OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "net/cert/multi_threaded_cert_verifier.h" | 5 #include "net/cert/multi_threaded_cert_verifier.h" |
6 | 6 |
7 #include <memory> | 7 #include <memory> |
8 | 8 |
9 #include "base/bind.h" | 9 #include "base/bind.h" |
10 #include "base/debug/leak_annotations.h" | 10 #include "base/debug/leak_annotations.h" |
11 #include "base/files/file_path.h" | 11 #include "base/files/file_path.h" |
12 #include "base/format_macros.h" | 12 #include "base/format_macros.h" |
13 #include "base/strings/stringprintf.h" | 13 #include "base/strings/stringprintf.h" |
14 #include "net/base/net_errors.h" | 14 #include "net/base/net_errors.h" |
15 #include "net/base/test_completion_callback.h" | 15 #include "net/base/test_completion_callback.h" |
16 #include "net/base/test_data_directory.h" | 16 #include "net/base/test_data_directory.h" |
17 #include "net/cert/cert_trust_anchor_provider.h" | |
18 #include "net/cert/cert_verifier.h" | 17 #include "net/cert/cert_verifier.h" |
19 #include "net/cert/cert_verify_proc.h" | 18 #include "net/cert/cert_verify_proc.h" |
20 #include "net/cert/cert_verify_result.h" | 19 #include "net/cert/cert_verify_result.h" |
21 #include "net/cert/x509_certificate.h" | 20 #include "net/cert/x509_certificate.h" |
22 #include "net/log/net_log.h" | 21 #include "net/log/net_log.h" |
23 #include "net/test/cert_test_util.h" | 22 #include "net/test/cert_test_util.h" |
24 #include "testing/gmock/include/gmock/gmock.h" | |
25 #include "testing/gtest/include/gtest/gtest.h" | 23 #include "testing/gtest/include/gtest/gtest.h" |
26 | 24 |
27 using testing::Mock; | |
28 using testing::ReturnRef; | |
29 | |
30 namespace net { | 25 namespace net { |
31 | 26 |
32 namespace { | 27 namespace { |
33 | 28 |
34 void FailTest(int /* result */) { | 29 void FailTest(int /* result */) { |
35 FAIL(); | 30 FAIL(); |
36 } | 31 } |
37 | 32 |
38 class MockCertVerifyProc : public CertVerifyProc { | 33 class MockCertVerifyProc : public CertVerifyProc { |
39 public: | 34 public: |
(...skipping 13 matching lines...) Expand all Loading... |
53 CRLSet* crl_set, | 48 CRLSet* crl_set, |
54 const CertificateList& additional_trust_anchors, | 49 const CertificateList& additional_trust_anchors, |
55 CertVerifyResult* verify_result) override { | 50 CertVerifyResult* verify_result) override { |
56 verify_result->Reset(); | 51 verify_result->Reset(); |
57 verify_result->verified_cert = cert; | 52 verify_result->verified_cert = cert; |
58 verify_result->cert_status = CERT_STATUS_COMMON_NAME_INVALID; | 53 verify_result->cert_status = CERT_STATUS_COMMON_NAME_INVALID; |
59 return ERR_CERT_COMMON_NAME_INVALID; | 54 return ERR_CERT_COMMON_NAME_INVALID; |
60 } | 55 } |
61 }; | 56 }; |
62 | 57 |
63 class MockCertTrustAnchorProvider : public CertTrustAnchorProvider { | |
64 public: | |
65 MockCertTrustAnchorProvider() {} | |
66 virtual ~MockCertTrustAnchorProvider() {} | |
67 | |
68 MOCK_METHOD0(GetAdditionalTrustAnchors, const CertificateList&()); | |
69 }; | |
70 | |
71 } // namespace | 58 } // namespace |
72 | 59 |
73 class MultiThreadedCertVerifierTest : public ::testing::Test { | 60 class MultiThreadedCertVerifierTest : public ::testing::Test { |
74 public: | 61 public: |
75 MultiThreadedCertVerifierTest() : verifier_(new MockCertVerifyProc()) {} | 62 MultiThreadedCertVerifierTest() : verifier_(new MockCertVerifyProc()) {} |
76 ~MultiThreadedCertVerifierTest() override {} | 63 ~MultiThreadedCertVerifierTest() override {} |
77 | 64 |
78 protected: | 65 protected: |
79 MultiThreadedCertVerifier verifier_; | 66 MultiThreadedCertVerifier verifier_; |
80 }; | 67 }; |
81 | 68 |
82 TEST_F(MultiThreadedCertVerifierTest, CacheHit) { | |
83 base::FilePath certs_dir = GetTestCertsDirectory(); | |
84 scoped_refptr<X509Certificate> test_cert( | |
85 ImportCertFromFile(certs_dir, "ok_cert.pem")); | |
86 ASSERT_NE(static_cast<X509Certificate*>(NULL), test_cert.get()); | |
87 | |
88 int error; | |
89 CertVerifyResult verify_result; | |
90 TestCompletionCallback callback; | |
91 std::unique_ptr<CertVerifier::Request> request; | |
92 | |
93 error = verifier_.Verify( | |
94 CertVerifier::RequestParams(test_cert, "www.example.com", 0, | |
95 std::string(), CertificateList()), | |
96 NULL, &verify_result, callback.callback(), &request, BoundNetLog()); | |
97 ASSERT_EQ(ERR_IO_PENDING, error); | |
98 EXPECT_TRUE(request); | |
99 error = callback.WaitForResult(); | |
100 ASSERT_TRUE(IsCertificateError(error)); | |
101 ASSERT_EQ(1u, verifier_.requests()); | |
102 ASSERT_EQ(0u, verifier_.cache_hits()); | |
103 ASSERT_EQ(0u, verifier_.inflight_joins()); | |
104 ASSERT_EQ(1u, verifier_.GetCacheSize()); | |
105 | |
106 error = verifier_.Verify( | |
107 CertVerifier::RequestParams(test_cert, "www.example.com", 0, | |
108 std::string(), CertificateList()), | |
109 NULL, &verify_result, callback.callback(), &request, BoundNetLog()); | |
110 // Synchronous completion. | |
111 ASSERT_NE(ERR_IO_PENDING, error); | |
112 ASSERT_TRUE(IsCertificateError(error)); | |
113 ASSERT_FALSE(request); | |
114 ASSERT_EQ(2u, verifier_.requests()); | |
115 ASSERT_EQ(1u, verifier_.cache_hits()); | |
116 ASSERT_EQ(0u, verifier_.inflight_joins()); | |
117 ASSERT_EQ(1u, verifier_.GetCacheSize()); | |
118 } | |
119 | |
120 // Tests the same server certificate with different intermediate CA | |
121 // certificates. These should be treated as different certificate chains even | |
122 // though the two X509Certificate objects contain the same server certificate. | |
123 TEST_F(MultiThreadedCertVerifierTest, DifferentCACerts) { | |
124 base::FilePath certs_dir = GetTestCertsDirectory(); | |
125 | |
126 scoped_refptr<X509Certificate> server_cert = | |
127 ImportCertFromFile(certs_dir, "salesforce_com_test.pem"); | |
128 ASSERT_NE(static_cast<X509Certificate*>(NULL), server_cert.get()); | |
129 | |
130 scoped_refptr<X509Certificate> intermediate_cert1 = | |
131 ImportCertFromFile(certs_dir, "verisign_intermediate_ca_2011.pem"); | |
132 ASSERT_NE(static_cast<X509Certificate*>(NULL), intermediate_cert1.get()); | |
133 | |
134 scoped_refptr<X509Certificate> intermediate_cert2 = | |
135 ImportCertFromFile(certs_dir, "verisign_intermediate_ca_2016.pem"); | |
136 ASSERT_NE(static_cast<X509Certificate*>(NULL), intermediate_cert2.get()); | |
137 | |
138 X509Certificate::OSCertHandles intermediates; | |
139 intermediates.push_back(intermediate_cert1->os_cert_handle()); | |
140 scoped_refptr<X509Certificate> cert_chain1 = | |
141 X509Certificate::CreateFromHandle(server_cert->os_cert_handle(), | |
142 intermediates); | |
143 | |
144 intermediates.clear(); | |
145 intermediates.push_back(intermediate_cert2->os_cert_handle()); | |
146 scoped_refptr<X509Certificate> cert_chain2 = | |
147 X509Certificate::CreateFromHandle(server_cert->os_cert_handle(), | |
148 intermediates); | |
149 | |
150 int error; | |
151 CertVerifyResult verify_result; | |
152 TestCompletionCallback callback; | |
153 std::unique_ptr<CertVerifier::Request> request; | |
154 | |
155 error = verifier_.Verify( | |
156 CertVerifier::RequestParams(cert_chain1, "www.example.com", 0, | |
157 std::string(), CertificateList()), | |
158 NULL, &verify_result, callback.callback(), &request, BoundNetLog()); | |
159 ASSERT_EQ(ERR_IO_PENDING, error); | |
160 EXPECT_TRUE(request); | |
161 error = callback.WaitForResult(); | |
162 ASSERT_TRUE(IsCertificateError(error)); | |
163 ASSERT_EQ(1u, verifier_.requests()); | |
164 ASSERT_EQ(0u, verifier_.cache_hits()); | |
165 ASSERT_EQ(0u, verifier_.inflight_joins()); | |
166 ASSERT_EQ(1u, verifier_.GetCacheSize()); | |
167 | |
168 error = verifier_.Verify( | |
169 CertVerifier::RequestParams(cert_chain2, "www.example.com", 0, | |
170 std::string(), CertificateList()), | |
171 NULL, &verify_result, callback.callback(), &request, BoundNetLog()); | |
172 ASSERT_EQ(ERR_IO_PENDING, error); | |
173 EXPECT_TRUE(request); | |
174 error = callback.WaitForResult(); | |
175 ASSERT_TRUE(IsCertificateError(error)); | |
176 ASSERT_EQ(2u, verifier_.requests()); | |
177 ASSERT_EQ(0u, verifier_.cache_hits()); | |
178 ASSERT_EQ(0u, verifier_.inflight_joins()); | |
179 ASSERT_EQ(2u, verifier_.GetCacheSize()); | |
180 } | |
181 | |
182 // Tests an inflight join. | 69 // Tests an inflight join. |
183 TEST_F(MultiThreadedCertVerifierTest, InflightJoin) { | 70 TEST_F(MultiThreadedCertVerifierTest, InflightJoin) { |
184 base::FilePath certs_dir = GetTestCertsDirectory(); | 71 base::FilePath certs_dir = GetTestCertsDirectory(); |
185 scoped_refptr<X509Certificate> test_cert( | 72 scoped_refptr<X509Certificate> test_cert( |
186 ImportCertFromFile(certs_dir, "ok_cert.pem")); | 73 ImportCertFromFile(certs_dir, "ok_cert.pem")); |
187 ASSERT_NE(static_cast<X509Certificate*>(NULL), test_cert.get()); | 74 ASSERT_NE(static_cast<X509Certificate*>(NULL), test_cert.get()); |
188 | 75 |
189 int error; | 76 int error; |
190 CertVerifyResult verify_result; | 77 CertVerifyResult verify_result; |
191 TestCompletionCallback callback; | 78 TestCompletionCallback callback; |
(...skipping 12 matching lines...) Expand all Loading... |
204 CertVerifier::RequestParams(test_cert, "www.example.com", 0, | 91 CertVerifier::RequestParams(test_cert, "www.example.com", 0, |
205 std::string(), CertificateList()), | 92 std::string(), CertificateList()), |
206 NULL, &verify_result2, callback2.callback(), &request2, BoundNetLog()); | 93 NULL, &verify_result2, callback2.callback(), &request2, BoundNetLog()); |
207 EXPECT_EQ(ERR_IO_PENDING, error); | 94 EXPECT_EQ(ERR_IO_PENDING, error); |
208 EXPECT_TRUE(request2); | 95 EXPECT_TRUE(request2); |
209 error = callback.WaitForResult(); | 96 error = callback.WaitForResult(); |
210 EXPECT_TRUE(IsCertificateError(error)); | 97 EXPECT_TRUE(IsCertificateError(error)); |
211 error = callback2.WaitForResult(); | 98 error = callback2.WaitForResult(); |
212 ASSERT_TRUE(IsCertificateError(error)); | 99 ASSERT_TRUE(IsCertificateError(error)); |
213 ASSERT_EQ(2u, verifier_.requests()); | 100 ASSERT_EQ(2u, verifier_.requests()); |
214 ASSERT_EQ(0u, verifier_.cache_hits()); | |
215 ASSERT_EQ(1u, verifier_.inflight_joins()); | 101 ASSERT_EQ(1u, verifier_.inflight_joins()); |
216 } | 102 } |
217 | 103 |
218 // Tests that the callback of a canceled request is never made. | 104 // Tests that the callback of a canceled request is never made. |
219 TEST_F(MultiThreadedCertVerifierTest, CancelRequest) { | 105 TEST_F(MultiThreadedCertVerifierTest, CancelRequest) { |
220 base::FilePath certs_dir = GetTestCertsDirectory(); | 106 base::FilePath certs_dir = GetTestCertsDirectory(); |
221 scoped_refptr<X509Certificate> test_cert( | 107 scoped_refptr<X509Certificate> test_cert( |
222 ImportCertFromFile(certs_dir, "ok_cert.pem")); | 108 ImportCertFromFile(certs_dir, "ok_cert.pem")); |
223 ASSERT_NE(static_cast<X509Certificate*>(NULL), test_cert.get()); | 109 ASSERT_NE(static_cast<X509Certificate*>(NULL), test_cert.get()); |
224 | 110 |
(...skipping 14 matching lines...) Expand all Loading... |
239 // worker thread) is likely to complete by the end of this test. | 125 // worker thread) is likely to complete by the end of this test. |
240 TestCompletionCallback callback; | 126 TestCompletionCallback callback; |
241 for (int i = 0; i < 5; ++i) { | 127 for (int i = 0; i < 5; ++i) { |
242 error = verifier_.Verify( | 128 error = verifier_.Verify( |
243 CertVerifier::RequestParams(test_cert, "www2.example.com", 0, | 129 CertVerifier::RequestParams(test_cert, "www2.example.com", 0, |
244 std::string(), CertificateList()), | 130 std::string(), CertificateList()), |
245 NULL, &verify_result, callback.callback(), &request, BoundNetLog()); | 131 NULL, &verify_result, callback.callback(), &request, BoundNetLog()); |
246 ASSERT_EQ(ERR_IO_PENDING, error); | 132 ASSERT_EQ(ERR_IO_PENDING, error); |
247 EXPECT_TRUE(request); | 133 EXPECT_TRUE(request); |
248 error = callback.WaitForResult(); | 134 error = callback.WaitForResult(); |
249 verifier_.ClearCache(); | |
250 } | 135 } |
251 } | 136 } |
252 | 137 |
253 // Tests that a canceled request is not leaked. | 138 // Tests that a canceled request is not leaked. |
254 TEST_F(MultiThreadedCertVerifierTest, CancelRequestThenQuit) { | 139 TEST_F(MultiThreadedCertVerifierTest, CancelRequestThenQuit) { |
255 base::FilePath certs_dir = GetTestCertsDirectory(); | 140 base::FilePath certs_dir = GetTestCertsDirectory(); |
256 scoped_refptr<X509Certificate> test_cert( | 141 scoped_refptr<X509Certificate> test_cert( |
257 ImportCertFromFile(certs_dir, "ok_cert.pem")); | 142 ImportCertFromFile(certs_dir, "ok_cert.pem")); |
258 ASSERT_NE(static_cast<X509Certificate*>(NULL), test_cert.get()); | 143 ASSERT_NE(static_cast<X509Certificate*>(NULL), test_cert.get()); |
259 | 144 |
(...skipping 14 matching lines...) Expand all Loading... |
274 CertVerifier::RequestParams(test_cert, "www.example.com", 0, | 159 CertVerifier::RequestParams(test_cert, "www.example.com", 0, |
275 std::string(), CertificateList()), | 160 std::string(), CertificateList()), |
276 NULL, &verify_result, callback.callback(), &request, BoundNetLog()); | 161 NULL, &verify_result, callback.callback(), &request, BoundNetLog()); |
277 } | 162 } |
278 ASSERT_EQ(ERR_IO_PENDING, error); | 163 ASSERT_EQ(ERR_IO_PENDING, error); |
279 EXPECT_TRUE(request); | 164 EXPECT_TRUE(request); |
280 request.reset(); | 165 request.reset(); |
281 // Destroy |verifier| by going out of scope. | 166 // Destroy |verifier| by going out of scope. |
282 } | 167 } |
283 | 168 |
284 TEST_F(MultiThreadedCertVerifierTest, CertTrustAnchorProvider) { | |
285 MockCertTrustAnchorProvider trust_provider; | |
286 verifier_.SetCertTrustAnchorProvider(&trust_provider); | |
287 | |
288 scoped_refptr<X509Certificate> test_cert( | |
289 ImportCertFromFile(GetTestCertsDirectory(), "ok_cert.pem")); | |
290 ASSERT_TRUE(test_cert.get()); | |
291 | |
292 const CertificateList empty_cert_list; | |
293 CertificateList cert_list; | |
294 cert_list.push_back(test_cert); | |
295 | |
296 // Check that Verify() asks the |trust_provider| for the current list of | |
297 // additional trust anchors. | |
298 int error; | |
299 CertVerifyResult verify_result; | |
300 TestCompletionCallback callback; | |
301 std::unique_ptr<CertVerifier::Request> request; | |
302 EXPECT_CALL(trust_provider, GetAdditionalTrustAnchors()) | |
303 .WillOnce(ReturnRef(empty_cert_list)); | |
304 error = verifier_.Verify( | |
305 CertVerifier::RequestParams(test_cert, "www.example.com", 0, | |
306 std::string(), CertificateList()), | |
307 NULL, &verify_result, callback.callback(), &request, BoundNetLog()); | |
308 Mock::VerifyAndClearExpectations(&trust_provider); | |
309 ASSERT_EQ(ERR_IO_PENDING, error); | |
310 EXPECT_TRUE(request); | |
311 error = callback.WaitForResult(); | |
312 EXPECT_EQ(ERR_CERT_COMMON_NAME_INVALID, error); | |
313 ASSERT_EQ(1u, verifier_.requests()); | |
314 ASSERT_EQ(0u, verifier_.cache_hits()); | |
315 | |
316 // The next Verify() uses the cached result. | |
317 EXPECT_CALL(trust_provider, GetAdditionalTrustAnchors()) | |
318 .WillOnce(ReturnRef(empty_cert_list)); | |
319 error = verifier_.Verify( | |
320 CertVerifier::RequestParams(test_cert, "www.example.com", 0, | |
321 std::string(), CertificateList()), | |
322 NULL, &verify_result, callback.callback(), &request, BoundNetLog()); | |
323 Mock::VerifyAndClearExpectations(&trust_provider); | |
324 EXPECT_EQ(ERR_CERT_COMMON_NAME_INVALID, error); | |
325 EXPECT_FALSE(request); | |
326 ASSERT_EQ(2u, verifier_.requests()); | |
327 ASSERT_EQ(1u, verifier_.cache_hits()); | |
328 | |
329 // Another Verify() for the same certificate but with a different list of | |
330 // trust anchors will not reuse the cache. | |
331 EXPECT_CALL(trust_provider, GetAdditionalTrustAnchors()) | |
332 .WillOnce(ReturnRef(cert_list)); | |
333 error = verifier_.Verify( | |
334 CertVerifier::RequestParams(test_cert, "www.example.com", 0, | |
335 std::string(), CertificateList()), | |
336 NULL, &verify_result, callback.callback(), &request, BoundNetLog()); | |
337 Mock::VerifyAndClearExpectations(&trust_provider); | |
338 ASSERT_EQ(ERR_IO_PENDING, error); | |
339 EXPECT_TRUE(request); | |
340 error = callback.WaitForResult(); | |
341 EXPECT_EQ(ERR_CERT_COMMON_NAME_INVALID, error); | |
342 ASSERT_EQ(3u, verifier_.requests()); | |
343 ASSERT_EQ(1u, verifier_.cache_hits()); | |
344 } | |
345 | |
346 // Tests de-duplication of requests. | 169 // Tests de-duplication of requests. |
347 // Starts up 5 requests, of which 3 are unique. | 170 // Starts up 5 requests, of which 3 are unique. |
348 TEST_F(MultiThreadedCertVerifierTest, MultipleInflightJoin) { | 171 TEST_F(MultiThreadedCertVerifierTest, MultipleInflightJoin) { |
349 base::FilePath certs_dir = GetTestCertsDirectory(); | 172 base::FilePath certs_dir = GetTestCertsDirectory(); |
350 scoped_refptr<X509Certificate> test_cert( | 173 scoped_refptr<X509Certificate> test_cert( |
351 ImportCertFromFile(certs_dir, "ok_cert.pem")); | 174 ImportCertFromFile(certs_dir, "ok_cert.pem")); |
352 ASSERT_NE(static_cast<X509Certificate*>(nullptr), test_cert.get()); | 175 ASSERT_NE(static_cast<X509Certificate*>(nullptr), test_cert.get()); |
353 | 176 |
354 int error; | 177 int error; |
355 CertVerifyResult verify_result1; | 178 CertVerifyResult verify_result1; |
(...skipping 55 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
411 | 234 |
412 error = callback1.WaitForResult(); | 235 error = callback1.WaitForResult(); |
413 EXPECT_TRUE(IsCertificateError(error)); | 236 EXPECT_TRUE(IsCertificateError(error)); |
414 error = callback2.WaitForResult(); | 237 error = callback2.WaitForResult(); |
415 ASSERT_TRUE(IsCertificateError(error)); | 238 ASSERT_TRUE(IsCertificateError(error)); |
416 error = callback4.WaitForResult(); | 239 error = callback4.WaitForResult(); |
417 ASSERT_TRUE(IsCertificateError(error)); | 240 ASSERT_TRUE(IsCertificateError(error)); |
418 | 241 |
419 // Let the other requests automatically cancel. | 242 // Let the other requests automatically cancel. |
420 ASSERT_EQ(5u, verifier_.requests()); | 243 ASSERT_EQ(5u, verifier_.requests()); |
421 ASSERT_EQ(0u, verifier_.cache_hits()); | |
422 ASSERT_EQ(2u, verifier_.inflight_joins()); | 244 ASSERT_EQ(2u, verifier_.inflight_joins()); |
423 } | 245 } |
424 | 246 |
425 } // namespace net | 247 } // namespace net |
OLD | NEW |