Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(304)

Side by Side Diff: net/http/transport_security_state_unittest.cc

Issue 2582323004: Migrate static transport security state fuzzer to LibFuzzer. (Closed)
Patch Set: Add a dictionary. Created 3 years, 11 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "net/http/transport_security_state.h" 5 #include "net/http/transport_security_state.h"
6 6
7 #include <algorithm> 7 #include <algorithm>
8 #include <string> 8 #include <string>
9 #include <vector> 9 #include <vector>
10 10
(...skipping 468 matching lines...) Expand 10 before | Expand all | Expand 10 after
479 TransportSecurityState state; 479 TransportSecurityState state;
480 const base::Time current_time(base::Time::Now()); 480 const base::Time current_time(base::Time::Now());
481 const base::Time expiry = current_time + base::TimeDelta::FromSeconds(1000); 481 const base::Time expiry = current_time + base::TimeDelta::FromSeconds(1000);
482 482
483 EXPECT_FALSE(state.ShouldUpgradeToSSL("example.com")); 483 EXPECT_FALSE(state.ShouldUpgradeToSSL("example.com"));
484 bool include_subdomains = false; 484 bool include_subdomains = false;
485 state.AddHSTS("EXample.coM", expiry, include_subdomains); 485 state.AddHSTS("EXample.coM", expiry, include_subdomains);
486 EXPECT_TRUE(state.ShouldUpgradeToSSL("example.com")); 486 EXPECT_TRUE(state.ShouldUpgradeToSSL("example.com"));
487 } 487 }
488 488
489 TEST_F(TransportSecurityStateTest, Fuzz) {
490 TransportSecurityState state;
491 TransportSecurityState::STSState sts_state;
492 TransportSecurityState::PKPState pkp_state;
493
494 EnableStaticPins(&state);
495
496 for (size_t i = 0; i < 128; i++) {
497 std::string hostname;
498
499 for (;;) {
500 if (base::RandInt(0, 16) == 7) {
501 break;
502 }
503 if (i > 0 && base::RandInt(0, 7) == 7) {
504 hostname.append(1, '.');
505 }
506 hostname.append(1, 'a' + base::RandInt(0, 25));
507 }
508 state.GetStaticDomainState(hostname, &sts_state, &pkp_state);
509 }
510 }
511
512 TEST_F(TransportSecurityStateTest, MatchesCase2) { 489 TEST_F(TransportSecurityStateTest, MatchesCase2) {
513 TransportSecurityState state; 490 TransportSecurityState state;
514 const base::Time current_time(base::Time::Now()); 491 const base::Time current_time(base::Time::Now());
515 const base::Time expiry = current_time + base::TimeDelta::FromSeconds(1000); 492 const base::Time expiry = current_time + base::TimeDelta::FromSeconds(1000);
516 493
517 // Check dynamic entries 494 // Check dynamic entries
518 EXPECT_FALSE(state.ShouldUpgradeToSSL("EXample.coM")); 495 EXPECT_FALSE(state.ShouldUpgradeToSSL("EXample.coM"));
519 bool include_subdomains = false; 496 bool include_subdomains = false;
520 state.AddHSTS("example.com", expiry, include_subdomains); 497 state.AddHSTS("example.com", expiry, include_subdomains);
521 EXPECT_TRUE(state.ShouldUpgradeToSSL("EXample.coM")); 498 EXPECT_TRUE(state.ShouldUpgradeToSSL("EXample.coM"));
(...skipping 1810 matching lines...) Expand 10 before | Expand all | Expand 10 after
2332 base::FieldTrialList::CreateFieldTrial("EnforceCTForProblematicRoots", 2309 base::FieldTrialList::CreateFieldTrial("EnforceCTForProblematicRoots",
2333 "disabled"); 2310 "disabled");
2334 2311
2335 EXPECT_FALSE( 2312 EXPECT_FALSE(
2336 state.ShouldRequireCT("www.example.com", before_cert.get(), hashes)); 2313 state.ShouldRequireCT("www.example.com", before_cert.get(), hashes));
2337 EXPECT_FALSE( 2314 EXPECT_FALSE(
2338 state.ShouldRequireCT("www.example.com", after_cert.get(), hashes)); 2315 state.ShouldRequireCT("www.example.com", after_cert.get(), hashes));
2339 } 2316 }
2340 2317
2341 } // namespace net 2318 } // namespace net
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698