Index: chrome/common/extensions/api/networking_private/networking_private_crypto_unittest.cc |
diff --git a/chrome/common/extensions/api/networking_private/networking_private_crypto_unittest.cc b/chrome/common/extensions/api/networking_private/networking_private_crypto_unittest.cc |
deleted file mode 100644 |
index ac2c981837ee636c632af7e74d9db708d45c4304..0000000000000000000000000000000000000000 |
--- a/chrome/common/extensions/api/networking_private/networking_private_crypto_unittest.cc |
+++ /dev/null |
@@ -1,231 +0,0 @@ |
-// Copyright 2014 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
-#include "chrome/common/extensions/api/networking_private/networking_private_crypto.h" |
- |
-#include <stdint.h> |
- |
-#include "base/base64.h" |
-#include "base/logging.h" |
-#include "base/strings/stringprintf.h" |
-#include "testing/gtest/include/gtest/gtest.h" |
- |
-namespace { |
- |
-} // namespace |
- |
-// Tests of networking_private_crypto support for Networking Private API. |
-class NetworkingPrivateCryptoTest : public testing::Test { |
- protected: |
- // Verify that decryption of |encrypted| data using |private_key_pem| matches |
- // |plain| data. |
- bool VerifyByteString(const std::string& private_key_pem, |
- const std::string& plain, |
- const std::vector<uint8_t>& encrypted) { |
- std::string decrypted; |
- if (networking_private_crypto::DecryptByteString( |
- private_key_pem, encrypted, &decrypted)) |
- return decrypted == plain; |
- return false; |
- } |
-}; |
- |
-// Test that networking_private_crypto::VerifyCredentials behaves as expected. |
-TEST_F(NetworkingPrivateCryptoTest, VerifyCredentials) { |
- // This certificate chain and signature are duplicated from: |
- // |
- // components/test/data/cast_certificate/certificates/chromecast_gen1.pem |
- // components/test/data/cast_certificate/signeddata/2ZZBG9_FA8FCA3EF91A.pem |
- // |
- // TODO(eroman): Avoid duplicating the data. |
- static const char kCertData[] = |
- "-----BEGIN CERTIFICATE-----" |
- "MIIDrDCCApSgAwIBAgIEU8xPLDANBgkqhkiG9w0BAQUFADB9MQswCQYDVQQGEwJV" |
- "UzETMBEGA1UECAwKQ2FsaWZvcm5pYTEWMBQGA1UEBwwNTW91bnRhaW4gVmlldzET" |
- "MBEGA1UECgwKR29vZ2xlIEluYzESMBAGA1UECwwJR29vZ2xlIFRWMRgwFgYDVQQD" |
- "DA9FdXJla2EgR2VuMSBJQ0EwHhcNMTQwNzIwMjMyMjIwWhcNMzQwNzE1MjMyMjIw" |
- "WjCBgTELMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExEzARBgNVBAoT" |
- "Ckdvb2dsZSBJbmMxFjAUBgNVBAcTDU1vdW50YWluIFZpZXcxEjAQBgNVBAsTCUdv" |
- "b2dsZSBUVjEcMBoGA1UEAxMTMlpaQkc5IEZBOEZDQTNFRjkxQTCCASIwDQYJKoZI" |
- "hvcNAQEBBQADggEPADCCAQoCggEBAKV56Srec2ePlqDP6cqFPuwU4MOs7MOcGDrv" |
- "da6qy6tWC7BmsqipMA/hn77iUiBZsw3TbUQnVfmM4ZQ2RENzcrAJ68cmc+lPxmRr" |
- "8x1Xu5FzZ+kcyU8glLLqdiXYEKRboFhC7BM05O1XOLvzCls4zuZuMrGNFBW+YoBm" |
- "FiXFYWBhapZC3RhhlSEZFuQWbb/MUSDzwr/CRbn4tKHMv4Fkw5HAnhLa+yXfgCGw" |
- "qOd9GejqUKsO/aajAHkM7lIHmvkthI4MVk0Koc+Ih487pgsOt18LqubZVEkbjCqp" |
- "Rpx1CGbErWnw2ptPvMCEC6e7mrYHcYgmuzQ7m+eUlhthEUiTYC0CAwEAAaMvMC0w" |
- "CQYDVR0TBAIwADALBgNVHQ8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwIwDQYJ" |
- "KoZIhvcNAQEFBQADggEBAGuKgGXHJXQ1M7P4uXB8wPPuT2h6g29YJ62rUvZ7BrlW" |
- "TknJT0Owaw68zepLhFQ4ydIzbVV3hA2InCmP3U24ZMxMJcA/9qNPAqPrtE1ZIQNI" |
- "Qh6slAdZa0qM6Us30/5fpUL6lgAfD1RIJxA4RWYZKP78SjJz1Lybx3Zbt0Jist9G" |
- "tvaJGZjZrdPncnJKayGaIln8gzHd6MVEGZp7aIQZ2h4NDlnrwyhMFTjg1WvnmQJ6" |
- "3bEvjSyjMGhY0JOUaDp/UMxnExn+1+cYAW9LrosZXtRDNJTl1zX4auAnNMHkt8uC" |
- "F8Jhy80X2wU0fj85oYbRsm+jBMtRayznY1TR0WoPBAo=" |
- "-----END CERTIFICATE-----"; |
- |
- static const char kICAData[] = |
- "-----BEGIN CERTIFICATE-----" |
- "MIIDhzCCAm+gAwIBAgIBATANBgkqhkiG9w0BAQUFADB8MQswCQYDVQQGEwJVUzET" |
- "MBEGA1UECAwKQ2FsaWZvcm5pYTEWMBQGA1UEBwwNTW91bnRhaW4gVmlldzETMBEG" |
- "A1UECgwKR29vZ2xlIEluYzESMBAGA1UECwwJR29vZ2xlIFRWMRcwFQYDVQQDDA5F" |
- "dXJla2EgUm9vdCBDQTAeFw0xMjEyMTkwMDQ3MTJaFw0zMjEyMTQwMDQ3MTJaMH0x" |
- "CzAJBgNVBAYTAlVTMRMwEQYDVQQIDApDYWxpZm9ybmlhMRYwFAYDVQQHDA1Nb3Vu" |
- "dGFpbiBWaWV3MRMwEQYDVQQKDApHb29nbGUgSW5jMRIwEAYDVQQLDAlHb29nbGUg" |
- "VFYxGDAWBgNVBAMMD0V1cmVrYSBHZW4xIElDQTCCASIwDQYJKoZIhvcNAQEBBQAD" |
- "ggEPADCCAQoCggEBALwigL2A9johADuudl41fz3DZFxVlIY0LwWHKM33aYwXs1Cn" |
- "uIL638dDLdZ+q6BvtxNygKRHFcEgmVDN7BRiCVukmM3SQbY2Tv/oLjIwSoGoQqNs" |
- "mzNuyrL1U2bgJ1OGGoUepzk/SneO+1RmZvtYVMBeOcf1UAYL4IrUzuFqVR+LFwDm" |
- "aaMn5gglaTwSnY0FLNYuojHetFJQ1iBJ3nGg+a0gQBLx3SXr1ea4NvTWj3/KQ9zX" |
- "EFvmP1GKhbPz//YDLcsjT5ytGOeTBYysUpr3TOmZer5ufk0K48YcqZP6OqWRXRy9" |
- "ZuvMYNyGdMrP+JIcmH1X+mFHnquAt+RIgCqSxRsCAwEAAaMTMBEwDwYDVR0TBAgw" |
- "BgEB/wIBATANBgkqhkiG9w0BAQUFAAOCAQEAi9Shsc9dzXtsSEpBH1MvGC0yRf+e" |
- "q9NzPh8i1+r6AeZzAw8rxiW7pe7F9UXLJBIqrcJdBfR69cKbEBZa0QpzxRY5oBDK" |
- "0WiFnvueJoOOWPN3oE7l25e+LQBf9ZTbsZ1la/3w0QRR38ySppktcfVN1SP+Mxyp" |
- "tKvFvxq40YDvicniH5xMSDui+gIK3IQBiocC+1nup0wEfXSZh2olRK0WquxONRt8" |
- "e4TJsT/hgnDlDefZbfqVtsXkHugRm9iy86T9E/ODT/cHFCC7IqWmj9a126l0eOKT" |
- "DeUjLwUX4LKXZzRND5x2Q3umIUpWBfYqfPJ/EpSCJikH8AtsbHkUsHTVbA==" |
- "-----END CERTIFICATE-----"; |
- |
- unsigned char kData[] = {0x53, 0x54, 0x52, 0x49, 0x4e, 0x47}; |
- |
- unsigned char kSignature[] = { |
- 0x0a, 0xda, 0xb5, 0x40, 0x5c, 0x8e, 0x53, 0x89, 0xda, 0x67, 0x47, 0x28, |
- 0xab, 0x64, 0x0d, 0xec, 0xb8, 0x1f, 0xd6, 0x75, 0x28, 0x97, 0x5f, 0xe0, |
- 0x11, 0x51, 0x35, 0x2a, 0x70, 0xd8, 0xf6, 0x4d, 0xe8, 0xd0, 0x2e, 0xe0, |
- 0x79, 0x75, 0x3a, 0x25, 0xbf, 0x40, 0x0f, 0x6d, 0xd1, 0x20, 0xe3, 0x82, |
- 0xbd, 0x05, 0x87, 0x57, 0x01, 0x1e, 0x76, 0xb7, 0xf4, 0xd7, 0xb3, 0x10, |
- 0x4a, 0x6c, 0x8a, 0xf9, 0x3d, 0xe7, 0xeb, 0x62, 0xe9, 0x5f, 0x73, 0xab, |
- 0x6e, 0x22, 0xf5, 0x59, 0x4d, 0xc4, 0xa3, 0x95, 0xc3, 0xbe, 0x7b, 0x04, |
- 0x5a, 0x36, 0x67, 0xee, 0x71, 0xb2, 0xe8, 0x60, 0xbe, 0xaa, 0x2c, 0x90, |
- 0x36, 0xd7, 0xf0, 0x42, 0x28, 0xd4, 0x29, 0x9f, 0x30, 0xaa, 0x10, 0x4f, |
- 0x2a, 0xe1, 0x72, 0x67, 0xcc, 0xb5, 0x44, 0x7b, 0x7f, 0x89, 0x45, 0x9f, |
- 0xc3, 0x9d, 0x6a, 0xf0, 0x78, 0x77, 0x6d, 0x9f, 0x13, 0x58, 0x35, 0x09, |
- 0x8c, 0x71, 0xaf, 0x34, 0x4b, 0x18, 0xc7, 0x07, 0xd2, 0xf2, 0x03, 0x48, |
- 0xe2, 0x40, 0x75, 0x3b, 0xeb, 0x33, 0x74, 0x8d, 0x33, 0xb4, 0x45, 0xe2, |
- 0x59, 0x56, 0x8b, 0xc7, 0x4e, 0x60, 0xc7, 0xec, 0xc8, 0xd3, 0x32, 0x16, |
- 0x20, 0xb0, 0xc7, 0x0d, 0x14, 0x4b, 0x68, 0xbf, 0x79, 0xad, 0x7e, 0x47, |
- 0x5d, 0x5d, 0xb5, 0x8c, 0xb6, 0xc3, 0x27, 0xb9, 0xd8, 0x25, 0x70, 0xc0, |
- 0x8d, 0x12, 0x26, 0x51, 0xe8, 0xad, 0xde, 0xf8, 0xe8, 0x3e, 0x47, 0xd0, |
- 0xdf, 0x11, 0x7d, 0x34, 0x50, 0xa8, 0x89, 0x89, 0x59, 0x93, 0x8a, 0x3d, |
- 0x88, 0xaf, 0xd5, 0x1e, 0xe8, 0x34, 0x2e, 0x98, 0x62, 0x39, 0xc1, 0x22, |
- 0x06, 0xf7, 0x3e, 0x98, 0xfd, 0x6f, 0x3a, 0x45, 0xd0, 0xb7, 0x3a, 0xe5, |
- 0xaa, 0x38, 0x35, 0x2c, 0xe9, 0x78, 0x71, 0xe2, 0xf0, 0x6f, 0x60, 0x95, |
- 0xc0, 0x60, 0x5f, 0xc3, |
- }; |
- |
- static const char kHotspotBssid[] = "FA:8F:CA:3E:F9:1A"; |
- |
- static const char kBadCertData[] = "not a certificate"; |
- static const char kBadHotspotBssid[] = "bad bssid"; |
- |
- // April 1, 2016 |
- base::Time::Exploded time_exploded = {0}; |
- time_exploded.year = 2016; |
- time_exploded.month = 4; |
- time_exploded.day_of_month = 1; |
- base::Time time; |
- ASSERT_TRUE(base::Time::FromUTCExploded(time_exploded, &time)); |
- |
- // September 1, 2035 |
- base::Time::Exploded expired_time_exploded = {0}; |
- expired_time_exploded.year = 2035; |
- expired_time_exploded.month = 9; |
- expired_time_exploded.day_of_month = 1; |
- base::Time expired_time; |
- ASSERT_TRUE( |
- base::Time::FromUTCExploded(expired_time_exploded, &expired_time)); |
- |
- std::string unsigned_data = std::string(std::begin(kData), std::end(kData)); |
- std::string signed_data = |
- std::string(std::begin(kSignature), std::end(kSignature)); |
- |
- // Check that verification fails when the intermediaries are not provided. |
- EXPECT_FALSE(networking_private_crypto::VerifyCredentialsAtTime( |
- kCertData, std::vector<std::string>(), signed_data, unsigned_data, |
- kHotspotBssid, time)); |
- |
- // Checking basic verification operation. |
- std::vector<std::string> icas; |
- icas.push_back(kICAData); |
- |
- EXPECT_TRUE(networking_private_crypto::VerifyCredentialsAtTime( |
- kCertData, icas, signed_data, unsigned_data, kHotspotBssid, time)); |
- |
- // Checking that verification fails when the certificate is expired. |
- EXPECT_FALSE(networking_private_crypto::VerifyCredentialsAtTime( |
- kCertData, icas, signed_data, unsigned_data, kHotspotBssid, |
- expired_time)); |
- |
- // Checking that verification fails when certificate has invalid format. |
- EXPECT_FALSE(networking_private_crypto::VerifyCredentialsAtTime( |
- kBadCertData, icas, signed_data, unsigned_data, kHotspotBssid, time)); |
- |
- // Checking that verification fails if we supply a bad ICA. |
- std::vector<std::string> bad_icas; |
- bad_icas.push_back(kCertData); |
- EXPECT_FALSE(networking_private_crypto::VerifyCredentialsAtTime( |
- kCertData, bad_icas, signed_data, unsigned_data, kHotspotBssid, time)); |
- |
- // Checking that verification fails when Hotspot Bssid does not match the |
- // certificate's common name. |
- EXPECT_FALSE(networking_private_crypto::VerifyCredentialsAtTime( |
- kCertData, icas, signed_data, unsigned_data, kBadHotspotBssid, time)); |
- |
- // Checking that verification fails when the signature is wrong. |
- unsigned_data = "bad data"; |
- EXPECT_FALSE(networking_private_crypto::VerifyCredentialsAtTime( |
- kCertData, icas, signed_data, unsigned_data, kHotspotBssid, time)); |
-} |
- |
-// Test that networking_private_crypto::EncryptByteString behaves as expected. |
-TEST_F(NetworkingPrivateCryptoTest, EncryptByteString) { |
- static const char kPublicKey[] = |
- "MIGJAoGBANTjeoILNkSKHVkd3my/rSwNi+9t473vPJU0lkM8nn9C7+gmaPvEWg4ZNkMd12aI" |
- "XDXVHrjgjcS80bPE0ykhN9J7EYkJ+43oulJMrEnyDy5KQo7U3MKBdjaKFTS+OPyohHpI8GqH" |
- "KM8UMkLPVtAKu1BXgGTSDvEaBAuoVT2PM4XNAgMBAAE="; |
- static const char kPrivateKey[] = |
- "-----BEGIN PRIVATE KEY-----" |
- "MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBANTjeoILNkSKHVkd" |
- "3my/rSwNi+9t473vPJU0lkM8nn9C7+gmaPvEWg4ZNkMd12aIXDXVHrjgjcS80bPE" |
- "0ykhN9J7EYkJ+43oulJMrEnyDy5KQo7U3MKBdjaKFTS+OPyohHpI8GqHKM8UMkLP" |
- "VtAKu1BXgGTSDvEaBAuoVT2PM4XNAgMBAAECgYEAt91H/2zjj8qhkkhDxDS/wd5p" |
- "T37fRTmMX2ktpiCC23LadOxHm7p39Nk9jjYFxV5cFXpdsFrw1kwl6VdC8LDp3eGu" |
- "Ku1GCqj5H2fpnkmL2goD01HRkPR3ro4uBHPtTXDbCIz0qp+NGlGG4gPUysMXxHSb" |
- "E5FIWeUx6gcPvidwrpkCQQD40FXY46KDJT8JVYJMqY6nFQZvptFl+9BGWfheVVSF" |
- "KBlTQBx/QA+XcC/W9Q/I+NEhdGcxLlkEMUpihSpYffKbAkEA2wmFfccdheTtoOuY" |
- "8oTurbnFHsS7gLtcR2IbRJKXw80CJxTQA/LMWz0YuFOAYJNl/9ILMfp6MQiI4L9F" |
- "l6pbtwJAJqkAXcXo72WvKL0flNfXsYBj0p9h8+2vi+7Y15d8nYAAh13zz5XdllM5" |
- "K7ZCMKDwpbkXe53O+QbLnwk/7iYLtwJAERT6AygfJk0HNzCIeglh78x4EgE3uj9i" |
- "X/LHu55PFacMTu3xlw09YLQwFFf2wBFeuAeyddBZ7S8ENbrU+5H+mwJBAO2E6gwG" |
- "e5ZqY4RmsQmv6K0rn5k+UT4qlPeVp1e6LnvO/PcKWOaUvDK59qFZoX4vN+iFUAbk" |
- "IuvhmL9u/uPWWck=" |
- "-----END PRIVATE KEY-----"; |
- static const std::vector<uint8_t> kBadKeyData(5, 111); |
- static const char kTestData[] = "disco boy"; |
- static const char kEmptyData[] = ""; |
- |
- std::string public_key_string; |
- base::Base64Decode(kPublicKey, &public_key_string); |
- std::vector<uint8_t> public_key(public_key_string.begin(), |
- public_key_string.end()); |
- std::string plain; |
- std::vector<uint8_t> encrypted_output; |
- |
- // Checking basic encryption operation. |
- plain = kTestData; |
- EXPECT_TRUE(networking_private_crypto::EncryptByteString( |
- public_key, plain, &encrypted_output)); |
- EXPECT_TRUE(VerifyByteString(kPrivateKey, plain, encrypted_output)); |
- |
- // Checking that we can encrypt the empty string. |
- plain = kEmptyData; |
- EXPECT_TRUE(networking_private_crypto::EncryptByteString( |
- public_key, plain, &encrypted_output)); |
- |
- // Checking graceful fail for too much data to encrypt. |
- EXPECT_FALSE(networking_private_crypto::EncryptByteString( |
- public_key, std::string(500, 'x'), &encrypted_output)); |
- |
- // Checking graceful fail for a bad key format. |
- EXPECT_FALSE(networking_private_crypto::EncryptByteString( |
- kBadKeyData, kTestData, &encrypted_output)); |
-} |