain1, "www.example.com", 0,
123 std::string(), CertificateList()),
124 nullptr, &verify_result, callback.callback(), &request, BoundNetLog()));
125 ASSERT_TRUE(IsCertificateError(error));
126 ASSERT_EQ(1u, verifier_.requests());
127 ASSERT_EQ(0u, verifier_.cache_hits());
128 ASSERT_EQ(1u, verifier_.GetCacheSize());
129
130 error = callback.GetResult(verifier_.Verify(
131 CertVerifier::RequestParams(cert_chain2, "www.example.com", 0,
132 std::string(), CertificateList()),
133 nullptr, &verify_result, callback.callback(), &request, BoundNetLog()));
134 ASSERT_TRUE(IsCertificateError(error));
135 ASSERT_EQ(2u, verifier_.requests());
136 ASSERT_EQ(0u, verifier_.cache_hits());
137 ASSERT_EQ(2u, verifier_.GetCacheSize());
138 }
139
140 TEST_F(CachingCertVerifierTest, CertTrustAnchorProvider) {
eroman 2016/06/10 00:08:04 Are there any tests for asynchronous completion of
Ryan Sleevi 2016/06/10 00:41:10 Nope, mostly because I didn't opt to handle it spe
141 MockCertTrustAnchorProvider trust_provider;
142 verifier_.SetCertTrustAnchorProvider(&trust_provider);
143
144 scoped_refptr<X509Certificate> test_cert(
145 ImportCertFromFile(GetTestCertsDirectory(), "ok_cert.pem"));
146 ASSERT_TRUE(test_cert.get());
147
148 const CertificateList empty_cert_list;
149 CertificateList cert_list;
150 cert_list.push_back(test_cert);
151
152 // Check that Verify() asks the |trust_provider| for the current list of
153 // additional trust anchors.
154 int error;
155 CertVerifyResult verify_result;
156 TestCompletionCallback callback;
157 std::unique_ptr<CertVerifier::Request> request;
158 EXPECT_CALL(trust_provider, GetAdditionalTrustAnchors())
159 .WillOnce(ReturnRef(empty_cert_list));
160 error = callback.GetResult(verifier_.Verify(
161 CertVerifier::RequestParams(test_cert, "www.example.com", 0,
162 std::string(), CertificateList()),
163 nullptr, &verify_result, callback.callback(), &request, BoundNetLog()));
164 Mock::VerifyAndClearExpectations(&trust_provider);
165 EXPECT_TRUE(IsCertificateError(error));
166 ASSERT_EQ(1u, verifier_.requests());
167 ASSERT_EQ(0u, verifier_.cache_hits());
168
169 // The next Verify() uses the cached result.
170 EXPECT_CALL(trust_provider, GetAdditionalTrustAnchors())
171 .WillOnce(ReturnRef(empty_cert_list));
172 error = callback.GetResult(verifier_.Verify(
173 CertVerifier::RequestParams(test_cert, "www.example.com", 0,
174 std::string(), CertificateList()),
175 nullptr, &verify_result, callback.callback(), &request, BoundNetLog()));
176 Mock::VerifyAndClearExpectations(&trust_provider);
177 EXPECT_TRUE(IsCertificateError(error));
178 ASSERT_EQ(2u, verifier_.requests());
179 ASSERT_EQ(1u, verifier_.cache_hits());
180
181 // Another Verify() for the same certificate but with a different list of
182 // trust anchors will not reuse the cache.
183 EXPECT_CALL(trust_provider, GetAdditionalTrustAnchors())
184 .WillOnce(ReturnRef(cert_list));
185 error = callback.GetResult(verifier_.Verify(
186 CertVerifier::RequestParams(test_cert, "www.example.com", 0,
187 std::string(), CertificateList()),
188 nullptr, &verify_result, callback.callback(), &request, BoundNetLog()));
189 Mock::VerifyAndClearExpectations(&trust_provider);
190 EXPECT_TRUE(IsCertificateError(error));
191 ASSERT_EQ(3u, verifier_.requests());
192 ASSERT_EQ(1u, verifier_.cache_hits());
193 }
194
195 } // namespace net
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698