| OLD | NEW |
| 1 // Copyright 2015 The Chromium Authors. All rights reserved. | 1 // Copyright 2015 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "content/common/ssl_status_serialization.h" | 5 #include "content/common/ssl_status_serialization.h" |
| 6 | 6 |
| 7 #include "net/ssl/ssl_connection_status_flags.h" | 7 #include "net/ssl/ssl_connection_status_flags.h" |
| 8 #include "testing/gtest/include/gtest/gtest.h" | 8 #include "testing/gtest/include/gtest/gtest.h" |
| 9 | 9 |
| 10 namespace content { | 10 namespace content { |
| 11 | 11 |
| 12 namespace { | 12 namespace { |
| 13 | 13 |
| 14 void SetTestStatus(SSLStatus* status) { | 14 void SetTestStatus(SSLStatus* status) { |
| 15 status->security_style = SECURITY_STYLE_AUTHENTICATED; | 15 status->security_style = SECURITY_STYLE_AUTHENTICATED; |
| 16 status->cert_id = 1; | 16 status->cert_id = 1; |
| 17 status->cert_status = net::CERT_STATUS_DATE_INVALID; | 17 status->cert_status = net::CERT_STATUS_DATE_INVALID; |
| 18 status->security_bits = 80; | 18 status->security_bits = 80; |
| 19 status->key_exchange_info = 23; | 19 status->key_exchange_info = 23; |
| 20 status->connection_status = net::SSL_CONNECTION_VERSION_TLS1_2; | 20 status->connection_status = net::SSL_CONNECTION_VERSION_TLS1_2; |
| 21 status->num_unknown_scts = 0; | 21 status->sct_statuses.push_back(net::ct::SCT_STATUS_OK); |
| 22 status->num_invalid_scts = 0; | |
| 23 status->num_valid_scts = 1; | |
| 24 } | 22 } |
| 25 | 23 |
| 26 bool SSLStatusAreEqual(const SSLStatus& a, const SSLStatus &b) { | 24 bool SSLStatusAreEqual(const SSLStatus& a, const SSLStatus &b) { |
| 27 return a.Equals(b); | 25 return a.Equals(b); |
| 28 } | 26 } |
| 29 | 27 |
| 30 } // namespace | 28 } // namespace |
| 31 | 29 |
| 32 std::ostream& operator<<(std::ostream& os, const SSLStatus& status) { | 30 std::ostream& operator<<(std::ostream& os, const SSLStatus& status) { |
| 33 return os << "Security Style: " << status.security_style | 31 return os << "Security Style: " << status.security_style |
| 34 << "\nCert ID: " << status.cert_id | 32 << "\nCert ID: " << status.cert_id |
| 35 << "\nCert Status: " << status.cert_status | 33 << "\nCert Status: " << status.cert_status |
| 36 << "\nSecurity bits: " << status.security_bits | 34 << "\nSecurity bits: " << status.security_bits |
| 37 << "\nKey exchange info: " << status.key_exchange_info | 35 << "\nKey exchange info: " << status.key_exchange_info |
| 38 << "\nConnection status: " << status.connection_status | 36 << "\nConnection status: " << status.connection_status |
| 39 << "\nContent Status: " << status.content_status | 37 << "\nContent Status: " << status.content_status |
| 40 << "\nNumber of unknown SCTs: " << status.num_unknown_scts | 38 << "\nNumber of SCTs: " << status.sct_statuses.size(); |
| 41 << "\nNumber of invalid SCTs: " << status.num_invalid_scts | |
| 42 << "\nNumber of valid SCTs: " << status.num_valid_scts; | |
| 43 } | 39 } |
| 44 | 40 |
| 45 // Test that a valid serialized SSLStatus returns true on | 41 // Test that a valid serialized SSLStatus returns true on |
| 46 // deserialization and deserializes correctly. | 42 // deserialization and deserializes correctly. |
| 47 TEST(SSLStatusSerializationTest, DeserializeSerializedStatus) { | 43 TEST(SSLStatusSerializationTest, DeserializeSerializedStatus) { |
| 48 // Serialize dummy data and test that it deserializes properly. | 44 // Serialize dummy data and test that it deserializes properly. |
| 49 SSLStatus status; | 45 SSLStatus status; |
| 50 SetTestStatus(&status); | 46 SetTestStatus(&status); |
| 51 std::string serialized = SerializeSecurityInfo(status); | 47 std::string serialized = SerializeSecurityInfo(status); |
| 52 | 48 |
| (...skipping 49 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 102 SSLStatus status; | 98 SSLStatus status; |
| 103 SetTestStatus(&status); | 99 SetTestStatus(&status); |
| 104 status.security_style = static_cast<SecurityStyle>(100); | 100 status.security_style = static_cast<SecurityStyle>(100); |
| 105 std::string serialized = SerializeSecurityInfo(status); | 101 std::string serialized = SerializeSecurityInfo(status); |
| 106 | 102 |
| 107 SSLStatus invalid_deserialized; | 103 SSLStatus invalid_deserialized; |
| 108 ASSERT_FALSE(DeserializeSecurityInfo(serialized, &invalid_deserialized)); | 104 ASSERT_FALSE(DeserializeSecurityInfo(serialized, &invalid_deserialized)); |
| 109 EXPECT_PRED2(SSLStatusAreEqual, SSLStatus(), invalid_deserialized); | 105 EXPECT_PRED2(SSLStatusAreEqual, SSLStatus(), invalid_deserialized); |
| 110 } | 106 } |
| 111 | 107 |
| 108 // Serialize a status with an empty |sct_statuses| field and test that |
| 109 // deserializing works. |
| 110 TEST(SSLStatusSerializationTest, DeserializeEmptySCTStatuses) { |
| 111 SSLStatus status; |
| 112 SetTestStatus(&status); |
| 113 status.sct_statuses.clear(); |
| 114 std::string serialized = SerializeSecurityInfo(status); |
| 115 |
| 116 SSLStatus deserialized; |
| 117 ASSERT_TRUE(DeserializeSecurityInfo(serialized, &deserialized)); |
| 118 EXPECT_PRED2(SSLStatusAreEqual, status, deserialized); |
| 119 } |
| 120 |
| 121 // Serialize a status with multiple different |sct_statuses| and test that |
| 122 // deserializing works. |
| 123 TEST(SSLStatusSerializationTest, DeserializeMultipleSCTStatuses) { |
| 124 SSLStatus status; |
| 125 SetTestStatus(&status); |
| 126 status.sct_statuses.push_back(net::ct::SCT_STATUS_LOG_UNKNOWN); |
| 127 status.sct_statuses.push_back(net::ct::SCT_STATUS_LOG_UNKNOWN); |
| 128 status.sct_statuses.push_back(net::ct::SCT_STATUS_OK); |
| 129 status.sct_statuses.push_back(net::ct::SCT_STATUS_INVALID); |
| 130 std::string serialized = SerializeSecurityInfo(status); |
| 131 |
| 132 SSLStatus deserialized; |
| 133 ASSERT_TRUE(DeserializeSecurityInfo(serialized, &deserialized)); |
| 134 EXPECT_PRED2(SSLStatusAreEqual, status, deserialized); |
| 135 } |
| 136 |
| 137 // Serialize a status with a bad SCTVerifyStatus value and test that |
| 138 // deserializing it fails. |
| 139 TEST(SSLStatusSerializationTest, DeserializeBogusSCTVerifyStatus) { |
| 140 SSLStatus status; |
| 141 SetTestStatus(&status); |
| 142 status.sct_statuses.push_back(static_cast<net::ct::SCTVerifyStatus>(100)); |
| 143 std::string serialized = SerializeSecurityInfo(status); |
| 144 |
| 145 SSLStatus deserialized; |
| 146 ASSERT_FALSE(DeserializeSecurityInfo(serialized, &deserialized)); |
| 147 EXPECT_PRED2(SSLStatusAreEqual, SSLStatus(), deserialized); |
| 148 } |
| 149 |
| 112 } // namespace | 150 } // namespace |
| OLD | NEW |