Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(837)

Unified Diff: net/cert/cert_verify_proc_unittest.cc

Issue 2436233002: Record UMA metrics for Must-Staple certificates on private roots (Closed)
Patch Set: Add another histogram for OCSP response status Created 4 years, 2 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: net/cert/cert_verify_proc_unittest.cc
diff --git a/net/cert/cert_verify_proc_unittest.cc b/net/cert/cert_verify_proc_unittest.cc
index ee6a9b14f554e41f9b9b0e63db8fbf64c3db581b..88cbff8fb3e3273c318c70ca6d22bc3d7460777e 100644
--- a/net/cert/cert_verify_proc_unittest.cc
+++ b/net/cert/cert_verify_proc_unittest.cc
@@ -13,6 +13,7 @@
#include "base/macros.h"
#include "base/sha1.h"
#include "base/strings/string_number_conversions.h"
+#include "base/test/histogram_tester.h"
#include "build/build_config.h"
#include "crypto/sha2.h"
#include "net/base/net_errors.h"
@@ -48,6 +49,11 @@ namespace net {
namespace {
+const char kTLSFeatureExtensionHistogram[] =
+ "Net.Certificate.TLSFeatureExtensionWithPrivateRoot";
+const char kTLSFeatureExtensionOCSPHistogram[] =
+ "Net.Certificate.TLSFeatureExtensionWithPrivateRootHasOCSP";
+
// Mock CertVerifyProc that sets the CertVerifyResult to a given value for
// all certificates that are Verify()'d
class MockCertVerifyProc : public CertVerifyProc {
@@ -164,6 +170,17 @@ class CertVerifyProcTest : public testing::Test {
additional_trust_anchors, verify_result);
}
+ int VerifyWithOCSPResponse(X509Certificate* cert,
+ const std::string& hostname,
+ const std::string& ocsp_response,
+ int flags,
+ CRLSet* crl_set,
+ const CertificateList& additional_trust_anchors,
+ CertVerifyResult* verify_result) {
+ return verify_proc_->Verify(cert, hostname, ocsp_response, flags, crl_set,
+ additional_trust_anchors, verify_result);
+ }
+
const CertificateList empty_cert_list_;
scoped_refptr<CertVerifyProc> verify_proc_;
};
@@ -1844,4 +1861,105 @@ TEST_F(CertVerifyProcTest, LargeKey) {
}
#endif // defined(OS_MACOSX) && !defined(OS_IOS)
+// Tests that CertVerifyProc records a histogram correctly when a
+// certificate chaining to a private root contains the TLS feature
+// extension and does not have a stapled OCSP response.
+TEST_F(CertVerifyProcTest, HasTLSFeatureExtensionUMA) {
+ base::HistogramTester histograms;
+ scoped_refptr<X509Certificate> cert(
+ ImportCertFromFile(GetTestCertsDirectory(), "tls_feature_extension.pem"));
+ CertVerifyResult result;
+ result.is_issued_by_known_root = false;
+ result.verified_cert = cert;
+ verify_proc_ = new MockCertVerifyProc(result);
+
+ histograms.ExpectTotalCount(kTLSFeatureExtensionHistogram, 0);
+ histograms.ExpectTotalCount(kTLSFeatureExtensionOCSPHistogram, 0);
+
+ int flags = 0;
+ CertVerifyResult verify_result;
+ int error = Verify(cert.get(), "127.0.0.1", flags, NULL, empty_cert_list_,
+ &verify_result);
+ EXPECT_EQ(OK, error);
+ histograms.ExpectTotalCount(kTLSFeatureExtensionHistogram, 1);
+ histograms.ExpectBucketCount(kTLSFeatureExtensionHistogram, true, 1);
+ histograms.ExpectTotalCount(kTLSFeatureExtensionOCSPHistogram, 1);
+ histograms.ExpectBucketCount(kTLSFeatureExtensionOCSPHistogram, false, 1);
+}
+
+// Tests that CertVerifyProc records a histogram correctly when a
+// certificate chaining to a private root contains the TLS feature
+// extension and does have a stapled OCSP response.
+TEST_F(CertVerifyProcTest, HasTLSFeatureExtensionWithStapleUMA) {
+ base::HistogramTester histograms;
+ scoped_refptr<X509Certificate> cert(
+ ImportCertFromFile(GetTestCertsDirectory(), "tls_feature_extension.pem"));
+ CertVerifyResult result;
+ result.is_issued_by_known_root = false;
+ result.verified_cert = cert;
+ verify_proc_ = new MockCertVerifyProc(result);
+
+ histograms.ExpectTotalCount(kTLSFeatureExtensionHistogram, 0);
+ histograms.ExpectTotalCount(kTLSFeatureExtensionOCSPHistogram, 0);
+
+ int flags = 0;
+ CertVerifyResult verify_result;
+ int error =
+ VerifyWithOCSPResponse(cert.get(), "127.0.0.1", "dummy response", flags,
+ NULL, empty_cert_list_, &verify_result);
+ EXPECT_EQ(OK, error);
+ histograms.ExpectTotalCount(kTLSFeatureExtensionHistogram, 1);
+ histograms.ExpectBucketCount(kTLSFeatureExtensionHistogram, true, 1);
+ histograms.ExpectTotalCount(kTLSFeatureExtensionOCSPHistogram, 1);
+ histograms.ExpectBucketCount(kTLSFeatureExtensionOCSPHistogram, true, 1);
+}
+
+// Tests that CertVerifyProc records a histogram correctly when a
+// certificate chaining to a private root does not contain the TLS feature
+// extension.
+TEST_F(CertVerifyProcTest, DoesNotHaveTLSFeatureExtensionUMA) {
+ base::HistogramTester histograms;
+ scoped_refptr<X509Certificate> cert(
+ ImportCertFromFile(GetTestCertsDirectory(), "ok_cert.pem"));
+ CertVerifyResult result;
+ result.is_issued_by_known_root = false;
+ result.verified_cert = cert;
+ verify_proc_ = new MockCertVerifyProc(result);
+
+ histograms.ExpectTotalCount(kTLSFeatureExtensionHistogram, 0);
+ histograms.ExpectTotalCount(kTLSFeatureExtensionOCSPHistogram, 0);
+
+ int flags = 0;
+ CertVerifyResult verify_result;
+ int error = Verify(cert.get(), "127.0.0.1", flags, NULL, empty_cert_list_,
+ &verify_result);
+ EXPECT_EQ(OK, error);
+ histograms.ExpectTotalCount(kTLSFeatureExtensionHistogram, 1);
+ histograms.ExpectBucketCount(kTLSFeatureExtensionHistogram, false, 1);
+ histograms.ExpectTotalCount(kTLSFeatureExtensionOCSPHistogram, 0);
+}
+
+// Tests that CertVerifyProc does not record a histogram when a
+// certificate contains the TLS feature extension but chains to a public
+// root.
+TEST_F(CertVerifyProcTest, HasTLSFeatureExtensionWithPublicRootUMA) {
+ base::HistogramTester histograms;
+ scoped_refptr<X509Certificate> cert(
+ ImportCertFromFile(GetTestCertsDirectory(), "tls_feature_extension.pem"));
+ CertVerifyResult result;
+ result.is_issued_by_known_root = true;
+ result.verified_cert = cert;
+ verify_proc_ = new MockCertVerifyProc(result);
+
+ histograms.ExpectTotalCount(kTLSFeatureExtensionHistogram, 0);
+
+ int flags = 0;
+ CertVerifyResult verify_result;
+ int error = Verify(cert.get(), "127.0.0.1", flags, NULL, empty_cert_list_,
+ &verify_result);
+ EXPECT_EQ(OK, error);
+ histograms.ExpectTotalCount(kTLSFeatureExtensionHistogram, 0);
+ histograms.ExpectTotalCount(kTLSFeatureExtensionOCSPHistogram, 0);
+}
+
} // namespace net

Powered by Google App Engine
This is Rietveld 408576698